information technology foundations-bit 112 chapter 3 ethics, privacy and information security

70
formation Technology Foundations-BIT 112 CHAPTER 3 Ethics, Privacy and Information Security

Post on 21-Dec-2015

219 views

Category:

Documents


0 download

TRANSCRIPT

Information Technology Foundations-BIT 112

CHAPTER 3

Ethics, Privacy and Information Security

Information Technology Foundations-BIT 112

2

Chapter Outline

• 3.1 Ethical Issues

• 3.2 Threats to Information Security

• 3.3 Protecting Information Resources

Information Technology Foundations-BIT 112

3

Learning Objectives

• Describe the major ethical issues related to information technology and identify situations in which they occur.

• Describe the many threats to information security.

• Understand the various defense mechanisms used to protect information systems.

• Explain IT auditing and planning for disaster recovery.

Information Technology Foundations-BIT 112

4

TJX: The Worst Data Breach Ever?

• 2007

• 46 Million customer accounts compromised.

Information Technology Foundations-BIT 112

5

Ethics Defined

• Ethics– A branch of philosophy that deals with what is considered

to be right and wrong.

• A Code of Ethics – A code of ethics is a collection of principles intended as a

guide for members of a company or organization.

Information Technology Foundations-BIT 112

6

Fundamental Tenets of Ethics

• Responsibility – means that you accept the consequences of your decisions

and actions.

• Accountability – means a determination of who is responsible for actions that

were taken.

• Liability – a legal concept meaning that individuals have the right to

recover the damages done to them by other individuals, organizations, or systems.

Information Technology Foundations-BIT 112

7

Ethical Issue Frameworks

• The diversity and ever expanding use of IT applications have created a variety of ethical issues.

• These issues fall into four general categories: – 1. Privacy issues involve collecting, storing, and

disseminating information about individuals. – 2. Accuracy issues involve the authenticity, fidelity, and

accuracy of information that is collected and processed. – 3. Property issues involve the ownership and value of

information. – 4. Accessibility issues revolve around who should have

access to information and whether they should have to pay for this access.

Information Technology Foundations-BIT 112

8

Unethical vs. Illegal

• What is unethical is not necessarily illegal.

• Ethics scenarios

Information Technology Foundations-BIT 112

9

ethical? legal? File Sharing case

• You have recently bought some graphic design software that is a far superior product, you believe, to its competitors on the market. The price is rather high, but the purchase was authorised by your boss for work related purposes. The software is delivered on a single CD ROM. You believe that many of your friends who work for other companies would benefit if they were able to use this software – and that the software developer would benefit as well through additional sales. From an ethical perspective, you believe that it would be unethical to keep this information to yourself, given its likely value for your friends, so you decide to share it with them. You make 10 copies on CD ROM and send it to them as a gift.

• Is this action legal? Is it ethical?

• What would you do?

Information Technology Foundations-BIT 112

10

Freedom of Speech; Censorship; National Interest

• Your country is current at war with a powerful neighbor. The government is urging all citizens to support the government and the armed forces, since a lack of consensus can only act to weaken the country and reduce the likelihood of victory.

• As an investigative journalist, you stumble upon a startling, classified government report: 30% of the senior officials in the government have vested interests in the war via their connections with private companies, some of which have been secretly arming the enemy for the last few years. This material is clearly in the public interest, yet publication is likely to bring about the fall of the government, and possible defeat in the war.

• What should you do?

Information Technology Foundations-BIT 112

11

ethical? legal? Cybersquatting

• Cybersquatting is the practice of buying domain names on the Internet and then holding them for your own purposes. You might keep the site empty –no content – and wait for someone to offer you a good price. Alternatively, you might choose to put your own content on the site. This has the potential to misrepresent other individuals and organizations when your domain name is very similar to the name of a real organization.

• Do you think that cybersquatting should be illegal – or that it is no more than an extension to the right to own property? Can anyone “own” the word “ten”? Or “whitehouse”?

Information Technology Foundations-BIT 112

12

The Four Categories of Ethical Issues

• The diversity and ever expanding use of IT applications have created a variety of ethical issues.

• These issues fall into one or more of the following four general categories: – 1. Privacy issues involve collecting, storing, and

disseminating information about individuals. – 2. Accuracy issues involve the authenticity, fidelity, and

accuracy of information that is collected and processed. – 3. Property issues involve the ownership and value of

information. – 4. Accessibility issues revolve around who should have

access to information and whether they should have to pay for this access.

Information Technology Foundations-BIT 112

13

Privacy Issues

How much privacy do we have left?

Information Technology Foundations-BIT 112

14

Privacy Defined

• Privacy. The right to be left alone and to be free of unreasonable personal intrusions.

• Court decisions have followed two rules:– (1) The right of privacy is not absolute. Your privacy must

be balanced against the needs of society.– (2) The public’s right to know is superior to the individual’s

right of privacy.

Information Technology Foundations-BIT 112

15

Threats to Privacy

• Data aggregators, digital dossiers, and profiling.

• Electronic Surveillance.

• Personal Information in Databases.

• Information on Internet Bulletin Boards, Newsgroups, and Social Networking Sites.

Information Technology Foundations-BIT 112

16

Threats to Privacy: Data Aggregators, Digital Dossiers, and Profiling

• Data aggregators – companies that collect public data (e.g., real estate records,

telephone numbers) and nonpublic data (e.g., social security numbers, financial data, police records, motor vehicle records) and integrate them to produce digital dossiers.

• Digital dossier – is an electronic description of you and your habits.

• Profiling – is the process of creating a digital dossier.

Information Technology Foundations-BIT 112

17

Threats to Privacy: Electronic Surveillance

• The tracking of people‘s activities, online or offline, with the aid of computers.

• The image demonstrates that many people are blissfully unaware that they can be under electronic surveillance while they are using their computers.

Information Technology Foundations-BIT 112

18

Electronic Surveillance

• See "The State of Surveillance" article in BusinessWeek

Information Technology Foundations-BIT 112

19

Electronic Surveillance

• See the surveillance slideshow

• See additional surveillance slides

• And you think you have privacy? (video)

• Sense-through-the-Wall

Information Technology Foundations-BIT 112

20

Threats to Privacy: Personal Information in Databases

• Banks

• Utility companies

• Government agencies

• Credit reporting agencies

Information Technology Foundations-BIT 112

21

Threats to Privacy: Personal Information on Social Networking Sites

Information Technology Foundations-BIT 112

22

Social Networking Sites Can Cause You Problems

Anyone can post derogatory information about you anonymously.

(See this Washington Post article.)

You can also hurt yourself, as this article shows.

Information Technology Foundations-BIT 112

23

What Can You Do?

• First, be careful what information you post on social networking sites.

• Second, a company, ReputationDefender, says it can remove derogatory information from the Web.

Information Technology Foundations-BIT 112

24

Protecting Privacy

• Privacy Codes and Policies– An organization’s guidelines with respect to protecting the

privacy of customers, clients, and employees.

• Two Models– Opt-out Model of Informed Consent

• Permits the company to collect personal information until the customer specifically requests that the data not be collected.

– Opt-in Model of Informed Consent • Means that organizations are prohibited from collecting

any personal information unless the customer specifically authorizes it. (Preferred by privacy advocates.)

Information Technology Foundations-BIT 112

25

Key Information Security Terms

• Threat– Is any danger to which a system/information resource may be

exposed.

• Exposure– Is the harm, loss or damage that can result if a threat compromises

an information resource.

• Vulnerability– Is the possibility that the system/information resource will suffer

harm by a threat.

• Risk– Is the likelihood that a threat will occur.

• Information system controls– Are the procedures, devices, or software aimed at preventing a

compromise to a system.

Information Technology Foundations-BIT 112

26

Factors Increasing the Threats to Information Security

• Today’s interconnected, interdependent, wirelessly-networked business environment

• Government legislation

• Smaller, faster, cheaper computers and storage devices

• Decreasing skills necessary to be a computer hacker.

• International organized crime turning to cybercrime

• Downstream liability

• Increased employee use of unmanaged devices

• Lack of management support

Information Technology Foundations-BIT 112

27

A Look at Unmanaged Devices

Wi-Fi at McDonalds

Wi-Fi at Starbucks

Hotel Business Center

Information Technology Foundations-BIT 112

28

Security Threats (Figure 3.1)

Information Technology Foundations-BIT 112

29

Categories of Threats to Information Systems

• Unintentional acts

• Natural disasters

• Technical failures

• Management failures

• Deliberate acts(from Whitman and Mattord, 2003)

• Example of a threat (video)

Information Technology Foundations-BIT 112

30

Categories of Threats: Unintentional Acts

• Human errors

• Deviations in quality of service by service providers (e.g., utilities)

• Environmental hazards (e.g., dirt, dust, humidity)

Information Technology Foundations-BIT 112

31

Human Errors

• Tailgating

• Shoulder surfing

• Carelessness with laptops and portable computing devices

• Opening questionable e-mails

• Careless Internet surfing

• Poor password selection and use

• And more

Information Technology Foundations-BIT 112

32

Anti-Tailgating Door

• To deter tailgating, many companies have anti-tailgating doors protecting the entrance into high-security areas.

• Note that only one person at a time can go through this door.

Information Technology Foundations-BIT 112

33

Shoulder Surfing

• Occurs when the attacker watches another person’s computer screen over that person’s shoulder. Particularly dangerous in public areas such as airports, commuter trains, and on airplanes.

Information Technology Foundations-BIT 112

34

Most Dangerous Employees

• The biggest threat to the security of an organization’s information assets are the company’s employees.

• In fact, the most dangerous employees are those in human resources and IT. – HR employees have access to

sensitive personal data on all employees.

– IT employees not only have access to sensitive personal data, but control the means to create, store, transmit, and modify these data.

Remember, employees hold ALL

the information

Information Technology Foundations-BIT 112

35

Social Engineering

• An attack where the attacker uses social skills to trick a legitimate employee into providing confidential company information such as passwords.

• Social engineering is a typically unintentional human error on the part of an employee, but it is the result of a deliberate action on the part of an attacker.

• 60 Minutes Interview with Kevin Mitnick, the “King of Social Engineering”

• Kevin Mitnick served several years in a federal prison. Upon his release, he opened his own consulting firm, advising companies on how to deter people like him,– See his company here

Information Technology Foundations-BIT 112

36

Categories of Threats: Natural Disasters

Information Technology Foundations-BIT 112

37

Categories of Threats: Deliberate Acts

• Espionage or trespass– Competitive intelligence consists of legal information-

gathering techniques. Espionage crosses the legal boundary.

• Information extortion

• Sabotage or vandalism

• Theft of equipment or information– For example, dumpster diving

Information Technology Foundations-BIT 112

38

Deliberate Acts (continued)

• Compromises to intellectual property– Intellectual property. Property created by individuals or

corporations which is protected under trade secret, patent, and copyright laws.• Trade secret. Intellectual work, such as a business plan,

that is a company secret and is not based on public information.

• Patent. Document that grants the holder exclusive rights on an invention or process for 20 years.

• Copyright. Statutory grant that provides creators of intellectual property with ownership of the property for life of the creator plus 70 years.

– Piracy. Copying a software program without making payment to the owner.

Information Technology Foundations-BIT 112

39

Deliberate Acts (continued)

• Software attacks– Virus

• a segment of computer code that performs malicious actions by attaching to another computer program.

– Worm • 1988: first widespread worm, created by Robert T. Morris, Jr.• (see the rapid spread of the Slammer worm)• a segment of computer code that spreads by itself and performs

malicious actions without requiring another computer program.– Trojan horse

• a software program that hides in other computer programs and reveal its designed behavior only when it is activated. A typical behavior of a Trojan horse is to capture your sensitive information (e.g., passwords, account numbers, etc.) and send them to the creator of the Trojan horse.

– Logic Bomb• a segment of computer code that is embedded within an organization’s

existing computer programs and is designed to activate and perform a destructive action at a certain time and date.

Information Technology Foundations-BIT 112

40

Deliberate Acts (continued)

• Software attacks (continued)– Phishing attacks

• use deception to acquire sensitive personal information by masquerading as official-looking e-mails or instant messages.

– Distributed denial-of-service attacks• attacker first takes over many computers. These

computers are called zombies or bots. Together, these bots form a botnet.

• See botnet demonstration

Information Technology Foundations-BIT 112

41

How to Detect a Phish E-mail

Information Technology Foundations-BIT 112

42

Deliberate Acts (continued)

• Alien Software– Spyware (see video)

• Collects personal information about users without their consent. Two types of spyware are keystroke loggers (keyloggers) and screen scrapers. Keystroke loggers record your keystrokes and your Web browsing history. Screen scrapers record a continuous “movie” of what you do on a screen.

– Spamware• is alien software that is designed to use your computer as a

launchpad for spammers. Spam is unsolicited e-mail.– Cookies

• are small amounts of information that Web sites store on your computer. The cookie demo will show you how much information your computer sends when you connect to a Web site.

Information Technology Foundations-BIT 112

43

Deliberate Acts (continued)

• Supervisory control and data acquisition (SCADA) attacks.– A large-scale, distributed, measurement and control system.– SCADA systems are the link between the electronic world

and the physical world.

Wireless sensor

Video of an experimental SCADA attack that was successful.

Information Technology Foundations-BIT 112

44

What if a SCADA attack were successful?

Northeastern U.S. power outage in 2003

Information Technology Foundations-BIT 112

45

3.3 Protecting Information Resources

Information Technology Foundations-BIT 112

46

Risk!

There is always risk!

Information Technology Foundations-BIT 112

47

And then there is real risk!

Information Technology Foundations-BIT 112

48

Risk Management

• Risk. – The probability that a threat will impact an information resource.

• Risk management. – To identify, control and minimize the impact of threats.

• Risk analysis. – To assess the value of each asset being protected, estimate the

probability it might be compromised, and compare the probable costs of it being compromised with the cost of protecting it.

• Risk mitigation – When an organization takes concrete actions against risk. It has two

functions:– (1) implement controls to prevent identified threats from occurring,

and– (2) developing a means of recovery should the threat become a

reality.

Information Technology Foundations-BIT 112

49

Risk Mitigation Strategies

• Risk Acceptance. – Accept the potential risk, continue operating with no

controls, and absorb any damages that occur.

• Risk Limitation. – Limit the risk by implementing controls that minimize the

impact of threat.

• Risk Transference. – Transfer the risk by using other means to compensate for

the loss, such as purchasing insurance.

Information Technology Foundations-BIT 112

50

Risk Optimization

Information Technology Foundations-BIT 112

51

Risk Limitation: Controls

• To protect their information assets, organizations implement controls, or defense mechanisms ( also called countermeasures).

• Controls are intended to prevent accidental hazards, deter intentional acts, detect problems as early as possible, enhance damage recovery, and correct problems.

• Security controls are designed to protect all of the components of an information system, including data, software, hardware, and networks.

• Because there are so many diverse threats, organizations utilize layers of controls.

Information Technology Foundations-BIT 112

52

Risk Limitation: Control Layers

• Physical controls. – Physical protection of computer facilities and resources.

• Access controls. – Restrict unauthorized individuals from using information

resources. These controls involve two major functions: authentication and authorization.

• Communications (network) controls. – Secure the movement of data across networks. Consist of firewalls,

anti malware systems, intrusion detection systems, encryption, virtual private networking ( VPN), and vulnerability management systems.

• Application controls – Are security counter-measures that protect specific applications.

The three major categories of these controls are input, processing, and output controls.

Information Technology Foundations-BIT 112

53

Where Defense Mechanisms (Controls) Are Located

Information Technology Foundations-BIT 112

54

Access Controls

• Authentication- Major objective is proof of identity. – Something the user is, also known as biometrics, these

access controls examine a user's innate physical characteristics.• The latest biometric: gait recognition• The Raytheon Personal Identification Device

– Something the user has. These access controls include regular ID cards, smart cards, and tokens.

– Something the user does. These access controls include voice and signature recognition.

– Something the user knows. • passwords• passphrases

Information Technology Foundations-BIT 112

55

Access Controls (continued)

• Authorization– Permission issued to individuals and groups to do certain

activities with information resources, based on verified identity.

• Privilege– A collection of related computer system operations that can

be performed by users of the system.

• Least privilege– A principle that users be granted the privilege for some

activity only if there is a justifiable need to grant this authorization.

Information Technology Foundations-BIT 112

56

Communication or Network Controls

• Firewalls– System that enforces access-control policy between two networks.

• Anti-malware systems (also called antivirus software)– Software packages that attempt to identify and eliminate viruses, worms, and other malicious

software. The logos show three anti-malware companies. Clicking on the link will take you to each company’s homepage.

• Whitelisting – A process in which a company identifies the software that it will allow to run and does not try

to recognize malware.

• Blacklisting – A process in which a company allows all software to run unless it is on the blacklist.

• Intrusion Detection Systems – Designed to detect all types of malicious network traffic and computer usage that cannot be

detected by a firewall.

• Encryption. – Process of converting an original message into a form that cannot be read by anyone except

the intended receiver.

Information Technology Foundations-BIT 112

57

Basic Home Firewall (top) and Corporate Firewall (bottom)

Information Technology Foundations-BIT 112

58

Basic Home Firewall and Corporate Firewall

• A basic home firewall can be implemented as software on the home computer.

• A corporate firewall has the following components:– (1) external firewall facing the Internet– (2) a demilitarized zone (DMZ) located between the two

firewalls; the DMZ contains company servers that typically handle Web page requests and e-mail.

– (3) an internal firewall that faces the company network

Information Technology Foundations-BIT 112

59

How Public Key Encryption Works

Information Technology Foundations-BIT 112

60

How Digital Certificates Work

• A digital certificate is an electronic document attached to a file certifying that the file is from the organization that it claims to be from and has not been modified from its original format.

• Certificate authorities, which are trusted intermediaries between two organizations, issue digital certificates.

Information Technology Foundations-BIT 112

61

Communication or Network Controls (continued)

• A Virtual Private Network is a private network that uses a public network (usually the Internet) to connect users.

• Secure Socket Layer (SSL), now called Transport Layer Security (TLS), is an encryption standard used for secure transactions such as credit card purchases and online banking.

• Vulnerability Management Systems (also called Security On Demand) extend the security perimeter that exists for the organization’s managed devices, to unmanaged, remote devices.

• Employee Monitoring Systems monitor employees’ computers, e-mail activities, and Internet surfing activities.

Information Technology Foundations-BIT 112

62

Virtual Private Network and Tunneling

• Tunneling encrypts each data packet that is sent and places each encrypted packet inside another packet.

Information Technology Foundations-BIT 112

63

Popular Vulnerability Management Systems

Information Technology Foundations-BIT 112

64

Employee Monitoring System

• This image provides a demonstration of how an employee monitoring system looks to the network administrator. He or she sees the screens that everyone is on, and can “zoom in” on any one person’s screen.

Information Technology Foundations-BIT 112

65

Popular Employee Monitoring Systems

Information Technology Foundations-BIT 112

66

Finally…

Information Technology Foundations-BIT 112

67

Business Continuity Planning, Backup, and Recovery

• A Business Continuity Plan is also known as a Disaster Recovery Plan.

• Purpose is to keep the business operating after a disaster occurs. Three levels/types of continuity facilities:– A Hot Site is a fully configured computer facility, with all

services, communications links, and physical plant operations.

– A Warm Site provides many of the same services and options of the hot site, but it typically does not include the actual applications the company runs.

– A Cold Site provides only rudimentary services and facilities and so does not supply computer hardware or user workstations.

Information Technology Foundations-BIT 112

68

Information Systems Auditing

• Companies implement security controls to ensure that Systems are working properly. Independent or unbiased observers are tasked to “Audit”/examine the information systems, their inputs, outputs and processing.

• Types of Auditors and Audits– Internal. Performed by corporate internal auditors.– External. Reviews internal audit as well as the inputs,

processing and outputs of information systems.

Information Technology Foundations-BIT 112

69

Auditing Procedure

• Auditing around the computer – Means verifying processing by checking for known outputs

using specific inputs.

• Auditing through the computer – Means inputs, outputs and processing are checked.

Auditors review program logic and test data.

• Auditing with the computer – Means using a combination of client data, auditor software,

and client and auditor hardware. Allows the auditor to perform tasks such as simulating payroll program logic using live data.

Information Technology Foundations-BIT 112

70

Chapter Closing Case