SlideShare uma empresa Scribd logo
1 de 20
Baixar para ler offline
TECHNOLOGICAL
            SAFEGUARDS
•There are six commonly used methods in which
 technology is employed to safeguard information
 systems
PHYSICAL ACCESS
                  RESTRICTIONS
• Organizations can prevent unauthorized
  access to information systems by keeping
  stored information safe and allowing access
  only to those employees who need it to do
  their jobs.
• The most common form of authentication is
  the use of passwords, which are effective only
  if chosen carefully and changed frequently.
• Access is usually limited by making it
  dependent on one of the following:
    – Something You Have: Keys, picture identification
      cards, smart cards
    – Something You Know: passwords, PINs, answers
      to secret questions
    – Something You Are: fingerprints, voice patterns,
      biometrics
PHYSICAL ACCESS
                RESTRICTIONS
• Biometrics is a form of authentication used to govern access to
  systems, data, and/or facilities. With biometrics, employees may be
  identified by fingerprints, retinal patterns, or other bodily characteristics.
• A virtual private network (VPN) is a network connection that is
  constructed dynamically within an existing network—often called a secure
  tunnel—in order to connect users or nodes.
• The practice of creating an encrypted “tunnel” to send secure (private)
  data over the (public) Internet is known as tunneling.
FIREWALLS
ENCRYPTION
• When you do not have access to a secure
  channel for sending information over a wired
  or wireless network, encryption is the best bet
  for keeping snoopers out.
• Encryption is the process of encoding
  messages before they enter the network or
  airwaves, then decoding them at the receiving
  end of the transfer so that the intended
  recipients can read or hear them. The process
  works because if you scramble messages
  before you send them, eavesdroppers who
  might intercept them cannot decipher them
  without the decoding key.
• Implementing encryption on a large scale, such
  as on a busy Web site, requires a third party,
VIRUS MONITORING AND
           PREVENTION
• Purchase and install antivirus software, then update frequently to be sure
  you are protected against new viruses.
• Do not use flash drives, disks, or shareware from unknown or suspect
  sources and be equally careful when downloading material from the
  Internet, making sure that the source is reputable.
• Delete without opening any e-mail message received from an unknown
  source. Be especially wary of opening attachments.
• Do not blindly open e-mail attachments, even if they come from a known
  source. Many viruses are spread without the sender’s knowledge, so it is
  better to check with the sender before opening a potentially unsafe
  attachment.
• If your computer system contracts a virus, report the infection to your
  school or company’s IT department so that appropriate measures can be
  taken.
AUDIT-CONTROL SOFTWARE

• Audit-control software is used to keep track of
  computer activity so that auditors can spot
  suspicious activity and take action. Any user leaves
  electronic footprints that auditors can trace. Audit-
  control software helps creating an audit trail, a
  record showing who has used a computer system
  and how it was used.
SECURE DATA CENTERS
SECURE DATA CENTERS:
              SECURING THE FACILITIES
                 INFRASTRUCTURE
• Backup Sites – duplication. A cold backup site is nothing more than an
  empty warehouse with all necessary connections for power and
  communication but nothing else. In the case of a disaster, a company has to
  first set up all necessary equipment, ranging from office furniture to Web
  servers. A hot backup site is a fully equipped backup facility, having
  everything from office chairs to a one-to-one replication of the most
  current data. Further, hot backup sites also have a redundant backup of the
  data so that the business processes are interrupted as little as possible. To
  achieve this redundancy, all data are mirrored on separate servers.
• Redundant Data Centers – separation. Often, companies choose to
  replicate their data centers in multiple locations. Events such as a hurricane
  can damage systems that are located across town from each other. Thus,
  even if the primary infrastructure is located in-house, it pays to have a
  backup located in a different geographic area to minimize the risk of a
  disaster happening to both systems.
HUMAN SAFEGUARDS
• In addition to the technological safeguards, there are various
  human safeguards that can help to safeguard information
  systems, specifically ethics, laws, and effective management.
• Educating potential users at an early age as to what constitutes
  appropriate behavior can help, but unethical users will
  undoubtedly always remain a problem for those wanting to
  maintain IS security.
• Additionally, there are numerous federal and state laws against
  unauthorized use of networks and computer systems.
  Unfortunately, individuals who want unauthorized access to
  networks and computer systems usually find a way to exploit
  them; often, after the fact, laws are enacted to prohibit that activity
  in the future.
COMPUTER FORENSICS
• As computer crime has gone mainstream, law enforcement has had to
  become much more sophisticated in their computer crime investigations.
  Computer forensics is the use of formal investigative techniques to
  evaluate digital information for judicial review.
• Organizations and governments are increasingly utilizing honeypots to
  proactively gather intelligence to improve their defenses or to catch
  cybercriminals.
• A honeypot is a computer, data, or network site that is designed to be
  enticing to hackers so as to detect, deflect, or counteract illegal activity.
• Additionally, beyond human and technological safeguards, the quality of
  information security in any organization depends on effective
  management. Managers must continuously check for security problems,
  recognize that holes in security exist, and take appropriate action.
DEVELOPING AN IS SECURITY
• Risk Analysis.
                 PLAN
 – Determine the value of electronic information
 – Assess threats to confidentiality, integrity, and availability of
   information
 – Determine which computer operations are most vulnerable to
   security breaches
 – Assess current security policies
 – Recommend changes to existing practices and/or policies that
   will improve computer security
 –
DEVELOPING AN IS SECURITY
          PLAN
• Policies and Procedures. Once risks are assessed, a plan should be
  formulated that details what action will be taken if security is breached.
   – Information Policy. Outlines how sensitive information will be handled,
      stored, trans- mitted, and destroyed.
   – Security Policy. Explains technical controls on all organizational
      computer systems, such as access limitations, audit-control software,
      and firewalls.
   – Use Policy. Outlines the organization’s policy regarding appropriate use
      of in-house computer systems.
   – Backup Policy. Explains requirements for backing up information.
   – Account Management Policy. Lists procedures for adding new users to
      systems and removing users who have left the organization.
   – Incident Handling Procedures. Lists procedures to follow when
      handling a security breach.
   – Disaster Recovery Plan. Lists all the steps an organization will take to
      restore computer operations in case of a natural or deliberate disaster.
DISASTER PLANNING
DESIGNING THE RECOVERY
         PLAN
• When planning for disaster, two objectives should be considered
  by an organization: recovery time and recovery point objectives.
   – Recovery time objectives specify the maximum time allowed
      to recover from a catastrophic event. Having completely
      redundant systems minimizes the recovery time and are best
      suited for mission-critical applications, such as e-commerce
      transaction servers. For other applications, such as data
      mining, while important, the recovery time can be longer
      without disrupting primary business processes.
   – Recovery point objectives specify how current the backup
      data should be. Imagine that your computer’s hard drive
      crashes while you are working on a term paper. Luckily, you
      recently backed up your data. Would you prefer the last
      backup to be a few days old, or would you rather have the
      last backup include your most recent changes to the term
      paper? Having completely redundant systems that mirror the
      data helps to minimize (or even avoid) data loss in the event
      of a catastrophic failure.
RESPONDING TO A SECURITY
           BREACH
• Organizations that have developed a comprehensive IS security plan
  have the ability to rapidly respond to any type of security breach to
  their IS resources or to a natural disaster.
• In addition to restoring lost data using backups, common responses to
  a security breach include performing a new risk audit and
  implementing a combination of additional (more secure) safeguards.
• Additionally, when intruders are discovered, organizations can contact
  local law enforcement agencies and the FBI for assistance in locating
  and prosecuting them. Several online organizations issue bulletins to
  alert organizations and individuals to possible software vulnerabilities
  or attacks based on reports from organizations when security
  breaches occur.
THE STATE OF SYSTEMS SECURITY
             MANAGEMENT
• Financial fraud attacks result in the greatest
  financial losses for organizations; other significant
  costs were due to viruses, data theft,
  unauthorized access, and denial-of-service attacks.
• Relatively few organizations (about 29 percent)
  report computer intrusions to law enforcement
  because of various fears, such as how negative
  publicity would hurt stock values or how
  competitors might gain an advantage over news
  of a security incident.
• Most organizations do not outsource security
  activities.
• Nearly all organizations conduct routine and
  ongoing security audits.
• The majority of organizations believed security
  training of employees is important, but most
  respondents said their organization did not spend
  enough on security training.
INFORMATION SYSTEMS CONTROLS,
   AUDITING, AND THE SARBANES-
           OXLEY ACT
• Preventive controls
• Detective controls
• Corrective controls
IS AUDITING
• Analyzing the IS controls should be an ongoing process for organizations.
  However, often it can be beneficial for organizations to periodically have an
  external entity review the controls so as to uncover any potential
  problems.
• An information systems audit, often performed by external auditors, can
  help organizations assess the state of their IS controls to determine
  necessary changes and to help ensure the information systems’ availability,
  confidentiality, and integrity.
• The response to the strengths and weaknesses identified in the IS audit is
  often determined by the potential risks an organization faces. Testing all
  controls under all possible conditions is very inefficient and often
  infeasible. Thus, auditors frequently rely on computer-assisted auditing
  tools, or specific software that tests applications and data using test data or
  simulations.
• In addition to using specific auditing tools, auditors use audit sampling
  procedures to assess the controls, enabling the audit to be conducted in
  the most cost-effective manner. Once the audit has been performed and
  sufficient evidence has been gathered, reports are issued to the
  organization.
THE SARBANES-OXLEY ACT
• Another major factor that has contributed to a high demand for IS auditors
  is the need to comply with government regulations, most notably the
  Sarbanes-Oxley Act of 2002 (S-OX).
• Formed as a reaction to large-scale accounting scandals that led to the
  downfall of corporations such as WorldCom and Enron, S-OX addresses
  primarily the accounting side of organizations. According to S-OX,
  companies have to demonstrate that there are controls in place to prevent
  misuse or fraud, controls to detect any potential problems, and effective
  measures to correct any problems.
• The IS architecture plays a key role in S-OX compliance, given that many
  controls are IS based, providing capabilities to detect information exceptions
  and to provide a management trail for tracing exceptions. However, S-OX
  itself barely addresses IS controls specifically; rather, it addresses general
  processes and practices, leaving companies wondering how to comply with
  the guidelines put forth in the act.
• Failure to present such documents in the case of litigious activity can lead to
  severe fines being imposed on companies and their executives, and courts
  usually will not accept the argument that a message could not be located.

Mais conteúdo relacionado

Mais procurados

17 info sec_ma_imt_27_2_2012
17 info sec_ma_imt_27_2_201217 info sec_ma_imt_27_2_2012
17 info sec_ma_imt_27_2_2012RECIPA
 
Computer Security Policy
Computer Security PolicyComputer Security Policy
Computer Security Policyeverestsky66
 
Information security
Information security Information security
Information security razendar79
 
How to Build a Successful Incident Response Program
How to Build a Successful Incident Response ProgramHow to Build a Successful Incident Response Program
How to Build a Successful Incident Response ProgramResilient Systems
 
IT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John LadoIT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John LadoMark John Lado, MIT
 
GRRCON 2013: Imparting security awareness to all levels of users
GRRCON 2013: Imparting security awareness to all levels of usersGRRCON 2013: Imparting security awareness to all levels of users
GRRCON 2013: Imparting security awareness to all levels of usersJoel Cardella
 
Computing safety
Computing safetyComputing safety
Computing safetytitoferrus
 
The Datacenter Security Continuum
The Datacenter Security ContinuumThe Datacenter Security Continuum
The Datacenter Security ContinuumMartin Hingley
 
A Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOsA Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOsgppcpa
 
Cyber Security Awareness Month 2017- Nugget2
Cyber Security Awareness Month 2017- Nugget2Cyber Security Awareness Month 2017- Nugget2
Cyber Security Awareness Month 2017- Nugget2Chinatu Uzuegbu
 
Security Awareness and Training
Security Awareness and TrainingSecurity Awareness and Training
Security Awareness and TrainingPriyank Hada
 
Cyber Security and Healthcare
Cyber Security and HealthcareCyber Security and Healthcare
Cyber Security and HealthcareJonathon Coulter
 

Mais procurados (20)

17 info sec_ma_imt_27_2_2012
17 info sec_ma_imt_27_2_201217 info sec_ma_imt_27_2_2012
17 info sec_ma_imt_27_2_2012
 
Computer Security Policy
Computer Security PolicyComputer Security Policy
Computer Security Policy
 
Incident response process
Incident response processIncident response process
Incident response process
 
Information security
Information security Information security
Information security
 
How to Build a Successful Incident Response Program
How to Build a Successful Incident Response ProgramHow to Build a Successful Incident Response Program
How to Build a Successful Incident Response Program
 
IT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John LadoIT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John Lado
 
SEC440: Incident Response Plan
SEC440: Incident Response PlanSEC440: Incident Response Plan
SEC440: Incident Response Plan
 
Secuntialesse
SecuntialesseSecuntialesse
Secuntialesse
 
Lesson 2
Lesson 2Lesson 2
Lesson 2
 
Information security.pptx
Information security.pptxInformation security.pptx
Information security.pptx
 
Healthcare Cyber Security Webinar
Healthcare Cyber Security WebinarHealthcare Cyber Security Webinar
Healthcare Cyber Security Webinar
 
Security analysis
Security analysisSecurity analysis
Security analysis
 
GRRCON 2013: Imparting security awareness to all levels of users
GRRCON 2013: Imparting security awareness to all levels of usersGRRCON 2013: Imparting security awareness to all levels of users
GRRCON 2013: Imparting security awareness to all levels of users
 
Computing safety
Computing safetyComputing safety
Computing safety
 
The Datacenter Security Continuum
The Datacenter Security ContinuumThe Datacenter Security Continuum
The Datacenter Security Continuum
 
A Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOsA Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOs
 
Cyber Security Awareness Month 2017- Nugget2
Cyber Security Awareness Month 2017- Nugget2Cyber Security Awareness Month 2017- Nugget2
Cyber Security Awareness Month 2017- Nugget2
 
Insider threat kill chain
Insider threat   kill chainInsider threat   kill chain
Insider threat kill chain
 
Security Awareness and Training
Security Awareness and TrainingSecurity Awareness and Training
Security Awareness and Training
 
Cyber Security and Healthcare
Cyber Security and HealthcareCyber Security and Healthcare
Cyber Security and Healthcare
 

Destaque

Chapter 10, part 2
Chapter 10, part 2Chapter 10, part 2
Chapter 10, part 2misecho
 
Chapter 10, part 3
Chapter 10, part 3Chapter 10, part 3
Chapter 10, part 3misecho
 
Maeve mis presentation
Maeve mis presentationMaeve mis presentation
Maeve mis presentationmisecho
 
Chapter 10, part 3
Chapter 10, part 3Chapter 10, part 3
Chapter 10, part 3misecho
 
Echo p.410 422 ch 10, irina
Echo p.410 422 ch 10, irinaEcho p.410 422 ch 10, irina
Echo p.410 422 ch 10, irinamisecho
 

Destaque (7)

Chapter 10, part 2
Chapter 10, part 2Chapter 10, part 2
Chapter 10, part 2
 
Chapter 10, part 3
Chapter 10, part 3Chapter 10, part 3
Chapter 10, part 3
 
Maeve mis presentation
Maeve mis presentationMaeve mis presentation
Maeve mis presentation
 
Chapter 10, part 3
Chapter 10, part 3Chapter 10, part 3
Chapter 10, part 3
 
Echo p.410 422 ch 10, irina
Echo p.410 422 ch 10, irinaEcho p.410 422 ch 10, irina
Echo p.410 422 ch 10, irina
 
Mis
MisMis
Mis
 
Mis 2101 Questions
Mis 2101 QuestionsMis 2101 Questions
Mis 2101 Questions
 

Semelhante a Chapter 10, part 1

security and system mainatance
security and system mainatancesecurity and system mainatance
security and system mainatanceKudzi Chikwatu
 
Ch15 power point
Ch15 power pointCh15 power point
Ch15 power pointbodo-con
 
Chapter 13
Chapter 13Chapter 13
Chapter 13bodo-con
 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security conceptsG Prachi
 
FBI Memo on How to Protect Yourself from Ransomware
FBI Memo on How to Protect Yourself from RansomwareFBI Memo on How to Protect Yourself from Ransomware
FBI Memo on How to Protect Yourself from RansomwareDavid Sweigert
 
LESSON_3_Maintain_Computer_Equipment_and_Systems.pptx
LESSON_3_Maintain_Computer_Equipment_and_Systems.pptxLESSON_3_Maintain_Computer_Equipment_and_Systems.pptx
LESSON_3_Maintain_Computer_Equipment_and_Systems.pptxmahaliacaraan
 
In computer security, a vulnerability is a weakness which allows an .pdf
In computer security, a vulnerability is a weakness which allows an .pdfIn computer security, a vulnerability is a weakness which allows an .pdf
In computer security, a vulnerability is a weakness which allows an .pdfanandanand521251
 
Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)Cyber Security Infotech
 
Security & control in management information system
Security & control in management information systemSecurity & control in management information system
Security & control in management information systemOnline
 
Network security, change control, outsourcing
Network security, change control, outsourcingNetwork security, change control, outsourcing
Network security, change control, outsourcingNicholas Davis
 
Network Security, Change Control, Outsourcing
Network Security, Change Control, OutsourcingNetwork Security, Change Control, Outsourcing
Network Security, Change Control, OutsourcingNicholas Davis
 
Chapter_5_Security_CC.pptx
Chapter_5_Security_CC.pptxChapter_5_Security_CC.pptx
Chapter_5_Security_CC.pptxLokNathRegmi1
 
How Medical Devices Risk Patient Safety and Security
How Medical Devices Risk Patient Safety and SecurityHow Medical Devices Risk Patient Safety and Security
How Medical Devices Risk Patient Safety and SecurityGreat Bay Software
 
Seguridad web -articulo completo- ingles
Seguridad web -articulo completo- inglesSeguridad web -articulo completo- ingles
Seguridad web -articulo completo- inglesisidro luna beltran
 
Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1Anpumathews
 
Fundamentals of-information-security
Fundamentals of-information-security Fundamentals of-information-security
Fundamentals of-information-security madunix
 

Semelhante a Chapter 10, part 1 (20)

security and system mainatance
security and system mainatancesecurity and system mainatance
security and system mainatance
 
Ch15 power point
Ch15 power pointCh15 power point
Ch15 power point
 
Chapter 13
Chapter 13Chapter 13
Chapter 13
 
Presentation 10.pptx
Presentation 10.pptxPresentation 10.pptx
Presentation 10.pptx
 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security concepts
 
FBI Memo on How to Protect Yourself from Ransomware
FBI Memo on How to Protect Yourself from RansomwareFBI Memo on How to Protect Yourself from Ransomware
FBI Memo on How to Protect Yourself from Ransomware
 
Unit v
Unit vUnit v
Unit v
 
LESSON_3_Maintain_Computer_Equipment_and_Systems.pptx
LESSON_3_Maintain_Computer_Equipment_and_Systems.pptxLESSON_3_Maintain_Computer_Equipment_and_Systems.pptx
LESSON_3_Maintain_Computer_Equipment_and_Systems.pptx
 
In computer security, a vulnerability is a weakness which allows an .pdf
In computer security, a vulnerability is a weakness which allows an .pdfIn computer security, a vulnerability is a weakness which allows an .pdf
In computer security, a vulnerability is a weakness which allows an .pdf
 
Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)
 
Security & control in management information system
Security & control in management information systemSecurity & control in management information system
Security & control in management information system
 
Network security, change control, outsourcing
Network security, change control, outsourcingNetwork security, change control, outsourcing
Network security, change control, outsourcing
 
Computer security
Computer securityComputer security
Computer security
 
security in is.pptx
security in is.pptxsecurity in is.pptx
security in is.pptx
 
Network Security, Change Control, Outsourcing
Network Security, Change Control, OutsourcingNetwork Security, Change Control, Outsourcing
Network Security, Change Control, Outsourcing
 
Chapter_5_Security_CC.pptx
Chapter_5_Security_CC.pptxChapter_5_Security_CC.pptx
Chapter_5_Security_CC.pptx
 
How Medical Devices Risk Patient Safety and Security
How Medical Devices Risk Patient Safety and SecurityHow Medical Devices Risk Patient Safety and Security
How Medical Devices Risk Patient Safety and Security
 
Seguridad web -articulo completo- ingles
Seguridad web -articulo completo- inglesSeguridad web -articulo completo- ingles
Seguridad web -articulo completo- ingles
 
Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1
 
Fundamentals of-information-security
Fundamentals of-information-security Fundamentals of-information-security
Fundamentals of-information-security
 

Último

QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
Français Patch Tuesday - Avril
Français Patch Tuesday - AvrilFrançais Patch Tuesday - Avril
Français Patch Tuesday - AvrilIvanti
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...Karmanjay Verma
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Kuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialKuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialJoão Esperancinha
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessWSO2
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsYoss Cohen
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFMichael Gough
 
WomenInAutomation2024: AI and Automation for eveyone
WomenInAutomation2024: AI and Automation for eveyoneWomenInAutomation2024: AI and Automation for eveyone
WomenInAutomation2024: AI and Automation for eveyoneUiPathCommunity
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...amber724300
 

Último (20)

QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
Français Patch Tuesday - Avril
Français Patch Tuesday - AvrilFrançais Patch Tuesday - Avril
Français Patch Tuesday - Avril
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Kuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialKuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorial
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with Platformless
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platforms
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDF
 
WomenInAutomation2024: AI and Automation for eveyone
WomenInAutomation2024: AI and Automation for eveyoneWomenInAutomation2024: AI and Automation for eveyone
WomenInAutomation2024: AI and Automation for eveyone
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
 

Chapter 10, part 1

  • 1. TECHNOLOGICAL SAFEGUARDS •There are six commonly used methods in which technology is employed to safeguard information systems
  • 2. PHYSICAL ACCESS RESTRICTIONS • Organizations can prevent unauthorized access to information systems by keeping stored information safe and allowing access only to those employees who need it to do their jobs. • The most common form of authentication is the use of passwords, which are effective only if chosen carefully and changed frequently. • Access is usually limited by making it dependent on one of the following: – Something You Have: Keys, picture identification cards, smart cards – Something You Know: passwords, PINs, answers to secret questions – Something You Are: fingerprints, voice patterns, biometrics
  • 3. PHYSICAL ACCESS RESTRICTIONS • Biometrics is a form of authentication used to govern access to systems, data, and/or facilities. With biometrics, employees may be identified by fingerprints, retinal patterns, or other bodily characteristics. • A virtual private network (VPN) is a network connection that is constructed dynamically within an existing network—often called a secure tunnel—in order to connect users or nodes. • The practice of creating an encrypted “tunnel” to send secure (private) data over the (public) Internet is known as tunneling.
  • 5. ENCRYPTION • When you do not have access to a secure channel for sending information over a wired or wireless network, encryption is the best bet for keeping snoopers out. • Encryption is the process of encoding messages before they enter the network or airwaves, then decoding them at the receiving end of the transfer so that the intended recipients can read or hear them. The process works because if you scramble messages before you send them, eavesdroppers who might intercept them cannot decipher them without the decoding key. • Implementing encryption on a large scale, such as on a busy Web site, requires a third party,
  • 6. VIRUS MONITORING AND PREVENTION • Purchase and install antivirus software, then update frequently to be sure you are protected against new viruses. • Do not use flash drives, disks, or shareware from unknown or suspect sources and be equally careful when downloading material from the Internet, making sure that the source is reputable. • Delete without opening any e-mail message received from an unknown source. Be especially wary of opening attachments. • Do not blindly open e-mail attachments, even if they come from a known source. Many viruses are spread without the sender’s knowledge, so it is better to check with the sender before opening a potentially unsafe attachment. • If your computer system contracts a virus, report the infection to your school or company’s IT department so that appropriate measures can be taken.
  • 7. AUDIT-CONTROL SOFTWARE • Audit-control software is used to keep track of computer activity so that auditors can spot suspicious activity and take action. Any user leaves electronic footprints that auditors can trace. Audit- control software helps creating an audit trail, a record showing who has used a computer system and how it was used.
  • 9. SECURE DATA CENTERS: SECURING THE FACILITIES INFRASTRUCTURE • Backup Sites – duplication. A cold backup site is nothing more than an empty warehouse with all necessary connections for power and communication but nothing else. In the case of a disaster, a company has to first set up all necessary equipment, ranging from office furniture to Web servers. A hot backup site is a fully equipped backup facility, having everything from office chairs to a one-to-one replication of the most current data. Further, hot backup sites also have a redundant backup of the data so that the business processes are interrupted as little as possible. To achieve this redundancy, all data are mirrored on separate servers. • Redundant Data Centers – separation. Often, companies choose to replicate their data centers in multiple locations. Events such as a hurricane can damage systems that are located across town from each other. Thus, even if the primary infrastructure is located in-house, it pays to have a backup located in a different geographic area to minimize the risk of a disaster happening to both systems.
  • 10. HUMAN SAFEGUARDS • In addition to the technological safeguards, there are various human safeguards that can help to safeguard information systems, specifically ethics, laws, and effective management. • Educating potential users at an early age as to what constitutes appropriate behavior can help, but unethical users will undoubtedly always remain a problem for those wanting to maintain IS security. • Additionally, there are numerous federal and state laws against unauthorized use of networks and computer systems. Unfortunately, individuals who want unauthorized access to networks and computer systems usually find a way to exploit them; often, after the fact, laws are enacted to prohibit that activity in the future.
  • 11. COMPUTER FORENSICS • As computer crime has gone mainstream, law enforcement has had to become much more sophisticated in their computer crime investigations. Computer forensics is the use of formal investigative techniques to evaluate digital information for judicial review. • Organizations and governments are increasingly utilizing honeypots to proactively gather intelligence to improve their defenses or to catch cybercriminals. • A honeypot is a computer, data, or network site that is designed to be enticing to hackers so as to detect, deflect, or counteract illegal activity. • Additionally, beyond human and technological safeguards, the quality of information security in any organization depends on effective management. Managers must continuously check for security problems, recognize that holes in security exist, and take appropriate action.
  • 12. DEVELOPING AN IS SECURITY • Risk Analysis. PLAN – Determine the value of electronic information – Assess threats to confidentiality, integrity, and availability of information – Determine which computer operations are most vulnerable to security breaches – Assess current security policies – Recommend changes to existing practices and/or policies that will improve computer security –
  • 13. DEVELOPING AN IS SECURITY PLAN • Policies and Procedures. Once risks are assessed, a plan should be formulated that details what action will be taken if security is breached. – Information Policy. Outlines how sensitive information will be handled, stored, trans- mitted, and destroyed. – Security Policy. Explains technical controls on all organizational computer systems, such as access limitations, audit-control software, and firewalls. – Use Policy. Outlines the organization’s policy regarding appropriate use of in-house computer systems. – Backup Policy. Explains requirements for backing up information. – Account Management Policy. Lists procedures for adding new users to systems and removing users who have left the organization. – Incident Handling Procedures. Lists procedures to follow when handling a security breach. – Disaster Recovery Plan. Lists all the steps an organization will take to restore computer operations in case of a natural or deliberate disaster.
  • 15. DESIGNING THE RECOVERY PLAN • When planning for disaster, two objectives should be considered by an organization: recovery time and recovery point objectives. – Recovery time objectives specify the maximum time allowed to recover from a catastrophic event. Having completely redundant systems minimizes the recovery time and are best suited for mission-critical applications, such as e-commerce transaction servers. For other applications, such as data mining, while important, the recovery time can be longer without disrupting primary business processes. – Recovery point objectives specify how current the backup data should be. Imagine that your computer’s hard drive crashes while you are working on a term paper. Luckily, you recently backed up your data. Would you prefer the last backup to be a few days old, or would you rather have the last backup include your most recent changes to the term paper? Having completely redundant systems that mirror the data helps to minimize (or even avoid) data loss in the event of a catastrophic failure.
  • 16. RESPONDING TO A SECURITY BREACH • Organizations that have developed a comprehensive IS security plan have the ability to rapidly respond to any type of security breach to their IS resources or to a natural disaster. • In addition to restoring lost data using backups, common responses to a security breach include performing a new risk audit and implementing a combination of additional (more secure) safeguards. • Additionally, when intruders are discovered, organizations can contact local law enforcement agencies and the FBI for assistance in locating and prosecuting them. Several online organizations issue bulletins to alert organizations and individuals to possible software vulnerabilities or attacks based on reports from organizations when security breaches occur.
  • 17. THE STATE OF SYSTEMS SECURITY MANAGEMENT • Financial fraud attacks result in the greatest financial losses for organizations; other significant costs were due to viruses, data theft, unauthorized access, and denial-of-service attacks. • Relatively few organizations (about 29 percent) report computer intrusions to law enforcement because of various fears, such as how negative publicity would hurt stock values or how competitors might gain an advantage over news of a security incident. • Most organizations do not outsource security activities. • Nearly all organizations conduct routine and ongoing security audits. • The majority of organizations believed security training of employees is important, but most respondents said their organization did not spend enough on security training.
  • 18. INFORMATION SYSTEMS CONTROLS, AUDITING, AND THE SARBANES- OXLEY ACT • Preventive controls • Detective controls • Corrective controls
  • 19. IS AUDITING • Analyzing the IS controls should be an ongoing process for organizations. However, often it can be beneficial for organizations to periodically have an external entity review the controls so as to uncover any potential problems. • An information systems audit, often performed by external auditors, can help organizations assess the state of their IS controls to determine necessary changes and to help ensure the information systems’ availability, confidentiality, and integrity. • The response to the strengths and weaknesses identified in the IS audit is often determined by the potential risks an organization faces. Testing all controls under all possible conditions is very inefficient and often infeasible. Thus, auditors frequently rely on computer-assisted auditing tools, or specific software that tests applications and data using test data or simulations. • In addition to using specific auditing tools, auditors use audit sampling procedures to assess the controls, enabling the audit to be conducted in the most cost-effective manner. Once the audit has been performed and sufficient evidence has been gathered, reports are issued to the organization.
  • 20. THE SARBANES-OXLEY ACT • Another major factor that has contributed to a high demand for IS auditors is the need to comply with government regulations, most notably the Sarbanes-Oxley Act of 2002 (S-OX). • Formed as a reaction to large-scale accounting scandals that led to the downfall of corporations such as WorldCom and Enron, S-OX addresses primarily the accounting side of organizations. According to S-OX, companies have to demonstrate that there are controls in place to prevent misuse or fraud, controls to detect any potential problems, and effective measures to correct any problems. • The IS architecture plays a key role in S-OX compliance, given that many controls are IS based, providing capabilities to detect information exceptions and to provide a management trail for tracing exceptions. However, S-OX itself barely addresses IS controls specifically; rather, it addresses general processes and practices, leaving companies wondering how to comply with the guidelines put forth in the act. • Failure to present such documents in the case of litigious activity can lead to severe fines being imposed on companies and their executives, and courts usually will not accept the argument that a message could not be located.

Notas do Editor

  1. \n
  2. \n
  3. \n
  4. \n
  5. \n
  6. \n
  7. \n
  8. \n
  9. \n
  10. \n
  11. \n
  12. \n
  13. \n
  14. \n
  15. \n
  16. \n
  17. \n
  18. \n
  19. \n
  20. \n