Q5: How can technical safeguards protect against security threats?. Q6: How can data safeguards protect against security threats?. Q7: How can human safeguards protect against security t
Trang 1Information Security Management
Chapter 10
Trang 2“But How Do You Implement That Security?”
Trang 3PRIDE Design for Security
Trang 4Study Questions
Q1: What is the goal of information systems security?
Q2: How big is the computer security problem?
Q3: How should you respond to security threats?
Q4: How should organizations respond to security threats?
Q5: How can technical safeguards protect against security threats?
Q6: How can data safeguards protect against security threats?
Q7: How can human safeguards protect against security threats?
Q8: How should organizations respond to security incidents?
Trang 5Q1: What Is the Goal of Information Systems Security?
Trang 6Examples of Threat/Loss
Trang 7What Are the Sources of Threats?
Trang 8What Types of Security Loss Exists?
Trang 9Incorrect Data Modification
Trang 10Faulty Service
•
Trang 11Loss of Infrastructure
• Advanced Persistent Threat (APT)
Trang 12well-Goal of Information Systems Security
• Find appropriate trade-off between risk of loss and cost of implementing safeguards
• Use antivirus software
• Deleting browser cookies?
• Get in front of security problem by making appropriate trade-offs for your life and your business
Trang 13Q2: How Big Is the Computer Security Problem?
Computer Crime Costs per Organizational Respondent
Trang 14Average Computer Crime Cost and Percent of Attacks by Type (5 Most Expensive
Types)
Trang 15Computer Crime Costs
Trang 16Ponemon Study Findings (2013)
costs in 2013
Trang 17Ponemon 2013 Studies Summary
• Security safeguards work
• Ponemon Study 2014
Trang 18Q3: How Should You Respond to Security Threats?
Personal Security Safeguards
Trang 19So What? The Latest from Black Hat
government entities
to ATMs
developers, manufacturers, and government agencies
Trang 20Q4: How Should Organizations Respond to Security Threats?
Trang 21Security Policy Should Stipulate
• What sensitive data the organization will store
• How it will process that data
• Whether data will be shared with other organizations
• How employees and others can obtain copies of data stored about them
• How employees and others can request changes to inaccurate data
• What employees can do with their own mobile devices at work
As a new hire, seek out your employer’s security policy
Trang 22Ethics Guide: Securing Privacy
“The best way to solve a problem is not to have it.”
– Resist providing sensitive data
– Don’t collect data you don’t need
• Gramm-Leach-Bliley (GLB) Act, 1999
• Privacy Act of 1974
• Health Insurance Portability and Accountability Act (HIPAA), 1996
• Australian Privacy Act of 1988
– Government, healthcare data, records maintained by businesses with revenues in excess of AU$3
Trang 23Ethics Guide: Securing Privacy: Wrap Up
request, store, or disseminate data
Trang 24Q5: How Can Technical Safeguards Protect Against Security Threats?
Trang 25Essence of https (SSL or TLS)
Trang 26Use of Multiple Firewalls
Trang 27Malware Protection
Trang 28Malware Types and Spyware and Adware Symptoms
Trang 29Design for Secure Applications
• SQL injection attack
Trang 30Q6: How Can Data Safeguards Protect Against Security Threats?
Trang 31Q7: How Can Human Safeguards Protect Against Security Threats?
Trang 32Q7: How Can Human Safeguards Protect Against Security Threats? (cont' d)
Trang 34Sample Account Acknowledgment Form
Trang 35Systems Procedures
Trang 36Q8: How Should Organizations Respond to Security Incidents?
Trang 37Security Wrap Up
employee
Trang 38Q9: 2025
security
individuals
Trang 39Guide: A Look through NSA’s PRISM
• Nine of the largest Internet services (Google, Microsoft, Yahoo!, Facebook, PalTalk, YouTube, Skype, AOL, and Apple)
participate in PRISM program
• Dates when PRISM began collecting data from each of these services
• Types of data collected include email, videos, photos, video and voice chat, file transfers, VoIP, stored data, videoconferencing,
login activity, social networking activity, and something called “special requests”
• How information flows from around the world could be collected
• How data flowed from service provider to NSA, CIA, or FBI
• http://www.wired.com/2013/06/snowden-powerpoint/#slideid-522485
Trang 40Trade Offs
– "Freedom is Slavery" (G Orwell, 1984)
– Users frustrated with stringent password policies
– Firewalls block users from remotely accessing certain resources
– Managers can’t access certain data without special permission
Trang 41Wrap Up
Trang 42Guide: Phishing for Credit Cards, Identifying Numbers, Bank Accounts
Trang 43Wrap Up
Trang 44Active Review
Q1: What is the goal of information systems security?
Q2: How big is the computer security problem?
Q3: How should you respond to security threats?
Q4: How should organizations respond to security threats?
Q5: How can technical safeguards protect against security threats?
Q6: How can data safeguards protect against security threats?
Q7: How can human safeguards protect against security threats?
Q8: How should organizations respond to security incidents?
Trang 45Case 10: Hitting the Target
included names, emails, addresses, phone numbers, and so on
Trang 46How Did They Do
Trojan.POSRAM extracted data from POS terminals
Trang 47premiums, paid legal fees, settled with credit card processors, paid consumer credit monitoring, and paid regulatory fines
Trang 48Damage (cont'd)
• Target loss of customer confidence and drop in revenues (46% loss for quarter).
• Analysts put direct loss to Target as high at $450 million
• CIO resigned, CEO paid $16 million to leave
• Cost credit unions and banks more than $200 million to issue new cards
• Insurers demand higher premiums, stricter controls, and more system auditing
• Consumers must watch their credit card statements, and fill out paperwork if fraudulent charges appear