Module title: Protecting Information Resources
Reference: Bidgoli, MIS, 11th Edition.
5.1 Explain cybercrime and its impact on the global economy.
5.2 Describe information technologies that could be used in computer crimes.
5.3 Describe basic safeguards in computer, network, and cyber security.
5.4 Identify the ten most common intentional security threats.
5.5 Describe the nine security measures and enforcement that a comprehensive security system should include.
5.6 Summarize the guidelines for a comprehensive security system, including business continuity planning.
Information technologies can invade privacy and commit crimes.
Prevention measures:
Regular OS updates.
Use antivirus and antispyware software.
Utilize e-mail security features.
Projected cost of cybercrime: $10.5 trillion annually by 2025 (Cybersecurity Ventures).
Cost factors include:
Loss of revenue.
Stolen identities and intellectual property.
Damage to reputations.
Cost of enhancing cybersecurity.
Loss of business information.
Spyware:
Gathers information about users.
Can alter computer settings.
Prevention through antivirus or antispyware software.
Adware:
Collects user information to display targeted ads.
Prevented by using ad-blocking features.
Phishing:
Fraudulent emails mimicking legitimate sources.
Spear Phishing:
Targeted phishing attacks.
Pharming:
Hijacking official websites to redirect users.
Baiting:
Offers of free items to lure users into traps.
Quid Pro Quo:
Exchange of sensitive info for a service.
SMiShing:
SMS phishing to download malware.
Vishing:
Voice technology used to acquire sensitive info.
Software or hardware that records keystrokes.
Used legally for employee monitoring and maliciously for stealing data.
Prevention: Use antivirus and antispyware programs.
Sniffing:
Capturing network traffic by hackers.
Spoofing:
Posing as authorized users to access sensitive information.
Computer fraud: Unauthorized use of computer data for personal benefit.
Examples of computer crimes:
Denial-of-service attacks.
Identity theft.
Software piracy.
Spreading viruses and malware.
Sabotage.
Goals of a comprehensive security system:
Protect organizational resources.
Components include:
Hardware, Software, Procedures, Personnel.
Confidentiality: Information only disclosed to authorized users.
Integrity: Accuracy of information resources.
Availability: Access to information and recovery from failure.
McCumber Cube (Overview not included).
Evaluates information security across nine characteristics.
Considers different states: Transmission, Storage, Processing.
Level 1: Front-end servers (e-mail and web servers).
Level 2: Back-end systems (workstations).
Level 3: Corporate network (intrusion protection).
Design fault-tolerant systems to ensure availability during failures.
Common methods include:
Uninterruptible power supply (UPS).
Redundant array of independent disks (RAID).
Mirror disks.
Question regarding the first level of network security.
Answer: Public web server is the first level of network security, protecting front-end servers.
Viruses: Self-propagating code triggered by events.
Worms: Spread independently without a host program.
Trojan Programs: Hidden harmful code in popular software.
Logic Bombs: Trigger cross-program harmful actions.
Backdoors (Trapdoors): Allow bypassing security protocols.
Blended Threats: Combine features of various malicious codes.
Rootkits: Groups of tools for unauthorized access.
Denial-of-Service (DoS) Attacks: Flood systems to disrupt operations.
Distributed DoS (DDoS): Multiple systems cooperating for attacks.
Botnet: Group of infected devices under control.
Social Engineering: Manipulating individuals to disclose private info.
Cryptojacking: Utilizing victim's computer power for mining.
Types of security measures include:
Biometric, Non-biometric, Physical measures.
Access controls.
Virtual private networks.
Data encryption.
CERT involvement.
Unique physiological traits used for security.
Examples: Facial recognition, fingerprints, iris analysis.
Three main types:
Callback modems.
Firewalls.
Intrusion detection systems.
Verify user access by calling back the user post-logoff.
Act as a filter between networks.
Types include:
Packet-filtering.
Application-filtering.
Proxy servers.
Basic Firewall Configuration (Overview not included).
Proxy Server (Overview not included).
Protect against access and identify attack signatures.
Control physical access to systems.
Includes:
Cable locks, ID badges, room shielding.
Designed to protect from unauthorized access and maintain data integrity.
Terminal security erases screens after inactivity.
Password requirements for system access.
Password Managers: Generate and encrypt passwords.
Other security techniques include zero login and biometric identification.
Provide secure message transmission via encryption.
Advantages and disadvantages discussed.
Transforms plaintext into ciphertext using encryption algorithms.
Common protocols: SSL, TLS.
Public Key Infrastructure (PKI): Enables secure data exchange using trust-based keys.
Asymmetric vs. Symmetric encryption explained.
Address confidentiality, authentication, integrity, and nonrepudiation.
Developed by DARPA; focuses on security breaches and attack prevention.
Requires verification for all access, with principles like least-privilege access and MFA.
Question regarding secure data transmission methods.
Answer: Use a virtual private network (VPN) for secure transmission.
Steps for developing a plan:
Form a security committee.
Raise employee awareness.
Maintain strong passwords and software updates.
Additional steps include:
Lock sensitive information.
Employ antivirus and firewalls.
Further steps:
Maintain fire protection measures.
Implement zero-trust practices.
Outlines procedures for maintaining operations during disasters.
Additional preparation tasks discussed.
Steps for resuming operations after a disaster.
Questions posed regarding security measures and challenges in implementing a security plan.
Recap of the module objectives presented.
Continued recap of module objectives.