topik 8

Chapter 8: Securing Information Systems

VIDEO CASES

  • Case 1: Stuxnet and Cyber Warfare

  • Case 2: Cyber Espionage: The Chinese Threat

  • Case 3: UBS Access Key: IBM Zone Trusted Information Channel

  • Instructional Video 1: Sony PlayStation Hacked; Data Stolen from 77 million users

  • Instructional Video 2: Zappos Working To Correct Online Security Breach

  • Instructional Video 3: Meet the Hackers: Anonymous Statement on Hacking SONY


Learning Objectives

  • Explain vulnerabilities of information systems to destruction, error, and abuse.

  • Describe the business value of security and control.

  • Outline components of an organizational security framework.

  • Identify tools and technologies for safeguarding information resources.


Cybersecurity Threats and Solutions for Organizations

MiniDuke Exposes EU Cybersecurity Gaps
  • Problem: Massive data breach with new sandbox-evading techniques.

  • Solution: Initiative for a common cybersecurity strategy, revealing the lack of centralized cybersecurity approaches.


System Vulnerability and Abuse

Overview of Security Measures
  • Security: Policies, procedures, and measures to prevent unauthorized access, alteration, theft, or damage.

  • Controls: Ensure safety of assets, accuracy of records, and adherence to management standards.


Why Systems are Vulnerable

  • Accessibility of networks.

  • Hardware issues (e.g., breakdowns, configuration errors).

  • Software problems (e.g., programming errors, unauthorized changes).

  • External disasters.

  • Loss and theft of portable devices.


Contemporary Security Challenges and Vulnerabilities

  • Client Communications: Unauthorized tapping, hacking, and data theft.

  • Hardware: Vulnerabilities from floods, fires, power failures.

Internet Vulnerabilities
  • Open networks and fixed Internet addresses present targets for hackers.

  • Risks associated with unencrypted communications (e.g., VOIP, emails).


Wireless Security Challenges

  • Radio frequency bands can be easily scanned.

  • SSIDs can be identified by sniffer programs, leading to unauthorized network access (war driving).


Types of Malware

  • Viruses: Attach themselves to other programs.

  • Worms: Independent programs that copy themselves over networks.

  • Trojan Horses: Malware disguised as legitimate software.

  • SQL Injection Attacks: Exploit vulnerable web forms to manipulate databases.

  • Ransomware: Encrypts user data and demands payment for decryption.

Impact of Malware
  • Malware can affect smartphones as well, with 13,000 types identified.

  • Spyware and Key Loggers: Monitor user activities and steal sensitive information.


Computer Crime and Cybersecurity Measures

  • Hackers vs. Crackers: Distinction between ethical hackers and malicious intruders.

  • Spoofing: Misrepresenting identity (e.g., fake emails).

  • Denial-of-Service Attacks (DoS): Overwhelm systems with requests to crash services.

  • Identity Theft: Stealing personal information to impersonate individuals.


Legal and Regulatory Frameworks for Security

  • HIPAA: Medical security and privacy regulation.

  • Gramm-Leach-Bliley Act: Security for financial customer data.

  • Sarbanes-Oxley Act: Companies must protect the integrity of their financial data.


Organizational Frameworks for Security and Control

  • Types of Controls: General (governing overall systems) and application-specific.

  • Risk Assessment: Evaluating the risk of specific activities and processes.

  • Security Policies: Setting acceptable security goals and user access levels.


Tools and Technologies for Safeguarding Information

  • Identity Management Software: Automates user tracking and privileges.

  • Firewalls: Combine hardware and software to prevent unauthorized access.

  • Intrusion Detection Systems: Monitor networks for ongoing attacks.


Encryption and Data Protection

  • Encryption Methods: Symmetric (shared key) and public key (two mathematically related keys) encryption.

  • Digital Certificates: Validate user identities for online transactions.


Future Considerations

  • Firms must stay vigilant about security threats and continuously assess their protocols.

  • Organizations need to prepare for mobile and cloud security challenges.

  • Implement disaster recovery and business continuity planning to ensure critical operations can resume after disruptions.