topik 8
Chapter 8: Securing Information Systems
VIDEO CASES
Case 1: Stuxnet and Cyber Warfare
Case 2: Cyber Espionage: The Chinese Threat
Case 3: UBS Access Key: IBM Zone Trusted Information Channel
Instructional Video 1: Sony PlayStation Hacked; Data Stolen from 77 million users
Instructional Video 2: Zappos Working To Correct Online Security Breach
Instructional Video 3: Meet the Hackers: Anonymous Statement on Hacking SONY
Learning Objectives
Explain vulnerabilities of information systems to destruction, error, and abuse.
Describe the business value of security and control.
Outline components of an organizational security framework.
Identify tools and technologies for safeguarding information resources.
Cybersecurity Threats and Solutions for Organizations
MiniDuke Exposes EU Cybersecurity Gaps
Problem: Massive data breach with new sandbox-evading techniques.
Solution: Initiative for a common cybersecurity strategy, revealing the lack of centralized cybersecurity approaches.
System Vulnerability and Abuse
Overview of Security Measures
Security: Policies, procedures, and measures to prevent unauthorized access, alteration, theft, or damage.
Controls: Ensure safety of assets, accuracy of records, and adherence to management standards.
Why Systems are Vulnerable
Accessibility of networks.
Hardware issues (e.g., breakdowns, configuration errors).
Software problems (e.g., programming errors, unauthorized changes).
External disasters.
Loss and theft of portable devices.
Contemporary Security Challenges and Vulnerabilities
Client Communications: Unauthorized tapping, hacking, and data theft.
Hardware: Vulnerabilities from floods, fires, power failures.
Internet Vulnerabilities
Open networks and fixed Internet addresses present targets for hackers.
Risks associated with unencrypted communications (e.g., VOIP, emails).
Wireless Security Challenges
Radio frequency bands can be easily scanned.
SSIDs can be identified by sniffer programs, leading to unauthorized network access (war driving).
Types of Malware
Viruses: Attach themselves to other programs.
Worms: Independent programs that copy themselves over networks.
Trojan Horses: Malware disguised as legitimate software.
SQL Injection Attacks: Exploit vulnerable web forms to manipulate databases.
Ransomware: Encrypts user data and demands payment for decryption.
Impact of Malware
Malware can affect smartphones as well, with 13,000 types identified.
Spyware and Key Loggers: Monitor user activities and steal sensitive information.
Computer Crime and Cybersecurity Measures
Hackers vs. Crackers: Distinction between ethical hackers and malicious intruders.
Spoofing: Misrepresenting identity (e.g., fake emails).
Denial-of-Service Attacks (DoS): Overwhelm systems with requests to crash services.
Identity Theft: Stealing personal information to impersonate individuals.
Legal and Regulatory Frameworks for Security
HIPAA: Medical security and privacy regulation.
Gramm-Leach-Bliley Act: Security for financial customer data.
Sarbanes-Oxley Act: Companies must protect the integrity of their financial data.
Organizational Frameworks for Security and Control
Types of Controls: General (governing overall systems) and application-specific.
Risk Assessment: Evaluating the risk of specific activities and processes.
Security Policies: Setting acceptable security goals and user access levels.
Tools and Technologies for Safeguarding Information
Identity Management Software: Automates user tracking and privileges.
Firewalls: Combine hardware and software to prevent unauthorized access.
Intrusion Detection Systems: Monitor networks for ongoing attacks.
Encryption and Data Protection
Encryption Methods: Symmetric (shared key) and public key (two mathematically related keys) encryption.
Digital Certificates: Validate user identities for online transactions.
Future Considerations
Firms must stay vigilant about security threats and continuously assess their protocols.
Organizations need to prepare for mobile and cloud security challenges.
Implement disaster recovery and business continuity planning to ensure critical operations can resume after disruptions.