🎧 New: AI-Generated Podcasts Turn your study notes into engaging audio conversations. Learn more

Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...

Full Transcript

CHAPTER 1 Information Systems Security Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com. Learning Objective(s) and Key Concepts Learning Objective(s) Key Concepts...

CHAPTER 1 Information Systems Security Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com. Learning Objective(s) and Key Concepts Learning Objective(s) Key Concepts Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com  Explain information systems  Information systems security security and its effect on people concepts and businesses.  Confidentiality, integrity, and availability (C-I-A)  The seven domains of an IT infrastructure  The weakest link in the security of an IT infrastructure  IT security policy framework and data classification standard Information Systems Security (1 of 3)  Internet  A worldwide network with approximately 5 billion users Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com  Includes governments, businesses, and organizations  Links communication networks to one another  World Wide Web  A system that defines how documents and resources are related across a network of computers Information Systems Security (2 of 3)  First American Financial Corporation, 2019  885 million users had sensitive personal financial data leaked Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com  Hackers were able to extract data  Customers were at a higher risk of identity theft because personal financial data was breached  FireEye, 2020  Its penetration testing tools were stolen  Tools could be used to maliciously hack into companies Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com Cyberspace: The New Frontier Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com TCP/IP Communications Are in Cleartext Information Systems Security (3 of 3)  Internet of Things (IoT) connects personal devices, home devices, and vehicles to the Internet Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com  More data to steal  Cybersecurity is duty of every government that wants to ensure its national security  Data security is the responsibility of every organization that needs to protect its information assets and sensitive data Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com IoT Risks, Threats, and Vulnerabilities  Risk  The level of exposure to some event that has an effect on an asset Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com  Threat  Any action, either natural or human induced, that could damage an asset  Vulnerability  A weakness that allows a threat to be realized or to have an effect on an asset What Is Information Systems Security?  Information system  Hardware, operating system, and application software that work together to collect, Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com process, and store data for individuals and organizations  Security  Being free from danger or risk  Information systems security  The collection of activities that protect the information system and the data stored in it Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com What Are We Securing? Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com Compliance Laws and Regulations Drive the Need for Information Systems Security Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com Tenets of Information Security Confidentiality (1 of 2) Confidential information includes: Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com  Private data of individuals  Intellectual property of businesses  National security for countries and governments Confidentiality (2 of 2)  Cryptography  Practice of hiding data and keeping it away from unauthorized users Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com  Encryption  The process of transforming data from cleartext into ciphertext  Ciphertext  The scrambled data that results from encrypting cleartext Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com Encryption of Cleartext into Ciphertext Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com accurate information  Maintain valid and Integrity Availability  In the context of information security  The amount of time users can use a system, application, and data Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com Availability Time Measurements  Uptime Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com  Downtime  Availability [A = (Total Uptime)/(Total Uptime + Total Downtime)]  Mean time to failure (MTTF)  Mean time to repair (MTTR)  Mean time between failures (MTBF)  Recovery point objective (RPO)  Recovery time objective (RTO) Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com Seven Domains of a Typical IT Infrastructure User Domain  Roles and tasks  Users can access systems, applications, and data depending upon their defined Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com access rights  Responsibilities  Employees are responsible for their use of IT assets  Accountability  Human resources department is accountable for implementing proper employee background checks Common Threats in the User Domain  Unauthorized access  User destroying systems, applications, and data Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com  Lack of user awareness  Disgruntled employee attacking  User apathy toward policies organization or committing  Security policy violations sabotage  User inserting CD/DVD/USB with  Employee romance gone bad personal files  Employee blackmail or extortion  User downloading photos, music, or videos Workstation Domain  Roles and tasks  Configure hardware, harden systems, and verify antivirus files Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com  Responsibilities  Ensure the integrity of user workstations and data  Accountability  Ensure that the Workstation Domain conforms to policy Common Threats in the Workstation Domain  Unauthorized workstation access Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com  Unauthorized access to systems, applications, and data  Desktop or laptop operating system and software vulnerabilities  Desktop or laptop application software vulnerabilities and patches  Viruses, malicious code, and other malware  User inserting CD/DVD/USB with personal files  User downloading photos, music, or videos  Security risk due to user violation of acceptable use policy (AUP)  Bring Your Own Device (BYOD) LAN Domain  Roles and tasks  Includes both physical network components and logical configuration of services for Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com users  Responsibilities  Physical components and logical elements  Accountability  Maximize use and integrity of data within the local area network (LAN) Domain Common Threats in the LAN Domain  Unauthorized access to LAN Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com  Unauthorized access to systems, applications, and data  LAN server operating system software vulnerabilities  LAN server application software vulnerabilities and software patch updates  Unauthorized access by rogue users on wireless LANs (WLANs)  Compromised confidentiality of data on WLANs  LAN servers with different hardware, operating systems, and software make them difficult to manage and troubleshoot LAN-to-WAN Domain  Roles and tasks  Includes both the physical pieces and logical design of security appliances; physical Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com parts need to be managed to give easy access to the service  Responsibilities  Physical components, logical elements, and applying the defined security controls  Accountability  Ensure that LAN-to-Wide Area Network (WAN) Domain security policies, standards, procedures, and guidelines are used Common Threats in the LAN-to-WAN Domain  Unauthorized network probing and port scanning Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com  Unauthorized access through the LAN-to-WAN Domain  Denial of service (DoS)/distributed denial of service (DDoS) attacks  IP router, firewall, and network appliance operating system vulnerability  IP router, firewall, and network appliance configuration file errors or weaknesses  Remote user download of sensitive data  Download of unknown file type attachments from unknown sources  Unknown email attachments and embedded URL links received by local users  Lost productivity due to local users surfing the web WAN Domain  Roles and tasks  Allow users the most access possible while making sure what goes in and out is Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com safe  Responsibilities  Physical components and logical elements  Accountability  Maintain, update, and provide technical support and ensure that the company meets security policies, standards, procedures, and guidelines Common Threats in the WAN Domain (Internet)  Open, public, and accessible data Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com  Most Internet traffic sent as cleartext  Vulnerable to eavesdropping  Vulnerable to malicious attacks  Vulnerable to DoS and DDoS attacks, TCP synchronize (SYN) flooding, and IP spoofing attacks  Vulnerable to corruption of information/data  Insecure Transmission Control Protocol/Internet Protocol (TCP/IP) applications  Hackers, attackers, and perpetrators email Trojans, worms, and malicious software Common Threats in the WAN Domain (Connectivity)  Commingling of WAN IP traffic on the same service provider router and infrastructure Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com  Maintaining high WAN service availability  Maximizing WAN performance and throughput  Using Simple Network Management Protocol (SNMP) applications and protocols maliciously (ICMP, Telnet, SNMP, DNS, etc.)  SNMP alarms and security monitoring 24/7/365 Remote Access Domain  Roles and tasks  Connect mobile users to their IT systems through the public Internet Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com  Responsibilities  Maintain, update, and troubleshoot the hardware and logical remote access connection  Accountability  Ensure that the Remote Access Domain security plans, standards, methods, and guidelines are used Common Threats in the Remote Access Domain  Brute-force user ID and password attacks Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com  Multiple logon retries and access control attacks  Unauthorized remote access to IT systems, applications, and data  Private or confidential data compromised remotely  Data leakage in violation of data classification standards  A mobile worker’s laptop is stolen  Mobile worker token or other authentication stolen System/Application Domain  Roles and tasks  Includes hardware, operating system software, applications, and data and includes Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com logical design  Secure mission-critical applications and intellectual property assets both physically and logically  Responsibilities  Server systems administration, database design and management, designing access rights to systems and applications, and more  Accountability  Ensure that the System/Application Domain is in compliance with security policies, standards, procedures, and guidelines Common Threats in the System/Application Domain  Unauthorized access to data  Unauthorized access to systems centers, computer rooms, and Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com  Data breach where private data is wiring closets compromised  Downtime of servers to perform  Corrupt or lost data maintenance  Loss of backed-up data as backup  Server operating systems software media are reused vulnerability  Recovery of critical business  Insecure cloud computing virtual functions potentially too time environments by default consuming to be useful  Susceptibility of client-server and  Downtime of IT systems for an web applications extended period after a disaster Weakest Link in the Security of an IT Infrastructure  Humans are the weakest link in security Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com  Strategies for reducing risk:  Check background of job candidates carefully  Evaluate staff regularly  Rotate access to sensitive systems, applications, and data among staff positions  Test applications and software and review for quality  Regularly review security plans  Perform annual security control audits Ethics and the Internet  Human behavior online is often less mature than in normal social settings Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com  Demand for systems security professionals is growing rapidly  U.S. government and Internet Architecture Board (IAB) defined a policy regarding acceptable use of Internet geared toward U.S. citizens  Policy is not a law nor mandated  Systems security professionals are responsible for is doing what is right and stopping what is wrong IT Security Policy Framework  Policy  A short written statement that defines a course of action that applies to entire Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com organization  Standard  A detailed written definition of how software and hardware are to be used  Procedures  Written instructions for how to use policies and standards  Guidelines  Suggested course of action for using policy, standard, or procedure Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com Hierarchical IT Security Policy Framework Foundational IT Security Policies  Acceptable use policy (AUP) Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com  Security awareness policy  Asset classification policy  Asset protection policy  Asset management policy  Vulnerability assessment/management policy  Threat assessment and monitoring policy Data Classification Standards (1 of 2)  Private data  Data about people that must be kept private Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com  Confidential  Information or data owned by the organization  Internal use only  Information or data shared internally by an organization  Public domain data  Information or data shared with the public Data Classification Standards (2 of 2) U.S. federal government data classification standards: Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com  Top secret  Applies to information that the classifying authority finds would cause grave damage to national security if it were disclosed  Secret  Applies to information that the classifying authority finds would cause serious damage to national security if it were disclosed  Confidential  Applies to information that the classifying authority finds would cause damage to national security Summary  Information systems security concepts Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com  Confidentiality, integrity, and availability (C-I-A)  The seven domains of a typical IT infrastructure  The weakest link in the security of an IT infrastructure  IT security policy framework and data classification standards

Use Quizgecko on...
Browser
Browser