© 2013, published by Flat World Knowledge 14-1 Information Systems: A Manager’s Guide to...

28
© 2013, published by Flat World Knowledge 14-1 Information Systems: A Manager’s Guide to Harnessing Technology, version 2.0 John Gallaugher

Transcript of © 2013, published by Flat World Knowledge 14-1 Information Systems: A Manager’s Guide to...

Page 1: © 2013, published by Flat World Knowledge 14-1 Information Systems: A Manager’s Guide to Harnessing Technology, version 2.0 John Gallaugher.

© 2013, published by Flat World Knowledge 14-1

Information Systems: A Manager’s Guide to Harnessing

Technology, version 2.0John Gallaugher

Page 2: © 2013, published by Flat World Knowledge 14-1 Information Systems: A Manager’s Guide to Harnessing Technology, version 2.0 John Gallaugher.

© 2013, published by Flat World Knowledge

Published by:

Flat World Knowledge, Inc.

© 2013 by Flat World Knowledge, Inc. All rights reserved. Your use of this work is subject to the License Agreement available here http://www.flatworldknowledge.com/legal. No part of this work may be used, modified, or reproduced in any form or by any means except as expressly permitted under the License Agreement.

14-2

Page 3: © 2013, published by Flat World Knowledge 14-1 Information Systems: A Manager’s Guide to Harnessing Technology, version 2.0 John Gallaugher.

© 2013, published by Flat World Knowledge

Chapter 14

Information Security: Barbarians at the Gateway (and Just About

Everywhere Else)

14-3

Page 4: © 2013, published by Flat World Knowledge 14-1 Information Systems: A Manager’s Guide to Harnessing Technology, version 2.0 John Gallaugher.

© 2013, published by Flat World Knowledge

Learning Objectives

• Recognize that information security breaches are on the rise

• Understand the potentially damaging impact of security breaches

• Recognize that information security must be made a top organizational priority

14-4

Page 5: © 2013, published by Flat World Knowledge 14-1 Information Systems: A Manager’s Guide to Harnessing Technology, version 2.0 John Gallaugher.

© 2013, published by Flat World Knowledge

Security Breach

• Factors that can amplify the severity of a breach:– Personnel betrayal – Technology lapse – Procedural gaffe

• Constant vigilance regarding security needs to be:– Part of one’s individual skill set– A key component in an organization’s culture

14-5

Page 6: © 2013, published by Flat World Knowledge 14-1 Information Systems: A Manager’s Guide to Harnessing Technology, version 2.0 John Gallaugher.

© 2013, published by Flat World Knowledge

Learning Objectives

• Understand the source and motivation of those initiating information security attacks

• Relate examples of various infiltrations in a way that helps raise organizational awareness of threats

14-6

Page 7: © 2013, published by Flat World Knowledge 14-1 Information Systems: A Manager’s Guide to Harnessing Technology, version 2.0 John Gallaugher.

© 2013, published by Flat World Knowledge

Motivation for Information Security Attacks

• Account theft and illegal funds transfer– Some hackers steal data for personal use– Data harvesters sell to cash-out fraudsters • Data harvesters: Cybercriminals who infiltrate systems

and collect data for illegal resale• Cash-out fraudsters: Purchase assets from data

harvesters to buy goods using stolen credit cards or create false accounts

• Stealing personal or financial data

14-7

Page 8: © 2013, published by Flat World Knowledge 14-1 Information Systems: A Manager’s Guide to Harnessing Technology, version 2.0 John Gallaugher.

© 2013, published by Flat World Knowledge

Motivation for Information Security Attacks

• Compromising computing assets for use in other crimes – Botnets send spam, launch click fraud efforts or stage

distributed denial of service (DDoS) attacks • Botnets: Surreptitiously infiltrated computers, linked

and controlled remotely• Distributed denial of service (DDoS) attacks: Shutting

down Web sites with a crushing load of seemingly legitimate requests

14-8

Page 9: © 2013, published by Flat World Knowledge 14-1 Information Systems: A Manager’s Guide to Harnessing Technology, version 2.0 John Gallaugher.

© 2013, published by Flat World Knowledge

Motivation for Information Security Attacks

Extortion Espionage Cyberwarfare

Terrorism Pranksters Protest hacking

Revenge

14-9

Page 10: © 2013, published by Flat World Knowledge 14-1 Information Systems: A Manager’s Guide to Harnessing Technology, version 2.0 John Gallaugher.

© 2013, published by Flat World Knowledge

Hacker

• Someone who breaks into computer systems– White hat hackers: Uncovers computer weaknesses

without exploiting them• Improve system security

– Black hat hackers: Computer criminals who exploit a system’s weakness for personal gain

14-10

Page 11: © 2013, published by Flat World Knowledge 14-1 Information Systems: A Manager’s Guide to Harnessing Technology, version 2.0 John Gallaugher.

© 2013, published by Flat World Knowledge

Learning Objectives

• Recognize the potential entry points for security compromise

• Understand infiltration techniques such as social engineering, phishing, malware, Web site compromises (such as SQL injection), and more

• Identify various methods and techniques to thwart infiltration

14-11

Page 12: © 2013, published by Flat World Knowledge 14-1 Information Systems: A Manager’s Guide to Harnessing Technology, version 2.0 John Gallaugher.

© 2013, published by Flat World Knowledge

User and Administrator Threats

• Rogue employees who steal secrets, install malware, or hold a firm hostage

Bad apples

• Con games that trick employees into revealing information or performing other tasks that compromise a firm

Social engineering

• Con executed using technology, targeted at: • Acquiring sensitive information• Tricking someone into installing malicious software

Phishing

14-12

Page 13: © 2013, published by Flat World Knowledge 14-1 Information Systems: A Manager’s Guide to Harnessing Technology, version 2.0 John Gallaugher.

© 2013, published by Flat World Knowledge

User and Administrator Threats

• Email transmissions and packets that have been altered to forge or disguise their origin or identity

Spoofed

• New attacks that haven’t been clearly identified and haven’t made it into security screening systems

Zero-day exploits

• Most users employ inefficient and insecure password systems• Biometrics: Measure and analyze human body

characteristics for identification or authentication

Passwords

14-13

Page 14: © 2013, published by Flat World Knowledge 14-1 Information Systems: A Manager’s Guide to Harnessing Technology, version 2.0 John Gallaugher.

© 2013, published by Flat World Knowledge

Technology Threats - Malware

• Seeks to compromise a computing system without permission

• Methods of infection:– Viruses - Infect other software or files– Worms - Take advantage of security vulnerability to

automatically spread– Trojans - Attempt to sneak in by masquerading as

something they’re not

14-14

Page 15: © 2013, published by Flat World Knowledge 14-1 Information Systems: A Manager’s Guide to Harnessing Technology, version 2.0 John Gallaugher.

© 2013, published by Flat World Knowledge

Goals of Malware

• Botnets or zombie networks - Used in click fraud, sending spam, registering accounts that use CAPTCHAs– CAPTCHAs: Scrambled character images to thwart

automated account setup or ticket buying attempts• Malicious adware - Installed without full user consent

or knowledge, later serve unwanted advertisements• Spyware - Monitors user actions, network traffic, or

scans for files

14-15

Page 16: © 2013, published by Flat World Knowledge 14-1 Information Systems: A Manager’s Guide to Harnessing Technology, version 2.0 John Gallaugher.

© 2013, published by Flat World Knowledge

Goals of Malware

• Keylogger - Records user keystrokes– Software based or hardware based

• Screen capture - Records pixels that appear on a user’s screen to identify proprietary information

• Blended threats - Attacks combining multiple malware or hacking exploits

14-16

Page 17: © 2013, published by Flat World Knowledge 14-1 Information Systems: A Manager’s Guide to Harnessing Technology, version 2.0 John Gallaugher.

© 2013, published by Flat World Knowledge

Technology Threats

• Compromising Web sites - Target poorly designed and programmed Web sites– SQL injection technique - Targeting sloppy

programming practices that do not validate user input– Cross-site scripting attacks and HTTP header injection

• Push-Button hacking - Tools created by hackers to make it easy to automate attacks

• Network threats - Network itself is a source of compromise

14-17

Page 18: © 2013, published by Flat World Knowledge 14-1 Information Systems: A Manager’s Guide to Harnessing Technology, version 2.0 John Gallaugher.

© 2013, published by Flat World Knowledge

Physical Threats

• Combing through trash to identify valuable assets

Dumpster diving

• Gaining compromising information through observation

Shoulder surfing

• Exhausts all possible password combinations to break into an account

Brute-force attacks

14-18

Page 19: © 2013, published by Flat World Knowledge 14-1 Information Systems: A Manager’s Guide to Harnessing Technology, version 2.0 John Gallaugher.

© 2013, published by Flat World Knowledge

Encryption

• Scrambling data using a code, thereby hiding it from those who do not have the unlocking key

• Key: Code that unlocks encryption• Public key encryption: Two key system used for

securing electronic transmissions• Certificate authority: Trusted third party that

provides authentication services in public key encryption schemes

14-19

Page 20: © 2013, published by Flat World Knowledge 14-1 Information Systems: A Manager’s Guide to Harnessing Technology, version 2.0 John Gallaugher.

© 2013, published by Flat World Knowledge

Learning Objectives

• Identify critical steps to improve your individual and organizational information security

• Be a tips, tricks, and techniques advocate, helping make your friends, family, colleagues, and organization more secure

• Recognize the major information security issues that organizations face, as well as the resources, methods, and approaches that can help make firms more secure

14-20

Page 21: © 2013, published by Flat World Knowledge 14-1 Information Systems: A Manager’s Guide to Harnessing Technology, version 2.0 John Gallaugher.

© 2013, published by Flat World Knowledge

Taking Action as a User

• Surf smart• Stay vigilant• Stay updated• Install a full suite of security software• Secure home networks and encrypt hard drives• Regularly update passwords • Be disposal smart• Regularly back up your system• Check with your administrator

14-21

Page 22: © 2013, published by Flat World Knowledge 14-1 Information Systems: A Manager’s Guide to Harnessing Technology, version 2.0 John Gallaugher.

© 2013, published by Flat World Knowledge

Taking Action as an Organization

• Frameworks, standards, and compliance– ISO27k or ISO 27000 series - Establishing, operating,

maintaining, and improving an Information Security Management System

– Compliance requirements - Legal or professionally binding steps that must be taken

14-22

Page 23: © 2013, published by Flat World Knowledge 14-1 Information Systems: A Manager’s Guide to Harnessing Technology, version 2.0 John Gallaugher.

© 2013, published by Flat World Knowledge

Taking Action as an Organization• Education, audit, and enforcement– Functions of research and development• Understanding emerging threats and implementing

updated security techniques • Working on broader governance issues

– Employees should:• Know a firm’s policies and be regularly trained• Understand the penalties to be faced if they fail to

meet their obligations– Audits - Real-time monitoring of usage, announced

audits, and surprise spot checks14-23

Page 24: © 2013, published by Flat World Knowledge 14-1 Information Systems: A Manager’s Guide to Harnessing Technology, version 2.0 John Gallaugher.

© 2013, published by Flat World Knowledge

What Needs to Be Protected and How Much is Enough?

• Firms should avoid:– Spending money targeting unlikely exploits – Underinvesting in easily prevented methods to thwart

common infiltration techniques• Risk assessment team - Consider vulnerabilities and

countermeasure investments• Lobbying for legislation that imposes severe penalties

on crooks helps: – Raise adversary costs– Lower one’s likelihood of becoming a victim

14-24

Page 25: © 2013, published by Flat World Knowledge 14-1 Information Systems: A Manager’s Guide to Harnessing Technology, version 2.0 John Gallaugher.

© 2013, published by Flat World Knowledge

Technology’s Role

• Patches - Software updates that plug existing holes• Lock down hardware– Prevent unapproved software installation– Force file saving to hardened, backed-up, scanned,

and monitored servers– Reimage hard drives of end-user PCs – Disable boot capability of removable media – Prevent Wi-Fi use and require VPN encryption for

network transmissions

14-25

Page 26: © 2013, published by Flat World Knowledge 14-1 Information Systems: A Manager’s Guide to Harnessing Technology, version 2.0 John Gallaugher.

© 2013, published by Flat World Knowledge

Technology’s Role• Lock down networks– Firewalls: Control network traffic, block unauthorized

traffic and permit acceptable use– Intrusion detection systems: Monitor network use for

hacking attempts and take preventive action– Honeypots: Tempting, bogus targets meant to lure

hackers – Blacklists: Deny the entry or exit of specific IP

addresses and other entities– Whitelists: Permit communication only with

approved entities or in an approved manner 14-26

Page 27: © 2013, published by Flat World Knowledge 14-1 Information Systems: A Manager’s Guide to Harnessing Technology, version 2.0 John Gallaugher.

© 2013, published by Flat World Knowledge

Technology’s Role

• Lock down partners – Insist on partner firms being compliant with security

guidelines and audit them regularly– Use access controls to compartmentalize data access

on a need-to-know basis– Use recording, monitoring, and auditing to hunt for

patterns of abuse– Maintain multiple administrators to jointly control key

systems

14-27

Page 28: © 2013, published by Flat World Knowledge 14-1 Information Systems: A Manager’s Guide to Harnessing Technology, version 2.0 John Gallaugher.

© 2013, published by Flat World Knowledge

Technology’s Role

• Lock down systems - Audit for SQL injection and other application exploits

• Have failure and recovery plans– Employ recovery mechanisms to regain control if key

administrators are incapacitated or uncooperative– Broad awareness of infiltration reduces organizational

stigma in coming forward – Share knowledge on techniques used by cybercrooks

with technology partners

14-28