Chapter 16.ppt
《Chapter 16.ppt》由会员分享,可在线阅读,更多相关《Chapter 16.ppt(44页珍藏版)》请在麦多课文档分享上搜索。
1、Chapter 16,1,Chapter 16,Information Technology For Management 6th Edition Turban, Leidner, McLean, Wetherbe Lecture Slides by L. Beaubien, Providence College John Wiley & Sons, Inc.,Managing Information Resources and Security,Chapter 16,2,Learning Objectives,Recognize the business value of security
2、and control Understand the role of the IS department and its relationships with end users. Discuss the role of the chief privacy officer. Recognize information systems vulnerability, threats, attack methods, and the possible symptoms of attack.,Chapter 16,3,Learning Objectives (Continued),Describe t
3、he major methods of defending information systems. Describe internal control and fraud. Describe the security issues of the Web and electronic commerce. Describe business continuity and disaster recovery planning. Understand the role of computer forensics in investigating and deterring security.,Cha
4、pter 16,4,Security & the Enterprise,Chapter 16,5,IS Vulnerability,Chapter 16,6,How a virus works,Chapter 16,7,Threats to Information Security,A threat to an information resource is any danger to which a system may be exposed. The exposure of an information resources is the harm, loss or damage that
5、can result if a threat compromises that resource. A systems vulnerability is the possibility that the system will suffer harm by a threat. Risk is the likelihood that a threat will occur. Information system controls are the procedures, devices, or software aimed at preventing a compromise to the sys
6、tem.,Chapter 16,8,Unintentional Threats,Human errors can occur in the design of the hardware and/or information system. Also can occur in programming, testing, data collection, data entry, authorization and procedures. Contribute to more than 50% of control and security-related problems in organizat
7、ions.,Chapter 16,9,Unintentional Threats (Continued),Environmental hazards include earthquakes, severe storms, floods, power failures or strong fluctuations, fires (most common hazard), explosions, etc. Computer system failures can occur as the result of poor manufacturing or defective materials.,Ch
8、apter 16,10,Intentional Threats,Typically, criminal in nature. Cybercrimes are fraudulent activities committed using computers and communications networks, particularly the Internet. Average cybercrime involves about $600,000 according to FBI.,Chapter 16,11,Intentional Threats (Continued),Hacker. An
9、 outside person who has penetrated a computer system, usually with no criminal intent. Cracker. A malicious hacker. Social engineering. Computer criminals or corporate spies get around security systems by building an inappropriate trust relationship with insiders.,Chapter 16,12,Espionage or Trespass
10、,The act of gaining access to the information an organization is trying to protect by an unauthorized individual. Industrial espionage occurs in areas where researching information about the competition goes beyond the legal limits. Governments practice industrial espionage against companies in othe
11、r countries. Shoulder surfing is looking at a computer monitor or ATM screen over another persons shoulder.,Chapter 16,13,System Vulnerability,A universal vulnerability is a state in a computing system which either: allows an attacker to execute commands as another user; allows an attacker to access
12、 data that is contrary to the access restrictions for that data; allows an attacker to pose as another entity; or allows an attacker to conduct a denial of service. An exposure is a state in a computing system (or set of systems) which is not a universal vulnerability, but either: allows an attacker
13、 to conduct information gathering activities; allows an attacker to hide activities; includes a capability that behaves as expected, but can be easily compromised; is a primary point of entry that an attacker may attempt to use to gain access to the system or data; and is considered a problem accord
14、ing to some reasonable security policy.,Chapter 16,14,Protecting Privacy,Privacy. The right to be left alone and to be free of unreasonable personal intrusions. Two rules have been followed fairly closely in past court decision in many countries: The right of privacy is not absolutes. Privacy must b
15、e balanced against the needs of society The publics right to know is superior to the individuals right of privacy. Electronic Surveillance. The tracking of peoples activities, online or offline, with the aid of computers. Personal Information in Databases. Information about individuals is being kept
16、 in many databases: banks, utilities co., govt. agencies, etc.; the most visible locations are credit-reporting agencies.,Chapter 16,15,Protecting Privacy (Continued),Information on Internet Bulletin Boards and Newsgroups. Electronic discussions such as chat rooms and these other sites appear on the
17、 Internet, within corporate intranets, and on blogs. A blog (Weblog) is an informal, personal journal that is frequently updated and intended for general public reading. Privacy Codes and Policies. An organizations guidelines with respect to protecting the privacy of customers, clients, and employee
18、s. International Aspects of Privacy. Privacy issues that international organizations and governments face when information spans countries and jurisdictions.,Chapter 16,16,Information Extortion,When an attacker or formerly trusted employee steal information from a computer system and then demands co
19、mpensation for its return or an agreement not to disclose it.,Chapter 16,17,Sabotage or Vandalism,A popular type of online vandalism is hacktivist or cyberactivist activities. Hacktivist or cyberactivist use technology for high-tech civil disobedience to protest operations, policies, or actions of a
20、n individual, an organization, or a government agency.,Chapter 16,18,Sabotage or Vandalism (Continued),Cyberterrorism is a premeditated, politically motivated attack against information, computer systems, computer programs, and data that results in violence against noncombatant targets by subnationa
21、l groups or clandestine agents. Cyberwar. War in which a countrys information systems could be paralyzed from a massive attack by destructive software. Theft is the illegal taking of property that belongs to another individual or organization.,Chapter 16,19,Identity Theft,Crime in which someone uses
22、 the personal information of others, usually obtained from the Internet, to create a false identity and then commits fraud. Fastest growing white-collar crime. Biggest problem is restoring victims damaged credit rating.,Chapter 16,20,Software Attacks,Malicious software (malware) designed to damage,
23、destroy, or deny service to the targeted systems. Most common types of software attacks are viruses, worms, Trojan horses, logic bombs, back doors, denial-of-service, alien software, phishing and pharming.,Chapter 16,21,Software Attacks (Continued),Viruses. Segments of computer code that performs un
24、intended actions ranging from merely annoying to destructive. Worms. Destructive programs that replicate themselves without requiring another program to provide a safe environment for replication. Trojan horses. Software progams that hide in other computer programs and reveal their designed behavior
25、 only when they are activated.,Chapter 16,22,Software Attacks (Continued),Logic bombs. Designed to activate and perform a destructive action at a certain time. Back doors or trap doors. Typically a password, known only to the attacker, that allows access to the system without having to go through an
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
2000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- CHAPTER16PPT
