Chapter 8 Securing Information Systems VIDEO CASES Case

  • Slides: 30
Download presentation
Chapter 8 Securing Information Systems VIDEO CASES Case 1: Stuxnet and Cyber Warfare Case

Chapter 8 Securing Information Systems VIDEO CASES Case 1: Stuxnet and Cyber Warfare Case 2: Cyber Espionage: The Chinese Threat Case 3: UBS Access Key: IBM Zone Trusted Information Channel Instructional Video 1: Sony Play. Station Hacked; Data Stolen from 77 million users Instructional Video 2: Zappos Working To Correct Online Security Breach Instructional Video 3: Meet the Hackers: Anonymous Statement on Hacking SONY 6. 1 Copyright © 2014 Pearson Education, Inc.

Management Information Systems Chapter 8: Securing Information Systems System Vulnerability and Abuse • Why

Management Information Systems Chapter 8: Securing Information Systems System Vulnerability and Abuse • Why systems are vulnerable – Accessibility of networks – Hardware problems (breakdowns, configuration errors, damage from improper use or crime) – Software problems (programming errors, installation errors, unauthorized changes) – Disasters – Use of networks/computers outside of firm’s control – Loss and theft of portable devices 8. 2 Copyright © 2016 Pearson Education, Inc.

Management Information Systems Chapter 8: Securing Information Systems System Vulnerability and Abuse • Wireless

Management Information Systems Chapter 8: Securing Information Systems System Vulnerability and Abuse • Wireless security challenges – Radio frequency bands easy to scan – SSIDs (service set identifiers) • Identify access points • Broadcast multiple times • Can be identified by sniffer programs • War driving – Eavesdroppers drive by buildings and try to detect SSID and gain access to network and resources • Once access point is breached, intruder can use OS to access networked drives and files 8. 3 Copyright © 2016 Pearson Education, Inc.

Management Information Systems Chapter 8: Securing Information Systems System Vulnerability and Abuse • Malware

Management Information Systems Chapter 8: Securing Information Systems System Vulnerability and Abuse • Malware (cont. ) – Smartphones as vulnerable as computers • Study finds 13, 000 types of smartphone malware – Trojan horses • Software that appears benign but does something other than expected – SQL injection attacks • Hackers submit data to Web forms that exploits site’s unprotected software and sends rogue SQL query to database – Ransomware 8. 4 Copyright © 2016 Pearson Education, Inc.

Management Information Systems Chapter 8: Securing Information Systems System Vulnerability and Abuse • Malware

Management Information Systems Chapter 8: Securing Information Systems System Vulnerability and Abuse • Malware (cont. ) – Spyware • Small programs install themselves surreptitiously on computers to monitor user Web surfing activity and serve up advertising • Key loggers – Record every keystroke on computer to steal serial numbers, passwords, launch Internet attacks • Other types: – Reset browser home page – Redirect search requests – Slow computer performance by taking up memory 8. 5 Copyright © 2016 Pearson Education, Inc.

Management Information Systems Chapter 8: Securing Information Systems System Vulnerability and Abuse • Internal

Management Information Systems Chapter 8: Securing Information Systems System Vulnerability and Abuse • Internal threats: Employees – Security threats often originate inside an organization – Inside knowledge – Sloppy security procedures • User lack of knowledge – Social engineering: • Tricking employees into revealing their passwords by pretending to be legitimate members of the company in need of information 8. 6 Copyright © 2016 Pearson Education, Inc.

Management Information Systems Chapter 8: Securing Information Systems Business Value of Security and Control

Management Information Systems Chapter 8: Securing Information Systems Business Value of Security and Control • Legal and regulatory requirements for electronic records management and privacy protection – HIPAA: Medical security and privacy rules and procedures – Gramm-Leach-Bliley Act: Requires financial institutions to ensure the security and confidentiality of customer data – Sarbanes-Oxley Act: Imposes responsibility on companies and their management to safeguard the accuracy and integrity of financial information that is used internally and released externally 8. 7 Copyright © 2016 Pearson Education, Inc.

Management Information Systems Chapter 8: Securing Information Systems Organizational Frameworks for Security and Control

Management Information Systems Chapter 8: Securing Information Systems Organizational Frameworks for Security and Control • Types of general controls – Software controls – Hardware controls – Computer operations controls – Data security controls – Implementation controls – Administrative controls 8. 8 Copyright © 2016 Pearson Education, Inc.

Management Information Systems Chapter 8: Securing Information Systems Organizational Frameworks for Security and Control

Management Information Systems Chapter 8: Securing Information Systems Organizational Frameworks for Security and Control • Risk assessment: Determines level of risk to firm if specific activity or process is not properly controlled • • 8. 9 Types of threat Probability of occurrence during year Potential losses, value of threat Expected annual loss EXPECTED ANNUAL LOSS EXPOSURE PROBABILITY LOSS RANGE (AVG) Power failure 30% $5 K–$200 K ($102, 500) Embezzlement 5% $1 K–$50 K ($25, 500) $1, 275 User error 98% $200–$40 K ($20, 100) $19, 698 $30, 750 Copyright © 2016 Pearson Education, Inc.

Management Information Systems Chapter 8: Securing Information Systems Organizational Frameworks for Security and Control

Management Information Systems Chapter 8: Securing Information Systems Organizational Frameworks for Security and Control • Disaster recovery planning: Devises plans for restoration of disrupted services • Business continuity planning: Focuses on restoring business operations after disaster – Both types of plans needed to identify firm’s most critical systems – Business impact analysis to determine impact of an outage – Management must determine which systems restored first 8. 10 Copyright © 2016 Pearson Education, Inc.

Management Information Systems Chapter 8: Securing Information Systems Supply Chain Management Systems • Supply

Management Information Systems Chapter 8: Securing Information Systems Supply Chain Management Systems • Supply chain management software – Supply chain planning systems • Model existing supply chain • Enable demand planning • Optimize sourcing, manufacturing plans • Establish inventory levels • Identify transportation modes – Supply chain execution systems • Manage flow of products through distribution centers and warehouses 8. 11 Copyright © 2016 Pearson Education, Inc.

Management Information Systems Chapter 8: Securing Information Systems Customer Relationship Management Systems • Customer

Management Information Systems Chapter 8: Securing Information Systems Customer Relationship Management Systems • Customer relationship management (CRM) – Knowing the customer – In large businesses, too many customers and too many ways customers interact with firm • CRM systems: – Capture and integrate customer data from all over the organization – Consolidate and analyze customer data – Distribute customer information to various systems and customer touch points across enterprise – Provide single enterprise view of customers 8. 12 Copyright © 2016 Pearson Education, Inc.

Management Information Systems Chapter 8: Securing Information Systems Customer Relationship Management Systems • Business

Management Information Systems Chapter 8: Securing Information Systems Customer Relationship Management Systems • Business value of CRM systems – – – Increased customer satisfaction Reduced direct-marketing costs More effective marketing Lower costs for customer acquisition/retention Increased sales revenue • Churn rate: – Number of customers who stop using or purchasing products or services from a company – Indicator of growth or decline of firm’s customer base 8. 13 Copyright © 2016 Pearson Education, Inc.

Management Information Systems Chapter 8: Securing Information Systems Enterprise Applications: Challenges and Opportunities •

Management Information Systems Chapter 8: Securing Information Systems Enterprise Applications: Challenges and Opportunities • Enterprise application challenges – Highly expensive to purchase and implement enterprise applications • Average cost of ERP project in 2014—$2. 8 million – – Technology changes Business process changes Organizational learning, changes Switching costs, dependence on software vendors • Integrating cloud applications – Data standardization, management, cleansing 8. 14 Copyright © 2016 Pearson Education, Inc.

Management Information Systems Chapter 8: Securing Information Systems Enterprise Applications: Challenges and Opportunities •

Management Information Systems Chapter 8: Securing Information Systems Enterprise Applications: Challenges and Opportunities • Next-generation enterprise applications (cont. ) – Social CRM • Incorporating social networking technologies • Company social networks • Monitor social media activity; social media analytics • Manage social and Web-based campaigns – Business intelligence • Inclusion of BI with enterprise applications • Flexible reporting, ad hoc analysis, “what-if” scenarios, digital dashboards, data visualization 8. 15 Copyright © 2016 Pearson Education, Inc.

Management Information Systems Chapter 8: Securing Information Systems Unique Features of E-commerce, Digital Markets,

Management Information Systems Chapter 8: Securing Information Systems Unique Features of E-commerce, Digital Markets, and Digital Goods • Eight unique features of Internet and Web as commercial medium – – – – 8. 16 Ubiquity Global reach Universal standards Richness Interactivity Information density Personalization/customization Social technology Copyright © 2016 Pearson Education, Inc.

Management Information Systems Chapter 8: Securing Information Systems Unique Features of E-commerce, Digital Markets,

Management Information Systems Chapter 8: Securing Information Systems Unique Features of E-commerce, Digital Markets, and Digital Goods – Ubiquity • Internet/Web technology available everywhere: work, home, and so on, anytime • Effect: – Marketplace removed from temporal, geographic locations to become “marketspace” – Enhanced customer convenience and reduced shopping costs • Reduces transaction costs – Costs of participating in market 8. 17 Copyright © 2016 Pearson Education, Inc.

Management Information Systems Chapter 8: Securing Information Systems Unique Features of E-commerce, Digital Markets,

Management Information Systems Chapter 8: Securing Information Systems Unique Features of E-commerce, Digital Markets, and Digital Goods • Interactivity – The technology works through interaction with the user. – Effect: • Consumers engaged in dialog that dynamically adjusts experience to the individual. • Consumer becomes co-participant in process of delivering goods to market. 8. 18 Copyright © 2016 Pearson Education, Inc.

Management Information Systems Chapter 8: Securing Information Systems Unique Features of E-commerce, Digital Markets,

Management Information Systems Chapter 8: Securing Information Systems Unique Features of E-commerce, Digital Markets, and Digital Goods • Digital goods – Goods that can be delivered over a digital network • For example: music tracks, video, software, newspapers, books – Cost of producing first unit is almost entire cost of product – Costs of delivery over the Internet very low – Marketing costs remain the same; pricing highly variable – Industries with digital goods are undergoing revolutionary changes (publishers, record labels, etc. ) 8. 19 Copyright © 2016 Pearson Education, Inc.

Management Information Systems Chapter 8: Securing Information Systems E-commerce Business and Revenue Models •

Management Information Systems Chapter 8: Securing Information Systems E-commerce Business and Revenue Models • E-commerce business models – – – – 8. 20 Portal E-tailer Content provider Transaction broker Market creator Service provider Community provider Copyright © 2016 Pearson Education, Inc.

Management Information Systems Chapter 8: Securing Information Systems E-commerce Business and Revenue Models •

Management Information Systems Chapter 8: Securing Information Systems E-commerce Business and Revenue Models • E-commerce revenue models – Advertising – Sales – Subscription – Free/Freemium – Transaction fee – Affiliate 8. 21 Copyright © 2016 Pearson Education, Inc.

Management Information Systems Chapter 8: Securing Information Systems How Has E-commerce Transformed Marketing? •

Management Information Systems Chapter 8: Securing Information Systems How Has E-commerce Transformed Marketing? • Social shopping sites • Wisdom of crowds • Crowdsourcing – Large numbers of people can make better decisions about topics and products than a single person. • Prediction markets – Peer-to-peer betting markets on specific outcomes (elections, sales figures, designs for new products) 8. 22 Copyright © 2016 Pearson Education, Inc.

Management Information Systems Chapter 8: Securing Information Systems Knowledge Work Systems • Examples of

Management Information Systems Chapter 8: Securing Information Systems Knowledge Work Systems • Examples of knowledge work systems – CAD (computer-aided design): • Creation of engineering or architectural designs • 3 D printing – Virtual reality systems: • • Simulate real-life environments 3 D medical modeling for surgeons Augmented reality (AR) systems VRML – Investment workstations: • Streamline investment process and consolidate internal, external data for brokers, traders, portfolio managers 8. 23 Copyright © 2016 Pearson Education, Inc.

Management Information Systems Chapter 8: Securing Information Systems Intelligent Techniques • Intelligent techniques: Used

Management Information Systems Chapter 8: Securing Information Systems Intelligent Techniques • Intelligent techniques: Used to capture individual and collective knowledge and to extend knowledge base – To capture tacit knowledge: Expert systems, case-based reasoning, fuzzy logic – Knowledge discovery: Neural networks and data mining – Generating solutions to complex problems: Genetic algorithms – Automating tasks: Intelligent agents • Artificial intelligence (AI) technology: – Computer-based systems that emulate human behavior 8. 24 Copyright © 2016 Pearson Education, Inc.

Management Information Systems Chapter 8: Securing Information Systems Intelligent Techniques • Expert systems: –

Management Information Systems Chapter 8: Securing Information Systems Intelligent Techniques • Expert systems: – Capture tacit knowledge in very specific and limited domain of human expertise – Capture knowledge of skilled employees as set of rules in software system that can be used by others in organization – Typically perform limited tasks that may take a few minutes or hours, for example: • Diagnosing malfunctioning machine • Determining whether to grant credit for loan – Used for discrete, highly structured decision making 8. 25 Copyright © 2016 Pearson Education, Inc.

Management Information Systems Chapter 8: Securing Information Systems Intelligent Techniques • Neural networks –

Management Information Systems Chapter 8: Securing Information Systems Intelligent Techniques • Neural networks – Find patterns and relationships in massive amounts of data too complicated for humans to analyze – “Learn” patterns by searching for relationships, building models, and correcting over and over again – Humans “train” network by feeding it data inputs for which outputs are known, to help neural network learn solution by example – Used in medicine, science, and business for problems in pattern classification, prediction, financial analysis, and control and optimization 8. 26 Copyright © 2016 Pearson Education, Inc.

Management Information Systems Chapter 8: Securing Information Systems Intelligent Techniques • Intelligent agents –

Management Information Systems Chapter 8: Securing Information Systems Intelligent Techniques • Intelligent agents – Work without direct human intervention to carry out specific, repetitive, and predictable tasks for user, process, or application • Deleting junk e-mail • Finding cheapest airfare – Use limited built-in or learned knowledge base – Some are capable of self-adjustment, for example: Siri – Agent-based modeling applications: • Systems of autonomous agents • Model behavior of consumers, stock markets, and supply chains; used to predict spread of epidemics 8. 27 Copyright © 2016 Pearson Education, Inc.

Management Information Systems Chapter 8: Securing Information Systems Intelligent Techniques • Machine learning –

Management Information Systems Chapter 8: Securing Information Systems Intelligent Techniques • Machine learning – How computer programs improve performance without explicit programming • Recognizing patterns • Experience • Prior learnings (database) – Contemporary examples • Google searches • Recommender systems on Amazon, Netflix 8. 28 Copyright © 2016 Pearson Education, Inc.

Management Information Systems Chapter 8: Securing Information Systems Intelligent Techniques • How expert systems

Management Information Systems Chapter 8: Securing Information Systems Intelligent Techniques • How expert systems work – Knowledge base: Set of hundreds or thousands of rules – Inference engine: Strategy used to search knowledge base • Forward chaining: Inference engine begins with information entered by user and searches knowledge base to arrive at conclusion • Backward chaining: Begins with hypothesis and asks user questions until hypothesis is confirmed or disproved 8. 29 Copyright © 2016 Pearson Education, Inc.

Management Information Systems Chapter 8: Securing Information Systems Intelligent Techniques • Hybrid AI systems

Management Information Systems Chapter 8: Securing Information Systems Intelligent Techniques • Hybrid AI systems – Genetic algorithms, fuzzy logic, neural networks, and expert systems integrated into single application to take advantage of best features of each – For example: Matsushita “neurofuzzy” washing machine that combines fuzzy logic with neural networks 8. 30 Copyright © 2016 Pearson Education, Inc.