SUMMARY Chapter 8
Securing Information Systems
8.1 System Vulnerability and Abuse
A. The Reason Systems are Vulnerable
o Hardware problems
o Software problems
o Disasters
o Use of networks, computers outside of firm's control
B. Malicious Software: Viruses, Worms, Trojan Horses, and Spyware
The types of malicious softwares :
o Viruses are rogue software program that attaches itself to other software programs or data files in order to be executed
o Worm is Independent computer programs that copy themselves from one computer to other computers over a network
o Trojan horses are software program that appears to be benign but then does something other than expected
o Spyware is small programs install themselves surreptitiously on computers to monitor user Web surfing activity and serve up advertising
o Keyloggers are record every keystroke on computer to steal serial numbers, passwords, launch Internet attacks
C. Hackers and Computer Crime
A hacker is an individual who intends to gain unauthorized access to a computer system.
Hacker activities have broadened beyond mere system intrusion to include theft of goods and information, as well as system damage and cybervandalism, the intentional disruption, defacement, or even destruction of a Web site or corporate information system, such as :
o Spoofing, misrepresenting oneself by using fake e-mail addresses or masquerading as someone else.
o Sniffer, eavesdropping program that monitors information traveling over network; Enables hackers to steal proprietary information such as e-mail, company files, and so on.
o Denial-of-service attacks (DoS),flooding server with thousands of false requests to crash the network
o Distributed denial-of-service attacks (DDoS), use of numerous computers to launch a DoS
o Botnets, use networks of "zombie" PCs infiltrated by bot malware
o Computer crime
o Identity Theft
o Click Fraud
o Cyberwarfare, actions by a nation-state to penetrate another nation's computers or networks for the purposes of causing damage or disruption.
D. Some of the reasons employees constitute to internal threat :
![]() |
https://community.cengage.com/GECResource2/cfs-file/__key/communityserver-blogs-components-weblogfiles/00-00-00-00-09/ComputerHacker.jpg |
o Inside knowledge
o Sloppy security procedures
o User lack of knowledge
8.2 Business Value of Security and Control
Lack of sound security and control can cause firms relying on computer systems for their core business functions to lose sales and productivity. Information assets, such as confidential employee records, trade secrets, or business plans, lose much of their value if they are revealed to outsiders or if they expose the firm to legal liability.
New laws, such as HIPAA, the Sarbanes-Oxley Act, and the Gramm-Leach-Bliley Act, require companies to practice stringent electronic records management and adhere to strict standards for security, privacy, and control. Legal actions requiring electronic evidence and computer forensics also require firms to pay more attention to security and electronic records management.
8.3 Establishing a Framework for Security and Control
Firms need to establish a good set of both general and application controls for their information systems. A risk assessment evaluates information assets, identifies control points and control weaknesses, and determines the most cost-effective set of controls.
Firms must also develop a coherent corporate security policy and plans for continuing business operations in the event of disaster or disruption. The security policy includes policies for acceptable use and identity management. Comprehensive and systematic MIS auditing helps organizations determine the effectiveness of security and controls for their information systems.
8.4 Technologies and Tools for Protecting Information Resources
Firewalls prevent unauthorized users from accessing a private network when it is linked to the Internet. Intrusion detection systems monitor private networks from suspicious network traffic and attempts to access corporate systems. Passwords, tokens, smart cards, and biometric authentication are used to authenticate system users. Antivirus software checks computer systems for infections by viruses and worms and often eliminates the malicious software, while antispyware software combats intrusive and harmful spyware programs. Encryption, the coding and scrambling of messages, is a widely used technology for securing electronic transmissions over unprotected networks. Digital certificates combined with public key encryption provide further protection of electronic transactions by authenticating a user’s identity. Companies can use fault-tolerant computer systems or create high-availability computing environments to make sure that their information systems are always available. Use of software metrics and rigorous software testing help improve software quality and reliability.
Reference :
Laudon, Kenneth C. & Jane P. Laudo. (2014) Management Information Systems: Managing the Digital Firm, 13th Edition. England: Pearson.