Chapter 2
Chapter 2
Stair/Reynolds, Principles of Information Systems, 14 th Edition. © 2021 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Why Learn About Secure Information
Systems?
• Must secure data and information
• Must protect against malicious acts of theft
or disruption
• Complex trade-offs regarding IS security
• Security effort versus money spent
• Security versus system ease of use
• Pursuing prosecution versus avoiding negative
publicity
Stair/Reynolds, Principles of Information Systems, 14th Edition. © 2021 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
The Threat Landscape
Stair/Reynolds, Principles of Information Systems, 14th Edition. © 2021 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Surveys indicating alarming results
http://consulting.ey.com/cybersecurity-regained (2018)
http://www.pwc.com/us/en/services/consulting.cybersecurity/library/information-security-survey.html (2018)
Stair/Reynolds, Principles of Information Systems, 14th Edition. © 2021 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Why Computer Incidents Are So
Prevalent
• Increasing computer system complexity
• Billions of communicating devices on networks
• Organizations constantly changing software
• Adding new applications
• Modifying existing applications
• Replacing older, legacy information systems
• Bring your own device (BYOD) polices
• Pros and cons
Stair/Reynolds, Principles of Information Systems, 14th Edition. © 2021 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Why Computer Incidents Are So
Prevalent
FIGURE 2.1
Total number of new software vulnerabilities identified annually
Stair/Reynolds, Principles of Information Systems, 14th Edition. © 2021 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Perpetrators Most Likely to Initiate a
Cyberattack
Type of perpetrator Description
Careless insider An inside (employee, business partner, contractor,
consultant) who does not follow the organization’s
security polices and enables a cyberattack to occur
Malicious An insider who deliberately attempts to gain access
employees to and/or disrupt a company’s information systems
and business operations
Cybercriminal Someone who attacks a computer system or
network for financial gain
Stair/Reynolds, Principles of Information Systems, 14th Edition. © 2021 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Perpetrators Most Likely to Initiate a
Cyberattack
Type of perpetrator Description
Hacktivist An individual who hacks computers or Web sites in
order to promote a political ideology
Lone wolf attacker Someone who violates computer or Internet security
maliciously or for illegal personal gain
Cyberterrorist State-sponsored individual or group who attempts
to destroy the infrastructure components of
governments, financial institutions, corporations,
utilities, and emergency response units
Stair/Reynolds, Principles of Information Systems, 14th Edition. © 2021 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Types of Attack Vectors
Attack type Description
Advanced A network attack in which an intruder gains access to a
persistent threat network and stays there—undetected—with the intention of
stealing data over a long period of time.
Blended threat A sophisticated threat that combines the features of a virus,
worm, Trojan horse, and other malicious code into a single
payload.
Phishing The act of fraudulently using email to try to get the recipient
to reveal personal data.
Rootkit A set of programs that enables its user to gain administrator-
level access to a computer without the end user’s consent or
knowledge. Once installed, the attacker can gain full control of
the system and even obscure the presence of the rootkit from
legitimate system administrators.
Stair/Reynolds, Principles of Information Systems, 14th Edition. © 2021 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Types of Attack Vectors
Stair/Reynolds, Principles of Information Systems, 14th Edition. © 2021 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Types of Attack Vectors
Stair/Reynolds, Principles of Information Systems, 14th Edition. © 2021 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Cyberattacks That Pose Serious
Threats
• Ransomware stops computer until ransom
paid
• Characteristics
• Payment frequently demanded in Bitcoin
• Victims often pay
• Attacks on the increase
• Average ransom demand is just over $1000
• 20% of victims never recover files
• Causes
• Infected email attachment or pop-up window
• Vulnerability in software such as Microsoft’s Server
Message Block (SMB)
Stair/Reynolds, Principles of Information Systems, 14th Edition. © 2021 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Cyberattacks That Pose Serious
Threats
• Distributed denial-of-service attacks
• Hacker takes over computers via the Internet
• Target computer responds to stream of automated
requests
• Botnet
• Large group of targeted computers controlled by
hackers from one or more remote locations
• Legitimate owners unaware of control
• Data breach
• Unauthorized individuals release or access sensitive
data
Stair/Reynolds, Principles of Information Systems, 14th Edition. © 2021 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Cyberattacks That Pose Serious
Threats
FIGURE 2.3
Data breaches in government and industrial sectors in 2017
Stair/Reynolds, Principles of Information Systems, 14th Edition. © 2021 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Cyberattacks That Pose Serious
Threats
• Cyberespionage
• Deployment of malware to secretly steal high-
value data
• Data providing an unfair competitive advantage to the
perpetrator
• Cyberterrorism
• Intimidation of government or civilian population
• Use of information technology to disable critical
national infrastructure
• Achieve political, religious, or ideological goals
Stair/Reynolds, Principles of Information Systems, 14th Edition. © 2021 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Consequences of a Successful
Cyberattack
FIGURE 2.4
consequences of a successful cyberattack
Stair/Reynolds, Principles of Information Systems, 14th Edition. © 2021 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
The CIA Security Triad
Stair/Reynolds, Principles of Information Systems, 14th Edition. © 2021 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
The CIA Security Triad
FIGURE 2.5
A multi-layered security solution
Stair/Reynolds, Principles of Information Systems, 14th Edition. © 2021 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Implementing CIA at the
Organizational Level
• Security strategy
• Start with a risk assessment
• Identify and prioritize threats the organization faces
• Define a disaster recovery plan
• Ensures data and technology assets availability
• Review security policies guiding employees
• Follow recommended processes and practices
• Perform security audits
• Ensure established policies being followed
• Regulatory standards compliance
Stair/Reynolds, Principles of Information Systems, 14th Edition. © 2021 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Implementing CIA at the
Organizational Level
Adverse Business (estimated (likelihood cost of a Risk = Threat × priority
event objective frequency of success of successful Vulnerability × to be
threatened of event) this threat) attack Estimated cost mitigated
Data Provide safe, 18 per year 3% $5,000,000 $2,700,000 1
breach secure Web
of site
customer consumers
account can trust
data
Distribut 24/7 3 per year 25% $500,000 $375,000 2
ed operation
denial-of- of a retail
service Web
(DDoS) site
attack
Stair/Reynolds, Principles of Information Systems, 14th Edition. © 2021 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Implementing CIA at the
Organizational Level
• Security dashboard
• Comprehensive display of performance
indicators
• Reduces effort to monitor and identify threats
Stair/Reynolds, Principles of Information Systems, 14th Edition. © 2021 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Implementing CIA at the
Organizational Level
FIGURE 2.6
An organizational security dashboard
Stair/Reynolds, Principles of Information Systems, 14th Edition. © 2021 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Implementing CIA at the Network
Level (1 of 6)
• Authentication methods
• Three types of user credentials
• Something you know (username, PIN or password)
• Something you possess (ID card, security card or
token)
• Something you are (biometric; fingerprint or retina scan)
• Use two-factor authorization
• Biometric authentication
• Physiological or behavioral measurements used
• Requires a reference model of the unique
characteristics stored digitally
Stair/Reynolds, Principles of Information Systems, 14th Edition. © 2021 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Implementing CIA at the Network
Level (2 of 6)
• Firewall
• Software, hardware, or a combination of both
• Stands between internal network and the
Internet
• Limits access based on access policy
• Next-generation firewall (NGFW)
• Hardware or software
• Detects and blocks sophisticated attacks
• Filters network traffic based on packet contents
• Goes deeper to inspect packet content
• Matches sequences of bytes for harmful activities
Stair/Reynolds, Principles of Information Systems, 14th Edition. © 2021 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Implementing CIA at the Network
Level (3 of 6)
• Routers
• Networking device connecting multiple
networks together
• Forwards data packets
• Uses passphrase for security
• Additional layer of security
• Specify unique media access control (MAC) address
of each legitimate device
• Can restrict access to specific Web sites
Stair/Reynolds, Principles of Information Systems, 14th Edition. © 2021 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Implementing CIA at the Network
Level (4 of 6)
• Encryption
• Scramble messages or data
• Only authorized parties can read data
• Encryption key
• Value applied to plaintext to produce ciphertext
• Required to decipher ciphertext
• Encryption algorithms
• Symmetric and asymmetric
• Advanced Encryption Standard (AES)
• Common symmetric algorithm
• Use by the WPA2 security protocol
Stair/Reynolds, Principles of Information Systems, 14th Edition. © 2021 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Implementing CIA at the Network
Level (5 of 6)
• Encryption (continued)
• Transport Layer Security (TLS)
• Communications protocol ensuring privacy between
communicating applications and their users on the Internet
• Proxy Servers and Virtual Private Networks
• Intermediary between a Web browser and another
Internet server
• Makes requests to Web sites, servers, and services
• Virtual private network (VPN)
• Enables remote users to access computing and storage
devices and share data
Stair/Reynolds, Principles of Information Systems, 14th Edition. © 2021 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Implementing CIA at the Network
Level (6 of 6)
FIGURE 2.7
Proxy Server
Stair/Reynolds, Principles of Information Systems, 14th Edition. © 2021 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Implementing CIA at the Application
Level
• Authentication
• Authenticate users before they access
applications
• Require two-factor authentication
• User roles and accounts
• Users have authority to perform responsibilities
• Nothing more
• Implement proper separation-of-duties
• Data encryption
• Use data encryption on all enterprise systems
Stair/Reynolds, Principles of Information Systems, 14th Edition. © 2021 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Implementing CIA at the End-User
Level (1 of 5)
• Security education
• Educate all workers
• Provide a security self-assessment
• Authentication methods
• Use multifactor schemes and fingerprints
• Antivirus software installed on each
computer
• Scan for a virus signature
• Data encryption
• Employ full-disk encryption to protect data
Stair/Reynolds, Principles of Information Systems, 14th Edition. © 2021 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Implementing CIA at the End-User
Level (2 of 5)
Security assessment question Yes No
Do you have the most current version of your computer’s operating
system installed?
Do you have the most current version of firewall, antivirus, and
malware software installed?
Do you install updates to all your software when you receive notice
that a new update is available?
Do you use different, strong passwords for each of your accounts
and applications—a minimum of 12 characters, with a mix of capital
and lowercase letters, numbers, and special characters?
Are you familiar with and do you follow your organization’s policies
for accessing corporate Web sites and applications from your home
or remote locations (e.g., access via a VPN)?
Stair/Reynolds, Principles of Information Systems, 14th Edition. © 2021 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Implementing CIA at the End-User
Level (3 of 5)
Security assessment question Yes No
Have you set the encryption method to WPA2 and changed the
default name and password on your home wireless router?
When using a free, public wireless network, do you avoid checking
your email or accessing Web sites requiring a username and
password?
Do you refrain from clicking on a URL in an email from someone you
do not know?
Do you back up critical files to a separate device at least once a
week?
Are you familiar with and do you follow your organization’s policies
regarding the storage of personal or confidential data on your
device?
Stair/Reynolds, Principles of Information Systems, 14th Edition. © 2021 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Implementing CIA at the End-User
Level (4 of 5)
Security assessment question Yes No
Does your device have a security passcode that must be entered
before it accepts further input?
Have you installed Locate My Device or similar software in case your
device is lost or stolen?
Do you make sure not to leave your device unattended in a public
place where it can be easily stolen?
Have you reviewed, and do you understand the privacy settings that
control who can see or read what you do on Facebook and other
social media sites?
Stair/Reynolds, Principles of Information Systems, 14th Edition. © 2021 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Implementing CIA at the End-User
Level (5 of 5)
• Implementing safeguards against attacks
by malicious insiders
• Departing employees and contractors
• Promptly delete their computer accounts, login IDs,
and passwords
• Define employee roles carefully
• Separate key responsibilities properly
• Roles and user accounts
• Enough authority to perform responsibilities
• Nothing more
Stair/Reynolds, Principles of Information Systems, 14th Edition. © 2021 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Detection of a Cyberattack
Stair/Reynolds, Principles of Information Systems, 14th Edition. © 2021 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Detection of a Cyberattack
Stair/Reynolds, Principles of Information Systems, 14th Edition. © 2021 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Response
• Incident notification
• Define who to notify
• Determine what to say
• Protection of evidence and activity logs
• Document as incident is resolved
• Capture evidence for future prosecution
• Capture system events, specific actions taken,
and external conversations in a logbook
• Use data for incident eradication and follow-up
Stair/Reynolds, Principles of Information Systems, 14th Edition. © 2021 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Response
• Incident containment
• Follow incident response plan
• Shut down or disconnect critical system from
the network
• Eradication
• Collect and log all possible criminal evidence
• Verify backups
• Create forensic disk image of compromised
system
• After virus eradication, create a new backup
Stair/Reynolds, Principles of Information Systems, 14th Edition. © 2021 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Response
• Incident follow-up
• Determine exactly what happened
• Evaluate the response
• Write a formal incident report
• Detailed event chronology and incident impact
• Report key elements
Stair/Reynolds, Principles of Information Systems, 14th Edition. © 2021 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Using a Managed Security Service
Provider (MSSP)
• Difficult to keep up with computer criminals
and with new laws and regulations
• Managed security service provider
(MSSP)
• Company that monitors, manages, and
maintains computer and network security for
other organizations
• Provides a valuable service for IS departments
• Provides vulnerability scanning and Web
blocking and filtering capabilities
Stair/Reynolds, Principles of Information Systems, 14th Edition. © 2021 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Computer Forensics
• Computer forensics
• Combines elements of law and computer
science
• Identifies, collects, examines, and preserves
data for admissibility in court
• Proper handling of a computer forensics
investigation is key for success in court of law
• Ask questions when evaluating readiness for a
security incident
Stair/Reynolds, Principles of Information Systems, 14th Edition. © 2021 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Computer Forensics
Question Yes No
Has a risk assessment been performed to identify investments in
time and resources that can protect the organization from its most
likely and most serious threats?
Have senior management and employees involved in implementing
security measures been educated about the concept of reasonable
assurance?
Has a security policy been formulated and broadly shared
throughout the organization?
Have automated systems policies been implemented that mirror
written policies?
Stair/Reynolds, Principles of Information Systems, 14th Edition. © 2021 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Computer Forensics
Question Yes No
Does the security policy address the following:
• Email with executable file attachments?
• Wireless networks and devices?
• Use of smartphones deployed as part of corporate rollouts as
well as those purchased by end users?
Question Yes No
Is the antivirus software frequently updated?
Have precautions been taken to limit the impact of malicious
insiders?
Are the accounts, passwords, and login IDs of former employees
promptly deleted?
Are employee responsibilities adequately defined and separated?
Are individual roles defined so that users have authority to perform
their responsibilities and nothing more?
Is it a requirement to review at least quarterly the most critical
Internet security threats and implement safeguards against them?
Stair/Reynolds, Principles of Information Systems, 14th Edition. © 2021 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Computer Forensics
Question Yes No
Has it been verified that backup processes for critical software and
databases work correctly?
Has an intrusion detection system been implemented to catch
intruders in the act—both in the network and on critical computers
on the network?
Are periodic IT security audits conducted?
Has a comprehensive incident response plan been developed?
Has the security plan been reviewed and approved by legal and
senior management?
Stair/Reynolds, Principles of Information Systems, 14th Edition. © 2021 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Computer Forensics
Question Yes No
Does the plan address all of the following areas:
• Incident notification?
• Protection of evidence and activity logs?
• Incident containment?
• Eradication?
• Incident follow-up?
Stair/Reynolds, Principles of Information Systems, 14th Edition. © 2021 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Summary
Stair/Reynolds, Principles of Information Systems, 14th Edition. © 2021 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.