管理信息系统 MIS课件:ch04 Security, Privacy, Anonymity_第1页
管理信息系统 MIS课件:ch04 Security, Privacy, Anonymity_第2页
管理信息系统 MIS课件:ch04 Security, Privacy, Anonymity_第3页
管理信息系统 MIS课件:ch04 Security, Privacy, Anonymity_第4页
管理信息系统 MIS课件:ch04 Security, Privacy, Anonymity_第5页
已阅读5页,还剩62页未读 继续免费阅读

下载本文档

版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领

文档简介

1、Introduction to MIS1Copyright 1998-2002 by Jerry PostIntroduction to MISChapter 4Security, Privacy, AnonymityIntroduction to MIS2OutlineThreats to InformationPhysical Security and Disaster PlanningLogical Security and Data ProtectionVirus ThreatsUser Identification and BiometricsAccess controlsEncry

2、ption and AuthenticationInternet Security IssuesPrivacyAnonymityCases: HealthcareAppendix: Server Security CertificatesIntroduction to MIS3Security, Privacy, and AnonymityServer AttacksData interceptionThe InternetMonitoringIntroduction to MIS4Threats to InformationAccidents & DisastersEmployees

3、 & ConsultantsBusiness PartnershipsOutsidersVirusesEmployees & ConsultantsLinks to businesspartnersOutsidehackersVirus hiding in e-mail attachment.Introduction to MIS5$Security CategoriesPhysical attack & disastersvBackup-off-sitevCold/Shell sitevHot sitevDisaster testsvPersonal computer

4、s!LogicalvUnauthorized disclosurevUnauthorized modificationvUnauthorized withholdingDenial of ServiceIntroduction to MIS6Horror StoriesSecurity Pacific-Oct. 1978vStanley Mark RifkinvElectronic Funds Transferv$10.2 millionvSwitzerlandvSoviet DiamondsvCame back to U.S.Equity Funding-1973vThe Impossibl

5、e DreamvStock ManipulationInsuranceLoansFake computer recordsRobert Morris-1989vGraduate StudentvUnix “Worm”vInternet-tied up for 3 daysClifford Stoll-1989vThe Cuckoos EggvBerkeley LabsvUnix-account not balancevMonitor, false informationvTrack to East German spyOld TechniquesvSalami slicevBank depos

6、it slipsvTrojan HorsevVirusIntroduction to MIS7Manual v Automated DataAmount of dataIdentification of usersDifficult to detect changesSpeedvSearchvCopyStatistical InferenceCommunication LinesIntroduction to MIS8SunGard is a premier provider of computer backup facilities and disaster planning service

7、s. Its fleet of Mobile Data Centers can be outfitted with a variety of distributed systems hardware and delivered at a disaster site within 48 hours.Disaster PlanningIntroduction to MIS9Data BackupBackup is criticalOffsite backup is criticalLevelsvRAID (multiple drives)vReal time replicationvSchedul

8、ed backupsIntroduction to MIS10Data BackupOffsite backups are critical.Frequent backups enable you to recover from disasters and mistakes.Use the network to backup PC data.Use duplicate mirrored servers for extreme reliability.UPSPower companyIntroduction to MIS11VirusAttachment01 23 05 06 77 033A 7

9、F 3C 5D 83 9419 2C 2E A2 87 6202 8E FA EA 12 7954 29 3F 4F 73 9F1231. User opens an attached program that contains hidden virus2. Virus copies itself into other programs on the computer3. Virus spreads until a certain date, then it deletes files.Virus codeFrom: afriendTo: victimMessage: Open the att

10、achment for some excitement. Introduction to MIS12Dataquest, Inc; Computerworld 12/2/91National Computer Security Association; Computerworld 5/6/96- Virus Damage1999 virus costs in the U.S.: $7.6 billion.Attacks1991199620002001Viruses/Trojans/Worms62808089Attacks on Web servers2448Deni

11、al of Service3739Insider physical theft or damage of equipment4942Insider electronic theft, destruction, or disclosure of data2422Fraud139Introduction to MIS13Stopping a VirusBackup your data!Never run applications unless you are certain they are safe.Never open executable attachments sent over the

12、Internet-regardless of who mailed them.Antivirus softwarevNeeds constant updatingvRarely catches current virusesvCan interfere with other programsUltimately, viruses sent over the Internet can be traced back to the original source.Introduction to MIS14User IdentificationPasswordsvDial up service fou

13、nd 30% of people used same wordvPeople choose obviousvPost-It notesHintsvDont use real wordsvDont use personal namesvInclude non-alphabeticvChange oftenvUse at least 6 charactersAlternatives: BiometricsvFinger/hand printvVoice recognitionvRetina/blood vesselsvIris scannervDNA ?Password generator car

14、dsCommentsvDont have to remembervReasonably accuratevPrice is droppingvNothing is perfectIntroduction to MIS15Iris Scanhttp:/ patents by JOHN DAUGMAN 1994 http:/www.cl.cam.ac.uk/jgd1000/http:/ System at Charlotte/Douglas International Airport.Introduction to MIS16Several methods exist to identify a

15、person based on biological characteristics. Common techniques include fingerprint, handprint readers, and retinal scanners. More exotic devices include body shape sensors and this thermal facial reader which uses infrared imaging to identify the user.Biometrics: ThermalIntroduction to MIS17Access Co

16、ntrols: Permissions in WindowsFind the folder or directory in explorer.Right-click to set properties.On the Security tab,assign permissions.Introduction to MIS18Security ControlsAccess ControlvOwnership of datavRead, Write, Execute, Delete, Change Permission, Take OwnershipSecurity MonitoringvAccess

17、 logsvViolationsvLock-outsR esource/ Files U sers B alance Sheet M arketing Forecast A ccounting R ead/ w rite R ead M arketing R ead R ead/ W rite E xecutive R ead R ead Introduction to MIS19Additional Controlshttp:/ checks:Introduction to MIS20Encryption: Single KeyEncrypt and decrypt with the sam

18、e keyvHow do you get the key safely to the other party?vWhat if there are many people involved?Fast encryption and decryptionvDES - old and falls to brute force attacksvTriple DES - old but slightly harder to break with brute force.vAES - new standardPlain textmessageEncryptedtextKey: 9837362Key: 98

19、37362AESEncryptedtextPlain textmessageAESSingle key: e.g., AESIntroduction to MIS21AliceBob消息公钥Alice 29Bob 17消息加密私钥13私钥37使用Bob的公钥使用Bob的私钥Alice 发出只有Bob本人能读的消息.Encryption: Dual KeyIntroduction to MIS22AliceBobPublic KeysAlice 29Bob 17Private Key13Private Key37UseBobsPublic keyUseBobsPrivate keyBob sen

20、ds message to Alice:His key guarantees it came from him.Her key prevents anyone else from reading message.MessageMessageEncrypt+TEncrypt+T+MEncrypt+MUseAlicesPublic keyUseAlicesPrivate keyTransmissionDual Key: AuthenticationIntroduction to MIS23Certificate AuthorityPublic keyvImposter could sign up

21、for a public key.vNeed trusted organization.vOnly Verisign today, a public company with no regulation.vVerisign mistakenly issued a certificate to an imposter claiming to work for Microsoft in 2001.AlicePublic KeysAlice 29Bob 17UseBobsPublic keyHow does Alice know that it is really Bobs key?Trust th

22、e C.A.C.A. validate applicantsIntroduction to MIS24Internet Data TransmissionStartDestinationEavesdropperIntermediate MachinesIntroduction to MIS25Encrypted conversationEscrow keysClipper chipin phonesInterceptDecrypted conversationJudicial orgovernment officeClipper Chip: Key EscrowIntroduction to

23、MIS26Denial Of ServiceZombie PCs at homes, schools, and businesses. Weak security.Break in.Flood program.Coordinated flood attack.Targeted server.Introduction to MIS27Securing E-Commerce Servershttp:/ Install and maintain a working network firewall to protect data accessible via the Internet. 2. Kee

24、p security patches up-to-date. 3. Encrypt stored data. 4. Encrypt data sent across networks. 5. Use and regularly update anti-virus software. 6. Restrict access to data by business need to know. 7. Assign a unique ID to each person with computer access to data. 8. Dont use vendor-supplied defaults f

25、or system passwords and other security parameters. 9. Track access to data by unique ID. 10. Regularly test security systems and processes. 11. Maintain a policy that addresses information security for employees and contractors. 12. Restrict physical access to cardholder information. Introduction to

26、 MIS28Internet FirewallCompany PCsInternal company data serversInternetFirewall routerFirewall routerExamines each packet and discards some types of requests.Keeps local data from going to Web servers.Introduction to MIS29Privacycredit cardsorganizationsloans & licensesfinancialpermitscensustran

27、sportation datafinancialregulatoryemploymentenvironmentalsubscriptionseducationpurchases phonecriminal recordcomplaintsfinger printsmedicalrecordsgrocery store scanner dataIntroduction to MIS30CookiesWeb serverUser PCtimeRequest page.Send page and cookie.Display page, store cookie.Find page.Request

28、new page and send cookie.Use cookie to identify user.Send customized page.Introduction to MIS31Misuse of Cookies: Third Party AdsUseful Web siteUser PCUseful Web PageText and graphicsAdvertisementsNational ad Web siteDLink to adsRequested pageAds, and cookieRequest pageHidden prior cookieIntroductio

29、n to MIS32Wireless PrivacyCell phones require connections to towersE-911 laws require location capabilityMany now come with integrated GPS unitsBusiness could market to customers “in the neighborhood”Tracking of employees is already commonIntroduction to MIS33Privacy ProblemsTRW-1991vNorwich, VTvLis

30、ted everyone delinquent on property taxesTerry Dean RoganvLost walletvImpersonator, 2 murders and 2 robberiesvNCIC databasevRogan arrested 5 times in 14 monthsvSued and won $55,000 from LAEmployeesv26 million monitored electronicallyv10 million pay based on statisticsJeffrey McFadden-1989vSSN and Do

31、B for William Kalin from military recordsvGot fake Kentucky IDvWrote $6000 in bad checksvKalin spent 2 days in jailvSued McFadden, won $10,000San Francisco Chronicle-1991vPerson found 12 others using her SSNvSomeone got 16 credit cards from anothers SSN, charged $10,000vSomeone discovered unemployme

32、nt benefits had already been collected by 5 othersIntroduction to MIS34Privacy LawsMinimal in USvCredit reportsRight to add comments1994 disputes settled in 30 days1994 some limits on access to datavBork Bill-cant release video rental datavEducational data-limited availabilityv1994 limits on selling

33、 state/local datav2001 rules on medical dataEuropevFrance and some other controlsv1995 EU Privacy ControlsIntroduction to MIS35Primary U.S. Privacy LawsFreedom of Information ActFamily Educational Rights and Privacy ActFair Credit Reporting ActPrivacy Act of 1974Privacy Protection Act of 1980Electro

34、nic Communications Privacy Act of 1986Video Privacy Act of 1988Drivers Privacy Protection Act of 19942001 Federal Medical Privacy rules (not a law)Introduction to MIS36AnonymityAnonymous servers: http:/Dianetics church (L. Ron Hubbard) officials in the U.S.vSued a former employee for leaking confide

35、ntial documents over the Internet.vHe posted them through a Danish anonymous server.vThe church pressured police to obtain the name of the poster.vZero knowledge server is more secureShould we allow anonymity on the Internet?vProtects privacyvCan encourage flow of informationChinese dissentersGovern

36、ment whistleblowersvCan be used for criminal activityIntroduction to MIS37Cases: HealthcareIntroduction to MIS38What is the companys current status?What is the Internet strategy?How does the company use information technology?What are the prospects for the industry?www.owens-Cases: Eli LillyOwens &a

37、mp; Minor, Inc.Introduction to MIS39Appendix: Digital Security CertificatesDigital security certificates are used to encrypt e-mail and to authenticate the sender.Obtain a certificate from a certificate authorityvVerisignvThawte (owned by Verisign)vMicrosoftvYour own company or agencyInstall the cer

38、tificate in OutlookSelect option boxes to encrypt or decrypt messagesInstall certificates sent by your friends and co-workers.Introduction to MIS40Obtaining a CertificateIntroduction to MIS41Installing a Certificate1.Tools + Options + Security tab2.Choose your certificate3.Check these boxes to add y

39、our digital signature and to encrypt messages.4.These boxes set the default choices. For each message, you can use the options to check or uncheck these boxes.Introduction to MIS42Encrypting and Signing MessagesUse the Options button and the Security Settings button to make sure the Encrypt and Sign

40、ature boxes are checked. Then the encryption and decryption are automatic.Introduction to MIS43Security, Privacy, and Anonymity服务器攻击者数据截听The Internet监控Introduction to MIS44Threats to InformationAccidents & DisastersEmployees & ConsultantsBusiness PartnershipsOutsidersViruses员工与咨询与商业伙伴的联接 外部黑

41、客隐藏在邮件中的病毒.Introduction to MIS45$Security CategoriesPhysical attack & disastersvBackup-off-sitevCold/Shell sitevHot sitevDisaster testsvPersonal computers!LogicalvUnauthorized disclosurevUnauthorized modificationvUnauthorized withholdingDenial of ServiceIntroduction to MIS46Iris Scanhttp:/ paten

42、ts by JOHN DAUGMAN 1994 http:/www.cl.cam.ac.uk/jgd1000/http:/ System at Charlotte/Douglas International Airport.Introduction to MIS47Virus附件附件01 23 05 06 77 033A 7F 3C 5D 83 9419 2C 2E A2 87 6202 8E FA EA 12 7954 29 3F 4F 73 9F123 用户打开含有病毒的邮件附件 病毒自我复制至计算机中的其它程序中 在某一个日期之前病毒在不停地传播,然后病毒开始删除计算机上的文件病毒代码F

43、rom: 一个朋友To: 受害者Message: 打开附件你会发现好东西. 用户计算机Introduction to MIS48Data Backup离线备份很重频繁的备份可以帮你免除灾难与错.通过网络进行PC数据备通过双机镜像服务器提供高可靠UPS电力公司Introduction to MIS49Additional Controlshttp:/ to MIS50Encryption: Single KeyEncrypt and decrypt with the same keyvHow do you get the key safely to the other party?vWhat i

44、f there are many people involved?Fast encryption and decryptionvDES - old and falls to brute force attacksvTriple DES - old but slightly harder to break with brute force.vAES - new standard原文本信息加密后文本Key: 9837362Key: 9837362AES加密后文本原文本信息AES单钥: 如AESIntroduction to MIS51AliceBob消息公钥Alice 29Bob 17消息加密私钥

45、13私钥37使用Bob的公钥使用Bob的私钥Alice 发出只有Bob本人能读的消息Encryption: Dual KeyIntroduction to MIS52AliceBob公钥Alice 29Bob 17私钥13Private Key37用Bob的公钥用Bob的私钥Bob 给Alice发消息: Bob的密钥保证了消息是从他那发出的。 Alice的密钥防止了其他人读取这个消息。消息消息加密T加密+T+M加密+M用Alice的公钥用Alice的私钥传送Dual Key: AuthenticationIntroduction to MIS53Internet Data Transmissi

46、on发送方目标方偷听者中间机器Introduction to MIS54加密谈话托管密钥电话中的微小芯片加密解密谈话法院或政府机构Clipper Chip: Key EscrowIntroduction to MIS55Denial Of Service位于赞比亚家庭、学校和商业机构的弱安全PC。插入洪水程序协调一致的洪水攻击.攻击目标.Introduction to MIS56Securing E-Commerce Servershttp:/ Install and maintain a working network firewall to protect data accessible via the Internet. 2. Keep security patches up-to-date. 3. Encrypt stored data. 4. Encrypt data sent

温馨提示

  • 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
  • 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
  • 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
  • 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
  • 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
  • 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
  • 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

评论

0/150

提交评论