SlideShare a Scribd company logo
1 of 54
www.themegallery.com
Financial Information Systems
AN-NAJAH
NATIONAL UNIVERSITY
Faculty of Economics and
Social Sciences
Department of Finance
Dr. Muath Asmar
Chapter 5
Cybersecurity
© Copyright 2014 Pearson Education. All Rights Reserved.
How Secure is Your Credit Card?
Meet Heartland.
© Copyright 2014 Pearson Education. All Rights Reserved.
What is Cybersecurity?
Cybersecurity combines people, processes, and technology
to continually monitor vulnerabilities and respond proactively
to secure the system.
Cybersecurity is a highly technical, specialized field.
The confidential nature of data stored in accounting systems
puts increasing pressure on accounting professionals to
understand IT security.
© Copyright 2014 Pearson Education. All Rights Reserved.
10 Domains of Cybersecurity
(ISC)2 International Information Systems
Security
© Copyright 2014 Pearson Education. All Rights Reserved.
1. Legal, regulations, compliance, and investigations
2. Information security and risk management
3. Security architecture and design
4. Telecommunications, network, and Internet security
5. Access control
6. Operations security
7. Physical and environmental security
8. Application security
9. Business continuity and disaster recovery
10. Cryptography
Learn Info Security Tech, Avoid Oops Please,
Accountants Beware Cybercrime!
What is the Legal, Regulations,
Compliance and Investigations Domain?
Cybercrimes: crimes connected to
information assets and IT.
Cyberlaws: laws and regulations to prevent,
investigate, and prosecute cybercrimes.
Cyber forensics: involves laws and
regulations to prevent, investigate, and
prosecute cybercrimes.
, examining, and preserving evidence of
cybercrimes.
© Copyright 2014 Pearson Education. All Rights Reserved.
93% of electronic records breached were in
the financial services industry.
90% of breaches were tied to organized crime.
Legal, Regulations, Compliance and
Investigations Domain
Cybercrime
© Copyright 2014 Pearson Education. All Rights Reserved.
Successful breaches typically involve an attacker
exploiting a mistake made by the victim
organization
Legal, Regulations, Compliance and
Investigations Domain
Cybercrime
© Copyright 2014 Pearson Education. All Rights Reserved.
Well-known cyberattacks include:
Salami attacks
Typically for very small amounts over numerous accounts that
accumulate into significant sums
Example: rounding interest calculations into an attacker’s account.
Social engineering
Manipulating an individual into divulging confidential information to be
used for fraudulent purposes.
Example: Phishing: faked IT email request to email back information
regarding your account
Legal, Regulations, Compliance and
Investigations Domain
Cybercrime
© Copyright 2014 Pearson Education. All Rights Reserved.
Well-known cyberattacks include:
Dumpster diving
Rummaging through garbage for discarded documents or digital media.
Example: buying discarded computer hardware and extracting data left
on the hard drive.
Password sniffing
Attempting to obtain passwords by sniffing messages sent between
computers on the network.
Example: Sniffing messages sent over a free Wi-Fi network at the local
coffee shop to obtain others’ passwords.
Legal, Regulations, Compliance and
Investigations Domain
Cybercrime
© Copyright 2014 Pearson Education. All Rights Reserved.
Cyberlaws are constantly evolving to meet more
sophisticated cyberattacks.
Laws related to cybersecurity originate from:
Legislation
Regulations
Case law
Legal, Regulations, Compliance and
Investigations Domain
Cyberlaw
© Copyright 2014 Pearson Education. All Rights Reserved.
Legislation affecting cyberlaw include:
Sarbanes-Oxley
Addresses requirements for proper internal control, including
information security and controls.
Gramm-Leach-Bliley Act
Requires institutions to have adequate cybersecurity to prevent
unauthorized sharing of customer data.
Payment Card Industry Data Security Standards
PCI-DSS legislation require organizations to meet cybersecurity
requirements to safeguard credit and debit card data, including security
for storage and transmission of payment card data.
Federal Information Security Management Act
Requires federal agencies and their contractors to have information
security programs.
Legal, Regulations, Compliance and
Investigations Domain
Cyberlaw
© Copyright 2014 Pearson Education. All Rights Reserved.
Collecting, examining, and preserving evidence of
cybercrimes.
Organizations often use law enforcement,
regulatory agencies, and outside consultants to
conduct cyber forensic investigations.
Legal, Regulations, Compliance and
Investigations Domain
Cyber Forensics
© Copyright 2014 Pearson Education. All Rights Reserved.
What is the Information Security and
Risk Management Domain?
Information security and risk management
consists of the preventive and proactive
measures taken to prevent cybercrimes.
Information security: policies and procedures
required to secure information assets,
including IT hardware, software, and stored
data.
Information risk management: manages the
risk related to information assets and IT and is
part of the larger enterprise risk management
(ERM).
© Copyright 2014 Pearson Education. All Rights Reserved.
Information Security and Risk Management Domain
Security Management Principles
Fundamental principles of information security include
CIA:
Confidentiality: Sensitive data at each point in
information processing is secure and protected from
unauthorized access
Integrity: Data is accurate and reliable.
Availability: Required data is available as needed by
an organization’s users, such as accountants. If data is
destroyed, data can be restored so it is available.
© Copyright 2014 Pearson Education. All Rights Reserved.
Information Security and Risk Management Domain
Information Security Management
Information security management involves developing and
enforcing security policies, standards, guidelines and procedures
for information.
Three types of information security controls are:
Administrative controls: security policies, standards,
guidelines and procedures to screen employees and provide
security training.
Technical or logical controls: security policies, standards,
guidelines and procedures for access control and configuration of
IT infrastructure.
Physical controls: includes facility access control,
environmental controls, and intrusion detection.
© Copyright 2014 Pearson Education. All Rights Reserved.
Information Security and Risk Management Domain
Security Frameworks
A security framework provides a conceptual structure to
address security and control. Security frameworks
include:
Control Objectives for Information and Related
Technology (COBIT) for managing IT security.
Committee on Sponsoring Organizations of the
Treadway Commission (COSO) provides a framework
for corporate governance.
International Standardization Organization ISO
27000 contains specifications for an information security
management system.
© Copyright 2014 Pearson Education. All Rights Reserved.
What is the Security Architecture
and Design Domain?
Security architecture and design domain relates
to security for IT architecture and design.
IT architecture consists of architecture for
computers, networks, and databases.
© Copyright 2014 Pearson Education. All Rights Reserved.
Security Architecture and Design Domain
Network Architecture
Networks are interconnected computers and devices.
Network architecture consists of network hardware and
software.
Three categories of networks:
Local area networks (LANs)
Metropolitan area networks (MANs)
Wide area networks (WANs)
© Copyright 2014 Pearson Education. All Rights Reserved.
Security Architecture and Design Domain
Network Architecture
Local area network (LAN)
© Copyright 2014 Pearson Education. All Rights Reserved.
Security Architecture and Design Domain
Network Architecture
Metropolitan area network (MAN)
© Copyright 2014 Pearson Education. All Rights Reserved.
Security Architecture and Design Domain
Network Architecture
Wide area network (WAN)
© Copyright 2014 Pearson Education. All Rights Reserved.
Security Architecture and Design Domain
Network Architecture
LAN Cluster
© Copyright 2014 Pearson Education. All Rights Reserved.
Security Architecture and Design Domain
Network Architecture
Enterprise Intranet
© Copyright 2014 Pearson Education. All Rights Reserved.
Security Architecture and Design Domain
Network Protocols
© Copyright 2014 Pearson Education. All Rights Reserved.
Ethernet protocol is a software program commonly used to connect computers to create a LAN.
Internet protocol (IP) is a software program that provides routing services to messages transmitted
over the Internet. This protocol provides the IP addresses, which uniquely identify the sender and
receiver's computers (for example, 193.168.0.103).
Transport control protocol (TCP) provides message transportation services between sending and
receiving computers. The Internet uses TCP and IP (TCP/IP suite) to address and transport messages
from sender to receiver.
Electronic data interchange (EDI) is a protocol that allows the enterprise network to connect to the
network of vendors and suppliers through proprietary lines.
What is the Telecommunications,
Network and Internet Security Domain?
This domain covers security for
telecommunications, networks, and the Internet.
Telecommunications, networks, and the Internet
all relate to data transmission.
© Copyright 2014 Pearson Education. All Rights Reserved.
Cyberattacks often target network access points
(NAP) because they offer access to the network.
Routers, bridges, and gateways are access points to
the network.
Firewalls (software programs) that control traffic
between two networks can be installed on these
routing devices to prevent unauthorized access.
Telecommunications, Network & Internet
Security Domain
Network Security
© Copyright 2014 Pearson Education. All Rights Reserved.
Telecommunications, Network & Internet
Security Domain
Network Security
Enterprise Intranet with Firewalls
© Copyright 2014 Pearson Education. All Rights Reserved.
Firewalls play an important role in e-commerce.
If the website server is behind a high-security firewall,
the website cannot be accessed by the general public.
If the website is in front of the enterprise firewall, then
hackers may deface the website.
To address this dilemma, an enterprise places its web
servers behind a low-level security firewall which is the
first firewall to the outside world. Another high-level
security firewall is located behind the web servers.
Telecommunications, Network & Internet
Security Domain
Internet Security
© Copyright 2014 Pearson Education. All Rights Reserved.
Telecommunications, Network & Internet
Security Domain
Internet Security
E-Commerce Architecture Using Firewalls and DMZ
Demilitarized zone (DMZ) is the area between
the first and second firewall.
© Copyright 2014 Pearson Education. All Rights Reserved.
Telecommunications, Network & Internet
Security Domain
Internet Security
Enterprise Intranet with Honeypot
Honeypot is a
computer located in
the DMZ with
attractive, but
irrelevant data.
The honeypot is used
to distract hackers.
Organizations may
catch hackers by
tracing them back to
their source while the
hackers are busy
hacking the honeypot.
© Copyright 2014 Pearson Education. All Rights Reserved.
What is the Control Access Domain?
The control access domain addresses security for
access to the enterprise system, including computers,
networks, routers and databases.
Access control threats include:
Network sniffers that examines traffic on the network
Phishing to obtain confidential information
Identify theft
© Copyright 2014 Pearson Education. All Rights Reserved.
Security principles for access control include:
Identification
Authentication
Authorization
Accountability
For a user to be allowed access to a secured system
(computers and network) the user should be identified,
authenticated, and then authorized to access the
system.
Access Control Domain
Access Control Principles
© Copyright 2014 Pearson Education. All Rights Reserved.
To identify users, usernames and passwords may be
required to log in to the system.
Password management involves:
Number of passwords a user has
How frequently the password must be changed
Password format including length and type (e.g.,
alphanumeric)
Number of incorrect login attempts
Access Control Domain
Password Management
© Copyright 2014 Pearson Education. All Rights Reserved.
Dynamic password: a password that is used once
and then changed.
Token device (TD):
Is a hardware device containing a password
generator protocol.
Creates a new password each time the token is
used.
Eliminates the need for the user to memorize a
continually changing password.
Single sign-on (SSO): permits the user to use one
username and password to log into various systems.
Access Control Domain
Password Management
© Copyright 2014 Pearson Education. All Rights Reserved.
Biometrics is an access method which identifies the
user by analyzing his/her personal attributes.
Biometrics include:
fingerprints
face recognition
retina scans
palm scans
Access Control Domain
Biometric Access
© Copyright 2014 Pearson Education. All Rights Reserved.
Intrusion prevention systems (IPS) attempt to
prevent cyberattacks from occurring.
Intrusion detection systems (IDS) are inadequate
because the attack has already occurred.
IPS can include sniffers used by the enterprise to
detect malicious messages on its own network. The
message can be destroyed before causing harm.
Access Control Domain
Intrusion Prevention Systems
© Copyright 2014 Pearson Education. All Rights Reserved.
What is the Operations Security Domain?
Operations security refers to activities and procedures required to
keep information technology running securely
IT security management includes responsibility for maintaining
security devices and software, such as virus detection, firewalls,
Intrusion Prevention Systems (IPS), and Intrusion Detection
Systems (IDS). Security assessment is carried out on a scheduled
basis to evaluate the security of the various components of the
enterprise system.
IT security operational responsibilities relate to how the enterprise
system operates. It includes input/output controls, accounting for
software licenses, training for all employees regarding security
procedures, conducting vulnerability checks, and developing
contingency plans for cyberattacks.
© Copyright 2014 Pearson Education. All Rights Reserved.
What is the Physical and
Environmental Security Domain?
The physical and environmental security domain
addresses the physical security of information
technology components, such as hardware and
software.
Physical threats include natural environmental
disasters, such as fire and flood, supply system
threats, man-made threats, and politically
motivated threats.
© Copyright 2014 Pearson Education. All Rights Reserved.
What is the Application Security Domain?
The application security domain addresses
security and controls for application software,
including input, processing, and output.
Application software includes accounting and
spreadsheet software that accounting
professionals use daily.
© Copyright 2014 Pearson Education. All Rights Reserved.
Malware (malicious software) is spread throughout
an enterprise system by email, fake advertisements,
Internet downloads, and shared drives.
Malware includes:
Viruses
Bots
Worms
Logic bombs
Trojan horses
Spam
Application Security Domain
Malware
© Copyright 2014 Pearson Education. All Rights Reserved.
Bots: (short for robots) a tiny piece of programming code which installs
itself on a Zombie (infected computer). Bots monitor the Zombie computer
and transmit information back to the Master (hacker’s computer).
Application Security Domain
Malware
© Copyright 2014 Pearson Education. All Rights Reserved.
Viruses: a small computer program that infects other application
software by attaching to and disrupting the application’s function.
Antivirus software can detect and remove viruses.
Logic bombs: malware that executes when a specified event
happens within the computer, as for example, when the user logs
into his or her bank account.
Trojan horses: malware disguised as a legitimate program that
may be downloaded and installed by users without realizing it is a
virus.
Spam: malware sent by email. Spam can be a virus, bot, logic
bomb, worm, or Trojan horse.
Application Security Domain
Malware
© Copyright 2014 Pearson Education. All Rights Reserved.
What is the Business Continuity and
Disaster Recovery Domain?
This domain addresses an enterprise’s business
continuity and disaster recovery plan.
The goals of a disaster recovery plan include:
Minimize disruption, damage, and loss from a
disaster
Provide a temporary method for processing
business and accounting transactions
Resume normal operations quickly
© Copyright 2014 Pearson Education. All Rights Reserved.
Accounting data backups are critical and should be
scheduled on a regular basis.
Grandfather-Father-Son method involves making
multiple backups, one each day, for example.
Monday backup (Grandfather)
Tuesday backup (Father)
Wednesday backup (Son)
and so on....
Business Continuity and Disaster Recovery Domain
Backup Methods
© Copyright 2014 Pearson Education. All Rights Reserved.
Backup facilities can include:
Reciprocal agreements between organizations can be used to
provide backup services.
Internal sites can be used by large organizations with multiple
locations.
Hot site is a commercial disaster recovery service that can be leased
by an enterprise to provide IT services in the event of a disaster, fully
operational in a few hours.
Warm site is a commercial disaster recovery service that is only
partially configured with some equipment and may take a few days to be
operational.
Cold site is a commercial disaster recovery service providing air
conditioning, wiring, and plumbing, but no IT equipment, taking several
days to be operational.
Business Continuity and Disaster Recovery Domain
Backup Facilities
© Copyright 2014 Pearson Education. All Rights Reserved.
What is the Cryptography Domain?
Cryptography is
encoding data in a
form that only the
sender and intended
receiver can
understand.
Encryption is a
method of converting
plaintext data into an
unreadable form called
ciphertext.
Ciphertext is
converted back to plain
text using decryption.
© Copyright 2014 Pearson Education. All Rights Reserved.
Encryption methods determine
the number of keys and how the
keys are used to encode and
decode data.
Encryption methods include:
Symmetric cryptography or 1
key method: This method uses 1
key to encode and the same key
to decode. Both the sender and
the recipient have the same key
Cryptography Domain
Encryption Methods
Symmetric Cryptography (1 Key Method)
© Copyright 2014 Pearson Education. All Rights Reserved.
Encryption methods include:
Asymmetric cryptography or 2
key method: Uses two keys with
one key used to encode and a
second related, but different key to
decode the message.
Public key: key used to
encrypt the message.
Private key: key used to
decode the message.
Cryptography Domain
Encryption Methods
Asymmetric Cryptography (2 Key Method)
© Copyright 2014 Pearson Education. All Rights Reserved.
Encryption methods include:
Digital envelope or 3 key method: This method combines
symmetric and asymmetric cryptography. First, the intended
recipient’s message is encoded using symmetric encryption, and
then the key to decode the message is encrypted using recipient's
public-key encryption.
Cryptography Domain
Encryption Methods
© Copyright 2014 Pearson Education. All Rights Reserved.
Encryption is a useful tool for protecting data in transit and
when stored in databases.
As encryption tools have improved, crackers (high-level
hackers) use more sophisticated techniques to bypass data
encryption.
Example: malware that captures keystrokes for data as the user
is entering the data into the computer screen. Data is
captured by the cracker before there is a chance for it to be
encrypted.
Cryptography Domain
Encryption Methods
© Copyright 2014 Pearson Education. All Rights Reserved.
© Copyright 2014 Pearson Education. All Rights Reserved.
Exercise
1. Write down a message using the encryption key shown in Figure 11.14.
2. Exchange your encrypted message with a classmate.
3. Decipher your classmate’s message using the decryption key shown in Figure
11.14.
4. Compare your decryption with your classmate’s original message. How did
you do?
My Connection
Study Less. Learn More. Make Connections.
© Copyright 2014 Pearson Education. All Rights Reserved.

More Related Content

What's hot

LBBD ICT Strategy Report 2013-17
LBBD ICT Strategy Report 2013-17LBBD ICT Strategy Report 2013-17
LBBD ICT Strategy Report 2013-17
Fayzan Rehman
 
Information system in global business uwsb
Information system in global business   uwsbInformation system in global business   uwsb
Information system in global business uwsb
Arnab Roy Chowdhury
 
Global e business and collaboration ,Management information system for BBA Ho...
Global e business and collaboration ,Management information system for BBA Ho...Global e business and collaboration ,Management information system for BBA Ho...
Global e business and collaboration ,Management information system for BBA Ho...
Tonmoy zahid Rishad
 
Business information systems in your career
Business information systems in your careerBusiness information systems in your career
Business information systems in your career
Prof. Othman Alsalloum
 
Key elements of an ICT vision statement
Key elements of an ICT vision statementKey elements of an ICT vision statement
Key elements of an ICT vision statement
Naace Naace
 
MIS (Belize Presentation)
MIS (Belize Presentation)MIS (Belize Presentation)
MIS (Belize Presentation)
Hans Gillett
 
Whitepaper Real Time Transaction Analysis And Fraudulent Transaction Detect...
Whitepaper   Real Time Transaction Analysis And Fraudulent Transaction Detect...Whitepaper   Real Time Transaction Analysis And Fraudulent Transaction Detect...
Whitepaper Real Time Transaction Analysis And Fraudulent Transaction Detect...
Alan McSweeney
 
Week 1 and 2
Week 1 and 2Week 1 and 2
Week 1 and 2
adrenal
 

What's hot (20)

Introduction to information system
Introduction to information systemIntroduction to information system
Introduction to information system
 
comparision between IT and Information system
comparision between IT and Information systemcomparision between IT and Information system
comparision between IT and Information system
 
Chapter 1-information systems in global business today
Chapter 1-information systems in global business todayChapter 1-information systems in global business today
Chapter 1-information systems in global business today
 
MIS managing digital firms companies
MIS managing digital firms companies MIS managing digital firms companies
MIS managing digital firms companies
 
LBBD ICT Strategy Report 2013-17
LBBD ICT Strategy Report 2013-17LBBD ICT Strategy Report 2013-17
LBBD ICT Strategy Report 2013-17
 
Information system in global business uwsb
Information system in global business   uwsbInformation system in global business   uwsb
Information system in global business uwsb
 
Exploring the Difference Between Information Technology and Information System
Exploring the Difference Between Information Technology and Information SystemExploring the Difference Between Information Technology and Information System
Exploring the Difference Between Information Technology and Information System
 
Global e business and collaboration ,Management information system for BBA Ho...
Global e business and collaboration ,Management information system for BBA Ho...Global e business and collaboration ,Management information system for BBA Ho...
Global e business and collaboration ,Management information system for BBA Ho...
 
Business information systems in your career
Business information systems in your careerBusiness information systems in your career
Business information systems in your career
 
Information systems in global business today in Management information system...
Information systems in global business today in Management information system...Information systems in global business today in Management information system...
Information systems in global business today in Management information system...
 
Laudon mis14 ch02
Laudon mis14 ch02Laudon mis14 ch02
Laudon mis14 ch02
 
The Belgian Railways Journey to Enterprise Information Management
The Belgian Railways Journey to Enterprise Information ManagementThe Belgian Railways Journey to Enterprise Information Management
The Belgian Railways Journey to Enterprise Information Management
 
Bitt I 2008 Lec1
Bitt I 2008 Lec1Bitt I 2008 Lec1
Bitt I 2008 Lec1
 
Key elements of an ICT vision statement
Key elements of an ICT vision statementKey elements of an ICT vision statement
Key elements of an ICT vision statement
 
Chapter 5
Chapter 5Chapter 5
Chapter 5
 
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Ethical and social issues in information systems
 
MIS (Belize Presentation)
MIS (Belize Presentation)MIS (Belize Presentation)
MIS (Belize Presentation)
 
Whitepaper Real Time Transaction Analysis And Fraudulent Transaction Detect...
Whitepaper   Real Time Transaction Analysis And Fraudulent Transaction Detect...Whitepaper   Real Time Transaction Analysis And Fraudulent Transaction Detect...
Whitepaper Real Time Transaction Analysis And Fraudulent Transaction Detect...
 
Week 1 and 2
Week 1 and 2Week 1 and 2
Week 1 and 2
 
HOW INFORMATION SYSTEM IS EFFECT ON AN ORGANIZATION
HOW INFORMATION SYSTEM IS EFFECT ON AN ORGANIZATIONHOW INFORMATION SYSTEM IS EFFECT ON AN ORGANIZATION
HOW INFORMATION SYSTEM IS EFFECT ON AN ORGANIZATION
 

Similar to Chapter 5

Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdf
Careerera
 
Global Perspective Cyberlaw, Regulations and Compliance
Global Perspective Cyberlaw, Regulations and ComplianceGlobal Perspective Cyberlaw, Regulations and Compliance
Global Perspective Cyberlaw, Regulations and Compliance
ijtsrd
 
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
anjalee990
 
cnsunit1-slide-220111071646 (1).pdf
cnsunit1-slide-220111071646 (1).pdfcnsunit1-slide-220111071646 (1).pdf
cnsunit1-slide-220111071646 (1).pdf
RiyaSonawane
 

Similar to Chapter 5 (20)

All About Network Security & its Essentials.pptx
All About Network Security & its Essentials.pptxAll About Network Security & its Essentials.pptx
All About Network Security & its Essentials.pptx
 
Top 25 SOC Analyst interview questions that You Should Know.pptx
Top 25 SOC Analyst interview questions that You Should Know.pptxTop 25 SOC Analyst interview questions that You Should Know.pptx
Top 25 SOC Analyst interview questions that You Should Know.pptx
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdf
 
Cyber Security Intelligence
Cyber Security IntelligenceCyber Security Intelligence
Cyber Security Intelligence
 
Cybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdfCybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdf
 
Unit 1 Information Security.docx
Unit 1 Information Security.docxUnit 1 Information Security.docx
Unit 1 Information Security.docx
 
CCA study group
CCA study groupCCA study group
CCA study group
 
Global Perspective Cyberlaw, Regulations and Compliance
Global Perspective Cyberlaw, Regulations and ComplianceGlobal Perspective Cyberlaw, Regulations and Compliance
Global Perspective Cyberlaw, Regulations and Compliance
 
Awareness Security Session 2023 v1.0.pptx.pdf
Awareness Security Session 2023 v1.0.pptx.pdfAwareness Security Session 2023 v1.0.pptx.pdf
Awareness Security Session 2023 v1.0.pptx.pdf
 
cybersecurityprt-131017183506-phpapp02.pdf
cybersecurityprt-131017183506-phpapp02.pdfcybersecurityprt-131017183506-phpapp02.pdf
cybersecurityprt-131017183506-phpapp02.pdf
 
cybersecurityprt-131017183506-phpapp02.pdf
cybersecurityprt-131017183506-phpapp02.pdfcybersecurityprt-131017183506-phpapp02.pdf
cybersecurityprt-131017183506-phpapp02.pdf
 
Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
 
National cyber security policy final
National cyber security policy finalNational cyber security policy final
National cyber security policy final
 
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
 
CRYPTOGRAPHY & NETWORK SECURITY - unit 1
CRYPTOGRAPHY & NETWORK SECURITY -  unit 1CRYPTOGRAPHY & NETWORK SECURITY -  unit 1
CRYPTOGRAPHY & NETWORK SECURITY - unit 1
 
cnsunit1-slide-220111071646 (1).pdf
cnsunit1-slide-220111071646 (1).pdfcnsunit1-slide-220111071646 (1).pdf
cnsunit1-slide-220111071646 (1).pdf
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Security of IOT,OT And IT.pptx
Security of IOT,OT And IT.pptxSecurity of IOT,OT And IT.pptx
Security of IOT,OT And IT.pptx
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Do You Know About Cyber Security? | Secninjaz Technologies LLP
Do You Know About Cyber Security? | Secninjaz Technologies LLP Do You Know About Cyber Security? | Secninjaz Technologies LLP
Do You Know About Cyber Security? | Secninjaz Technologies LLP
 

More from Dr. Muath Asmar (20)

Saunders 8e ppt_chapter22
Saunders 8e ppt_chapter22Saunders 8e ppt_chapter22
Saunders 8e ppt_chapter22
 
Saunders 8e ppt_chapter21
Saunders 8e ppt_chapter21Saunders 8e ppt_chapter21
Saunders 8e ppt_chapter21
 
Saunders 8e ppt_chapter20
Saunders 8e ppt_chapter20Saunders 8e ppt_chapter20
Saunders 8e ppt_chapter20
 
Saunders 8e ppt_chapter19
Saunders 8e ppt_chapter19Saunders 8e ppt_chapter19
Saunders 8e ppt_chapter19
 
Saunders 8e ppt_chapter18
Saunders 8e ppt_chapter18Saunders 8e ppt_chapter18
Saunders 8e ppt_chapter18
 
Saunders 8e ppt_chapter17
Saunders 8e ppt_chapter17Saunders 8e ppt_chapter17
Saunders 8e ppt_chapter17
 
Saunders 8e ppt_chapter16
Saunders 8e ppt_chapter16Saunders 8e ppt_chapter16
Saunders 8e ppt_chapter16
 
Saunders 8e ppt_chapter15
Saunders 8e ppt_chapter15Saunders 8e ppt_chapter15
Saunders 8e ppt_chapter15
 
Saunders 8e ppt_chapter14
Saunders 8e ppt_chapter14Saunders 8e ppt_chapter14
Saunders 8e ppt_chapter14
 
Saunders 8e ppt_chapter12
Saunders 8e ppt_chapter12Saunders 8e ppt_chapter12
Saunders 8e ppt_chapter12
 
Saunders 8e ppt_chapter11
Saunders 8e ppt_chapter11Saunders 8e ppt_chapter11
Saunders 8e ppt_chapter11
 
Saunders 8e ppt_chapter15
Saunders 8e ppt_chapter15Saunders 8e ppt_chapter15
Saunders 8e ppt_chapter15
 
Saunders 8e ppt_chapter01
Saunders 8e ppt_chapter01Saunders 8e ppt_chapter01
Saunders 8e ppt_chapter01
 
Chapter (11).
Chapter (11).Chapter (11).
Chapter (11).
 
Chapter (10).
Chapter (10).Chapter (10).
Chapter (10).
 
Chapter (9).
Chapter (9).Chapter (9).
Chapter (9).
 
Chapter (8).
Chapter (8).Chapter (8).
Chapter (8).
 
Chapter (7).
Chapter (7).Chapter (7).
Chapter (7).
 
Chapter (1).
Chapter (1).Chapter (1).
Chapter (1).
 
Chapter (25).
Chapter (25).Chapter (25).
Chapter (25).
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 

Chapter 5

  • 1. www.themegallery.com Financial Information Systems AN-NAJAH NATIONAL UNIVERSITY Faculty of Economics and Social Sciences Department of Finance Dr. Muath Asmar
  • 2. Chapter 5 Cybersecurity © Copyright 2014 Pearson Education. All Rights Reserved.
  • 3. How Secure is Your Credit Card? Meet Heartland. © Copyright 2014 Pearson Education. All Rights Reserved.
  • 4. What is Cybersecurity? Cybersecurity combines people, processes, and technology to continually monitor vulnerabilities and respond proactively to secure the system. Cybersecurity is a highly technical, specialized field. The confidential nature of data stored in accounting systems puts increasing pressure on accounting professionals to understand IT security. © Copyright 2014 Pearson Education. All Rights Reserved.
  • 5. 10 Domains of Cybersecurity (ISC)2 International Information Systems Security © Copyright 2014 Pearson Education. All Rights Reserved. 1. Legal, regulations, compliance, and investigations 2. Information security and risk management 3. Security architecture and design 4. Telecommunications, network, and Internet security 5. Access control 6. Operations security 7. Physical and environmental security 8. Application security 9. Business continuity and disaster recovery 10. Cryptography Learn Info Security Tech, Avoid Oops Please, Accountants Beware Cybercrime!
  • 6.
  • 7. What is the Legal, Regulations, Compliance and Investigations Domain? Cybercrimes: crimes connected to information assets and IT. Cyberlaws: laws and regulations to prevent, investigate, and prosecute cybercrimes. Cyber forensics: involves laws and regulations to prevent, investigate, and prosecute cybercrimes. , examining, and preserving evidence of cybercrimes. © Copyright 2014 Pearson Education. All Rights Reserved.
  • 8. 93% of electronic records breached were in the financial services industry. 90% of breaches were tied to organized crime. Legal, Regulations, Compliance and Investigations Domain Cybercrime © Copyright 2014 Pearson Education. All Rights Reserved.
  • 9. Successful breaches typically involve an attacker exploiting a mistake made by the victim organization Legal, Regulations, Compliance and Investigations Domain Cybercrime © Copyright 2014 Pearson Education. All Rights Reserved.
  • 10. Well-known cyberattacks include: Salami attacks Typically for very small amounts over numerous accounts that accumulate into significant sums Example: rounding interest calculations into an attacker’s account. Social engineering Manipulating an individual into divulging confidential information to be used for fraudulent purposes. Example: Phishing: faked IT email request to email back information regarding your account Legal, Regulations, Compliance and Investigations Domain Cybercrime © Copyright 2014 Pearson Education. All Rights Reserved.
  • 11. Well-known cyberattacks include: Dumpster diving Rummaging through garbage for discarded documents or digital media. Example: buying discarded computer hardware and extracting data left on the hard drive. Password sniffing Attempting to obtain passwords by sniffing messages sent between computers on the network. Example: Sniffing messages sent over a free Wi-Fi network at the local coffee shop to obtain others’ passwords. Legal, Regulations, Compliance and Investigations Domain Cybercrime © Copyright 2014 Pearson Education. All Rights Reserved.
  • 12. Cyberlaws are constantly evolving to meet more sophisticated cyberattacks. Laws related to cybersecurity originate from: Legislation Regulations Case law Legal, Regulations, Compliance and Investigations Domain Cyberlaw © Copyright 2014 Pearson Education. All Rights Reserved.
  • 13. Legislation affecting cyberlaw include: Sarbanes-Oxley Addresses requirements for proper internal control, including information security and controls. Gramm-Leach-Bliley Act Requires institutions to have adequate cybersecurity to prevent unauthorized sharing of customer data. Payment Card Industry Data Security Standards PCI-DSS legislation require organizations to meet cybersecurity requirements to safeguard credit and debit card data, including security for storage and transmission of payment card data. Federal Information Security Management Act Requires federal agencies and their contractors to have information security programs. Legal, Regulations, Compliance and Investigations Domain Cyberlaw © Copyright 2014 Pearson Education. All Rights Reserved.
  • 14. Collecting, examining, and preserving evidence of cybercrimes. Organizations often use law enforcement, regulatory agencies, and outside consultants to conduct cyber forensic investigations. Legal, Regulations, Compliance and Investigations Domain Cyber Forensics © Copyright 2014 Pearson Education. All Rights Reserved.
  • 15. What is the Information Security and Risk Management Domain? Information security and risk management consists of the preventive and proactive measures taken to prevent cybercrimes. Information security: policies and procedures required to secure information assets, including IT hardware, software, and stored data. Information risk management: manages the risk related to information assets and IT and is part of the larger enterprise risk management (ERM). © Copyright 2014 Pearson Education. All Rights Reserved.
  • 16. Information Security and Risk Management Domain Security Management Principles Fundamental principles of information security include CIA: Confidentiality: Sensitive data at each point in information processing is secure and protected from unauthorized access Integrity: Data is accurate and reliable. Availability: Required data is available as needed by an organization’s users, such as accountants. If data is destroyed, data can be restored so it is available. © Copyright 2014 Pearson Education. All Rights Reserved.
  • 17. Information Security and Risk Management Domain Information Security Management Information security management involves developing and enforcing security policies, standards, guidelines and procedures for information. Three types of information security controls are: Administrative controls: security policies, standards, guidelines and procedures to screen employees and provide security training. Technical or logical controls: security policies, standards, guidelines and procedures for access control and configuration of IT infrastructure. Physical controls: includes facility access control, environmental controls, and intrusion detection. © Copyright 2014 Pearson Education. All Rights Reserved.
  • 18. Information Security and Risk Management Domain Security Frameworks A security framework provides a conceptual structure to address security and control. Security frameworks include: Control Objectives for Information and Related Technology (COBIT) for managing IT security. Committee on Sponsoring Organizations of the Treadway Commission (COSO) provides a framework for corporate governance. International Standardization Organization ISO 27000 contains specifications for an information security management system. © Copyright 2014 Pearson Education. All Rights Reserved.
  • 19. What is the Security Architecture and Design Domain? Security architecture and design domain relates to security for IT architecture and design. IT architecture consists of architecture for computers, networks, and databases. © Copyright 2014 Pearson Education. All Rights Reserved.
  • 20. Security Architecture and Design Domain Network Architecture Networks are interconnected computers and devices. Network architecture consists of network hardware and software. Three categories of networks: Local area networks (LANs) Metropolitan area networks (MANs) Wide area networks (WANs) © Copyright 2014 Pearson Education. All Rights Reserved.
  • 21. Security Architecture and Design Domain Network Architecture Local area network (LAN) © Copyright 2014 Pearson Education. All Rights Reserved.
  • 22. Security Architecture and Design Domain Network Architecture Metropolitan area network (MAN) © Copyright 2014 Pearson Education. All Rights Reserved.
  • 23. Security Architecture and Design Domain Network Architecture Wide area network (WAN) © Copyright 2014 Pearson Education. All Rights Reserved.
  • 24. Security Architecture and Design Domain Network Architecture LAN Cluster © Copyright 2014 Pearson Education. All Rights Reserved.
  • 25. Security Architecture and Design Domain Network Architecture Enterprise Intranet © Copyright 2014 Pearson Education. All Rights Reserved.
  • 26. Security Architecture and Design Domain Network Protocols © Copyright 2014 Pearson Education. All Rights Reserved. Ethernet protocol is a software program commonly used to connect computers to create a LAN. Internet protocol (IP) is a software program that provides routing services to messages transmitted over the Internet. This protocol provides the IP addresses, which uniquely identify the sender and receiver's computers (for example, 193.168.0.103). Transport control protocol (TCP) provides message transportation services between sending and receiving computers. The Internet uses TCP and IP (TCP/IP suite) to address and transport messages from sender to receiver. Electronic data interchange (EDI) is a protocol that allows the enterprise network to connect to the network of vendors and suppliers through proprietary lines.
  • 27. What is the Telecommunications, Network and Internet Security Domain? This domain covers security for telecommunications, networks, and the Internet. Telecommunications, networks, and the Internet all relate to data transmission. © Copyright 2014 Pearson Education. All Rights Reserved.
  • 28. Cyberattacks often target network access points (NAP) because they offer access to the network. Routers, bridges, and gateways are access points to the network. Firewalls (software programs) that control traffic between two networks can be installed on these routing devices to prevent unauthorized access. Telecommunications, Network & Internet Security Domain Network Security © Copyright 2014 Pearson Education. All Rights Reserved.
  • 29. Telecommunications, Network & Internet Security Domain Network Security Enterprise Intranet with Firewalls © Copyright 2014 Pearson Education. All Rights Reserved.
  • 30. Firewalls play an important role in e-commerce. If the website server is behind a high-security firewall, the website cannot be accessed by the general public. If the website is in front of the enterprise firewall, then hackers may deface the website. To address this dilemma, an enterprise places its web servers behind a low-level security firewall which is the first firewall to the outside world. Another high-level security firewall is located behind the web servers. Telecommunications, Network & Internet Security Domain Internet Security © Copyright 2014 Pearson Education. All Rights Reserved.
  • 31. Telecommunications, Network & Internet Security Domain Internet Security E-Commerce Architecture Using Firewalls and DMZ Demilitarized zone (DMZ) is the area between the first and second firewall. © Copyright 2014 Pearson Education. All Rights Reserved.
  • 32. Telecommunications, Network & Internet Security Domain Internet Security Enterprise Intranet with Honeypot Honeypot is a computer located in the DMZ with attractive, but irrelevant data. The honeypot is used to distract hackers. Organizations may catch hackers by tracing them back to their source while the hackers are busy hacking the honeypot. © Copyright 2014 Pearson Education. All Rights Reserved.
  • 33. What is the Control Access Domain? The control access domain addresses security for access to the enterprise system, including computers, networks, routers and databases. Access control threats include: Network sniffers that examines traffic on the network Phishing to obtain confidential information Identify theft © Copyright 2014 Pearson Education. All Rights Reserved.
  • 34. Security principles for access control include: Identification Authentication Authorization Accountability For a user to be allowed access to a secured system (computers and network) the user should be identified, authenticated, and then authorized to access the system. Access Control Domain Access Control Principles © Copyright 2014 Pearson Education. All Rights Reserved.
  • 35. To identify users, usernames and passwords may be required to log in to the system. Password management involves: Number of passwords a user has How frequently the password must be changed Password format including length and type (e.g., alphanumeric) Number of incorrect login attempts Access Control Domain Password Management © Copyright 2014 Pearson Education. All Rights Reserved.
  • 36. Dynamic password: a password that is used once and then changed. Token device (TD): Is a hardware device containing a password generator protocol. Creates a new password each time the token is used. Eliminates the need for the user to memorize a continually changing password. Single sign-on (SSO): permits the user to use one username and password to log into various systems. Access Control Domain Password Management © Copyright 2014 Pearson Education. All Rights Reserved.
  • 37. Biometrics is an access method which identifies the user by analyzing his/her personal attributes. Biometrics include: fingerprints face recognition retina scans palm scans Access Control Domain Biometric Access © Copyright 2014 Pearson Education. All Rights Reserved.
  • 38. Intrusion prevention systems (IPS) attempt to prevent cyberattacks from occurring. Intrusion detection systems (IDS) are inadequate because the attack has already occurred. IPS can include sniffers used by the enterprise to detect malicious messages on its own network. The message can be destroyed before causing harm. Access Control Domain Intrusion Prevention Systems © Copyright 2014 Pearson Education. All Rights Reserved.
  • 39. What is the Operations Security Domain? Operations security refers to activities and procedures required to keep information technology running securely IT security management includes responsibility for maintaining security devices and software, such as virus detection, firewalls, Intrusion Prevention Systems (IPS), and Intrusion Detection Systems (IDS). Security assessment is carried out on a scheduled basis to evaluate the security of the various components of the enterprise system. IT security operational responsibilities relate to how the enterprise system operates. It includes input/output controls, accounting for software licenses, training for all employees regarding security procedures, conducting vulnerability checks, and developing contingency plans for cyberattacks. © Copyright 2014 Pearson Education. All Rights Reserved.
  • 40. What is the Physical and Environmental Security Domain? The physical and environmental security domain addresses the physical security of information technology components, such as hardware and software. Physical threats include natural environmental disasters, such as fire and flood, supply system threats, man-made threats, and politically motivated threats. © Copyright 2014 Pearson Education. All Rights Reserved.
  • 41. What is the Application Security Domain? The application security domain addresses security and controls for application software, including input, processing, and output. Application software includes accounting and spreadsheet software that accounting professionals use daily. © Copyright 2014 Pearson Education. All Rights Reserved.
  • 42. Malware (malicious software) is spread throughout an enterprise system by email, fake advertisements, Internet downloads, and shared drives. Malware includes: Viruses Bots Worms Logic bombs Trojan horses Spam Application Security Domain Malware © Copyright 2014 Pearson Education. All Rights Reserved.
  • 43. Bots: (short for robots) a tiny piece of programming code which installs itself on a Zombie (infected computer). Bots monitor the Zombie computer and transmit information back to the Master (hacker’s computer). Application Security Domain Malware © Copyright 2014 Pearson Education. All Rights Reserved.
  • 44. Viruses: a small computer program that infects other application software by attaching to and disrupting the application’s function. Antivirus software can detect and remove viruses. Logic bombs: malware that executes when a specified event happens within the computer, as for example, when the user logs into his or her bank account. Trojan horses: malware disguised as a legitimate program that may be downloaded and installed by users without realizing it is a virus. Spam: malware sent by email. Spam can be a virus, bot, logic bomb, worm, or Trojan horse. Application Security Domain Malware © Copyright 2014 Pearson Education. All Rights Reserved.
  • 45. What is the Business Continuity and Disaster Recovery Domain? This domain addresses an enterprise’s business continuity and disaster recovery plan. The goals of a disaster recovery plan include: Minimize disruption, damage, and loss from a disaster Provide a temporary method for processing business and accounting transactions Resume normal operations quickly © Copyright 2014 Pearson Education. All Rights Reserved.
  • 46. Accounting data backups are critical and should be scheduled on a regular basis. Grandfather-Father-Son method involves making multiple backups, one each day, for example. Monday backup (Grandfather) Tuesday backup (Father) Wednesday backup (Son) and so on.... Business Continuity and Disaster Recovery Domain Backup Methods © Copyright 2014 Pearson Education. All Rights Reserved.
  • 47. Backup facilities can include: Reciprocal agreements between organizations can be used to provide backup services. Internal sites can be used by large organizations with multiple locations. Hot site is a commercial disaster recovery service that can be leased by an enterprise to provide IT services in the event of a disaster, fully operational in a few hours. Warm site is a commercial disaster recovery service that is only partially configured with some equipment and may take a few days to be operational. Cold site is a commercial disaster recovery service providing air conditioning, wiring, and plumbing, but no IT equipment, taking several days to be operational. Business Continuity and Disaster Recovery Domain Backup Facilities © Copyright 2014 Pearson Education. All Rights Reserved.
  • 48. What is the Cryptography Domain? Cryptography is encoding data in a form that only the sender and intended receiver can understand. Encryption is a method of converting plaintext data into an unreadable form called ciphertext. Ciphertext is converted back to plain text using decryption. © Copyright 2014 Pearson Education. All Rights Reserved.
  • 49. Encryption methods determine the number of keys and how the keys are used to encode and decode data. Encryption methods include: Symmetric cryptography or 1 key method: This method uses 1 key to encode and the same key to decode. Both the sender and the recipient have the same key Cryptography Domain Encryption Methods Symmetric Cryptography (1 Key Method) © Copyright 2014 Pearson Education. All Rights Reserved.
  • 50. Encryption methods include: Asymmetric cryptography or 2 key method: Uses two keys with one key used to encode and a second related, but different key to decode the message. Public key: key used to encrypt the message. Private key: key used to decode the message. Cryptography Domain Encryption Methods Asymmetric Cryptography (2 Key Method) © Copyright 2014 Pearson Education. All Rights Reserved.
  • 51. Encryption methods include: Digital envelope or 3 key method: This method combines symmetric and asymmetric cryptography. First, the intended recipient’s message is encoded using symmetric encryption, and then the key to decode the message is encrypted using recipient's public-key encryption. Cryptography Domain Encryption Methods © Copyright 2014 Pearson Education. All Rights Reserved.
  • 52. Encryption is a useful tool for protecting data in transit and when stored in databases. As encryption tools have improved, crackers (high-level hackers) use more sophisticated techniques to bypass data encryption. Example: malware that captures keystrokes for data as the user is entering the data into the computer screen. Data is captured by the cracker before there is a chance for it to be encrypted. Cryptography Domain Encryption Methods © Copyright 2014 Pearson Education. All Rights Reserved.
  • 53. © Copyright 2014 Pearson Education. All Rights Reserved.
  • 54. Exercise 1. Write down a message using the encryption key shown in Figure 11.14. 2. Exchange your encrypted message with a classmate. 3. Decipher your classmate’s message using the decryption key shown in Figure 11.14. 4. Compare your decryption with your classmate’s original message. How did you do? My Connection Study Less. Learn More. Make Connections. © Copyright 2014 Pearson Education. All Rights Reserved.

Editor's Notes

  1. Heartland was audited and meet the cybersecurity requirements and was still the target of a successful cyberattack. This raises the question of whether current cybersecurity standards are adequate for the advanced skill level of cyberattackers.
  2. Because the accounting data stored in accounting systems is highly confidential, such as payroll data, it places increased pressure on accounting professionals to understand IT security.
  3. Cybersecurity is complicated, technical, and extensive. To make the topic more manageable, the 10 domains of cybersecurity of the International Information Systems Security are used to organize the material.
  4. Attackers are adept at exploiting mistakes, such as one unsecured wireless network.
  5. Have any students experienced a phishing attack? What does a spear-phishing attack look like?
  6. How many students use the free unsecured wifi at a local coffee shop? How many transmit confidential information over the unsecured wifi?
  7. Cyberlaws are often playing catch up after the cyberattacks occur.
  8. More and more legislation is affecting cyberlaw, increasing the complexity for companies trying to remain compliant.
  9. Many organizations find that if they are a target of a cyberattack, they do not have in-house personnel who have the specific expertise to conduct cyber forensic investigations. So the organizations bring in outside consultants to assist in the cyber forensic investigations.
  10. Because cybercrime is becoming so prevalent, with some organizations experiencing repeated attempts every day, preventive and proactive measures are becoming more and more important to prevent the cyberattacks from occurring. Some consulting firms will evaluate security for organizations and make recommendations to prevent attacks.
  11. An easy way to remember the fundamental principles of information security is: CIA
  12. Security cameras, motion detectors, door alarms, door locks, and security guards are included in the list of means for physical control. Ask students to compare a keyed door lock with the login system and compare a combination door lock with login system.
  13. COBIT and COSO were studied in Chapter 10. ISO is the same organization that provides specifications for widely accepted quality standards.
  14. IT architecture can be compared to an architectural blueprint for your home. Instead of electrical wiring, you have network wiring. Instead of closets, you have data storage. Instead of doors to a house, IT architecture has access points to the enterprise system.
  15. The difference between LAN, MAN, and WAN includes network size, number of computers involved, the protocol used for transmission and receiving of messages, bit transmitted per second, and the type of router. For example, a protocol used by a computer to transmit over a LAN is Ethernet and a protocol used by a computer to transmit over a WAN is TCP/IP.
  16. A LAN connects a few computers together in a small area such as a building floor or even room. All computers attached to one LAN must run exactly the same LAN protocol. The LAN protocol is called MAC or medium access control protocol. This protocol allows a computer to transmit over a LAN. The mostly used MAC is Ethernet
  17. In a MAN many small networks are connected to each other. These smaller networks are connected together by routers. A much more powerful router connects one MAN to another MAN.
  18. A wide area network or WAN covers a region, such as a multistate region. In a WAN many MANs are connected to each other. These MANs are connected to each other by powerful routers. The router connecting MANs on a WAN is called a node. Each node works as a distribution center. A WAN is governed by specific authority. The WAN authority would decide for the overall protocol running on that WAN. A WAN is also called internet (lowercase i). Each internet has it own routing and transmitting protocol. The internet which runs TCP/IP is called the Internet (uppercase I).
  19. 1. The same MAC protocol (medium access protocol) must run on all devices attached to these three LANs. This is because these three LANs are connected by bridges. An example of MAC protocol is the Ethernet protocol. 2. In the IT environment, a LAN in a cluster is also called a LAN segment or just a segment.
  20. The network connecting the enterprise LAN clusters is also called a backbone network.
  21. The network connecting the enterprise LAN clusters is also called a backbone network.
  22. A network access point without a firewall is like a house with an open entrance door.
  23. Notice how multiple firewalls can be used on an enterprise intranet. So if one firewall fails, another firewall may prevent further penetration into the enterprise's system.
  24. E-commerce without firewalls is like a store without merchandise security tags and the tag checking gate. A website server behind a high-security firewall is like a store showcase without any window!
  25. Which server requires the highest degree of security? Why?
  26. A honeypot could keep the attackers busy so organizations have time to trace the hacker back to its source. The pot is the server and the honey is the data on that server.
  27. Phishing: This is social engineering used to obtain confidential information, such as a Social Security number or a credit card number.   Identity theft: Sensitive personal data is stolen and used to impersonate individuals for fraudulent purposes.   Password attack: Cyberattacks to obtain passwords may include hacking into the password table in a database or sniffing the network for passwords.   Spoofing at log-on: A malicious program presents a fake login window that captures an individual's username and password information for fraudulent purposes.
  28. Access Control Principles is IAAA (pronounced I triple A).
  29. Ask the students: How many passwords does each student have? How frequently do they change their passwords?
  30. Can you imagine if you could use a password only once or twice and had to remember a new password every time you logged in?
  31. Have any students ever used biometrics as an access method?
  32. Some systems attempt to prevent intrusions. Other systems try to detect intrusions if they occur.
  33. Are there cameras in the campus computer labs?
  34. Ask students to name specific accounting software. Their answers could include QuickBooks and SAP Business One.
  35. Malware can be downloaded onto computers by unsuspecting computer users who click on links in an email.
  36. Ask your students if it is a good idea to turn off your computer when you are not using it. Why? Because a Bot can run anytime, even at 3 AM, and send your computer info to the Bot. Turning the computer off can disrupt the Bot.
  37. How many students have received spam? Had a virus?
  38. During Hurricane Katrina, some companies found that onsite backups were not adequate.
  39. Only one backup file is not adequate in case the one backup fails.
  40. The hotter the site is the readier the site is.
  41. Data in transfer is at higher risk, so often data in transit is encrypted. If you have a password on your wireless network, the data may be encrypted in transit. As cyberattacks become more sophisticated, the attacks are sometimes going all the way to the database. This has prompted some organizations to even encrypt data stored in their database, not just data in transit.
  42. Some intelligence operatives would use a specific novel as the encryption device. Having a novel of War and Peace on a bookshelf or as an ebook would not attract attention nor would the cyberattacker know which book was used for encryption.
  43. Accounting systems contain some of an enterprise’s most confidential data. The IT used can actually create vulnerabilities to cyberattacks on confidential accounting data. For this reason, accountants need to be prudent when implementing new technology until it has been tested and proven reliable enough to adequately safeguard accounting data.