Page 424 - Using MIS
P. 424

392       Chapter 10  Information Systems Security

                                                                                    Threat

                                                                                    Computer
                                                                  Human Error                    Natural Disasters
                                                                                     Crime
                                               Unauthorized   Procedural mistakes  Pretexting   Disclosure during
                                               data disclosure                    Phishing      recovery
                                                                                  Spoofing
                                                                                  Sniffing
                                                                                  Hacking
                                               Incorrect data  Procedural mistakes  Hacking     Incorrect data
                                               modification   Incorrect procedures              recovery
                                                              Ineective accounting
                                       Loss                   controls
                                                              System errors
                                               Faulty service  Procedural mistakes  Usurpation  Service improperly
                                                              Development and                   restored
                                                              installation errors
                                               Denial of service   Accidents      DoS attacks   Service interruption
                                               (DoS)
                                               Loss of        Accidents           Theft         Property loss
        Figure 10-3                            infrastructure                     Terrorist activity
        Security Problems and Sources




                                    Natural Events and Disasters

                                    Natural events and disasters are the third type of security threat. This category includes fires,
                                    floods, hurricanes, earthquakes, tsunamis, avalanches, and other acts of nature. Problems in
                                    this category include not only the initial loss of capability and service, but also losses stemming
                                    from actions to recover from the initial problem.

                                    What Types of Security Loss Exist?

                                    Five types of security loss exist: unauthorized data disclosure, incorrect data modification,
                                    faulty service, denial of service, and loss of infrastructure. Consider each.

                                    Unauthorized Data Disclosure
                                    Unauthorized data disclosure occurs when a threat obtains data that is supposed to be protected.
                                    It can occur by human error when someone inadvertently releases data in violation of policy. An
                                    example at a university is a department administrator who posts student names, identification
                                    numbers, and grades in a public place, when the releasing of names and grades violates state law
                                    and Federal law. Another example is employees who unknowingly or carelessly release propri-
                                    etary data to competitors or to the media. WikiLeaks is a famous example of unauthorized disclo-
                                    sure; the situation described in the third row of Figure 10-2 is another example.
                                       The popularity and efficacy of search engines have created another source of inadvertent
                                    disclosure. Employees who place restricted data on Web sites that can be reached by search en-
                                    gines might mistakenly publish proprietary or restricted data over the Web.
                                       Of course, proprietary and personal data can also be released and obtained maliciously.
                                    Pretexting occurs when someone deceives by pretending to be someone else. A common scam
                                    involves a telephone caller who pretends to be from a credit card company and claims to be
                                    checking the validity of credit card numbers: “I’m checking your MasterCard number; it begins
                                    with 5491. Can you verify the rest of the number?” Thousands of MasterCard numbers start with
                                    5491; the caller is attempting to steal a valid number.
   419   420   421   422   423   424   425   426   427   428   429