1 / 20

Agendas

Agendas. Chapter 5 (Recap) Chapters 6 – Diverse IT Infrastructures Case – The iPremier Company: Denial of Service Attack. Course Road Map. Network Elements – LAN. LAN Topologies. Packet Switching. Chapter 6: Assuring Reliable and Secure IT Services . Reliability through redundancy

wheeler
Download Presentation

Agendas

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Agendas Chapter 5 (Recap) Chapters 6 – Diverse IT Infrastructures Case – The iPremier Company: Denial of Service Attack

  2. Course Road Map

  3. Network Elements – LAN LAN Topologies

  4. Packet Switching

  5. Chapter 6: Assuring Reliable and Secure IT Services • Reliability through redundancy • Tradeoff – complexity and cost • IS Security and Control • Malicious threats (download) – New Architecture for Intra-Domain Network by Huang and Cao et al. (2006)

  6. Chapter 6: Assuring Reliable and Secure IT Services Managing Infrastructure Risk

  7. Chapter 6: Assuring Reliable and Secure IT Services Availability – Serial Processing

  8. Chapter 6: Assuring Reliable and Secure IT Services

  9. Chapter 6: Assuring Reliable and Secure IT Services Availability – Parallel Processing (Reliability = 1 – Probability of failure)

  10. Chapter 6: Assuring Reliable and Secure IT Services

  11. Why Systems Are Vulnerable? Telecommunications networks vulnerabilities

  12. Why Systems Are Vulnerable? Type of computer crimes and criminals • Hacker: An outside person who has penetrated a computer system, usually with no criminal intent. • Cracker: A malicious hacker. • Social engineering: Getting around security systems by tricking computer users into revealing sensitive information or gaining unauthorized access privileges. • Cybercrimes: Illegal activities executed on the Internet. • Identify theft: A criminal (the identity thief) poses as someone else. • Cyberwar: War in which a country’s information systems could be paralyzed from a massive attack by destructive software. • Virus: Software that can attach itself to (“infect”) other computer programs without the owner of the program being aware of the infection.

  13. IS Security and Control Security Treats

  14. Protecting the Digital Firm • Firewall screening technologies • Static packet filtering • Network address translation • Application proxy filtering • Intrusion detection systems • Scanning software • Monitoring software

  15. Security and Electronic Commerce • Encryption • Authentication • Message integrity • Digital signatures • Digital certificates • Public key infrastructure (PKI)

  16. Article Discussion (Team DIY – Take Home) • The Myth of Secure Computing (Austin and Darby, 2003, HBR) • Why senior executives often ignore the digital security issue? • According to the authors, what are the major treats to digital security? Explain each of them. • How to mitigate the risks in digital security? What is the bottom-line?

  17. IS Security and Control Public key encryption (in a nutshell)

  18. IS Security and Control Digital certificates

  19. Chapter 6: Assuring Reliable and Secure IT Services Taxonomy of Networking Attacks Adopted from Huang and Cao et al. {Communications of ACM, 49 (11), 2006}

  20. Chapter 6: Assuring Reliable and Secure IT Services Secure framework Adopted from Huang and Cao et al. {Communications of ACM, 49 (11), 2006}

More Related