CSC459-ITC459-Security Engineering

System Security

Dr. Mehrdad Sharbaf

CSUDH-CSC

System Security (1 of 4)

Vital part of every computer system

System security concepts

CIA triangle: shows main elements used to develop a security policy

The slides are excerpted from Tilley 12 edition systems analysis and design book

System Security (2 of 4)

The slides are excerpted from Tilley 12 edition systems analysis and design book

Figure 12-14 System security must provide information confidentiality, integrity, and availability (CIA).

The figure consists of a triangle, which is labeled information. The top of the triangle is labeled integrity, the left side is labeled confidentiality, and the right side is labeled availability.

Figure 12-14 System security must provide information confidentiality, integrity, and availability (CIA).

The slides are excerpted from Tilley 12 edition systems analysis and design book

System Security (3 of 4)

System Security (4 of 4)

Figure 12-15 Risk management requires continuous risk identification, assessment, and control.

In the figure, there are three circles placed in circular manner. In clockwise order, the first circle is labeled identity. An arrow from this circle points to the second circle, which is labeled assess. An arrow from this circle points to the third circle is labeled control.

The slides are excerpted from Tilley 12 edition systems analysis and design book

Security Levels (1 of 12)

The slides are excerpted from Tilley 12 edition systems analysis and design book

Figure 12-19 Each security link has a specific focus, and the overall chain is only as strong as the weakest link.

Security Levels (2 of 12)

The slides are excerpted from Tilley 12 edition systems analysis and design book

Security Levels (3 of 12)

The slides are excerpted from Tilley 12 edition systems analysis and design book

Security Levels (4 of 12)

The slides are excerpted from Tilley 12 edition systems analysis and design book

Security Levels (5 of 12)

The slides are excerpted from Tilley 12 edition systems analysis and design book

Ports and services can be affected by port scans and denial of service (DOS) attacks

Firewalls allow or block network traffic from each network interface based on preset rules

Network intrusion detection system (NDIS) alerts the administrator when it detects suspicious network traffic patterns

Security Levels (6 of 12)

FIGURE 12-22: In a DoS attack, an attacker sends numerous authentication requests with false return addresses. The server tries unsuccessfully to send out authentication approval and is eventually disabled by the floor of requests. More sophisticated DoS attacks are distributed (DDoS), as shown in this figure. Instead of a single computer, the attacker uses an army of botnets (computers unknowingly infected with malware that are difficult to trace) to attack the target.

The slides are excerpted from Tilley 12 edition systems analysis and design book

Security Levels (7 of 12)

The slides are excerpted from Tilley 12 edition systems analysis and design book

Security Levels (8 of 12)

The slides are excerpted from Tilley 12 edition systems analysis and design book

Security Levels (9 of 12)

The slides are excerpted from Tilley 12 edition systems analysis and design book

Security Levels (10 of 12)

The slides are excerpted from Tilley 12 edition systems analysis and design book

Security Levels (11 of 12)

The slides are excerpted from Tilley 12 edition systems analysis and design book

User resistance: users need to understand and be a part of the organization’s commitment to security

New technologies can be used to enhance security and prevent unauthorized access

Security Levels (12 of 12)

The slides are excerpted from Tilley 12 edition systems analysis and design book

Backup and Recovery (1 of 2)

The slides are excerpted from Tilley 12 edition systems analysis and design book

Backup and Recovery (2 of 2)

The slides are excerpted from Tilley 12 edition systems analysis and design book

The slides are excerpted from Tilley 12 edition systems analysis and design book

System Retirement

Future Challenges and Opportunities (1 of 3)

The slides are excerpted from Tilley 12 edition systems analysis and design book

Future Challenges and Opportunities (2 of 3)

The slides are excerpted from Tilley 12 edition systems analysis and design book

Strategic planning for IT professionals

System analysts should work backwards from goals to develop intermediate milestones

IT credentials and certification

Professional organizations and IT industry leaders offer continuing educational courses and credentialed certifications

Critical thinking skills

System analysts should possess soft skills and critical thinking skills

Future Challenges and Opportunities (3 of 3)

The slides are excerpted from Tilley 12 edition systems analysis and design book

Summary (1 of 3)

The slides are excerpted from Tilley 12 edition systems analysis and design book

Systems support and security

Types of system maintenance

Maintenance team

Summary (2 of 3)

The slides are excerpted from Tilley 12 edition systems analysis and design book

Configuration management and system performance measurements

Security is a vital part of every computer system

Summary (3 of 3)

The slides are excerpted from Tilley 12 edition systems analysis and design book

All information systems eventually become obsolete

Intense competition is predicted in the future

IT professionals should have a strategic career plan

Long-term goals

Intermediate milestones