Chapter 15 - PART V Implementing and Managing IT 13. 14....

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon
PART V Implementing and Managing IT 13. Information Technology Economics 14. Building Information Systems 15. Managing Information Resources and Security 16. Impacts of IT on Organizations, Individuals, and Society (online) ± 679 CHAPTER 15 Managing Information Resources and Security Cybercrime in the New Millennium 15.1 The IS Department and End Users 15.2 The CIO in Managing the IS Department 15.3 IS Vulnerability and Computer Crimes 15.4 Protecting Information Resources: From National to Organizational Efforts 15.5 Securing the Web, Intranets, and Wireless Networks 15.6 Business Continuity and Disaster Management 15.7 Implementing Security: Auditing and Risk Analysis Minicases: (1) Home Depot / (2) Managing Security LEARNING OBJECTIVES After studying this chapter, you will be able to: ± Recognize the difficulties in managing informa- tion resources. ² Understand the role of the IS department and its relationships with end users. ³ Discuss the role of the chief information officer. ´ Recognize information systems’ vulnerability, attack methods, and the possible damage from malfunctions. µ Describe the major methods of defending infor- mation systems. Describe the security issues of the Web and electronic commerce. · Describe business continuity and disaster recov- ery planning. ¸ Understand the economics of security and risk management.
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
680 CYBERCRIME IN THE NEW MILLENNIUM On January 1, 2000, the world was relieved to know that the damage to infor- mation systems due to the YK2 problem was minimal. However, only about six weeks into the new millennium, computer systems around the world were at- tacked, unexpectedly, by criminals. On February 6, 2000, the biggest e-commerce sites were falling like domi- nos. First was Yahoo, which was forced to close down for three hours. Next were eBay, Amazon.com, E*Trade, and several other major EC and Internet sites that had gone dark. The attacker(s) used a method called denial of service (DoS). By hammering a Web site’s equipment with too many requests for information, an attacker can effectively clog a system, slowing performance or even crashing a site. All one needs to do is to get the DoS software (available for free in many hacking sites), break into unrelated unprotected computers and plant some software there, se- lect a target site, and instruct the unprotected computers to repeatedly send re- quests for information to the target site. It is like constantly dialing a telephone number so that no one else can get through. It takes time for the attacked site to identify the sending computers and to block e-mails from them. Thus, the attacked site may be out-of-service for a few hours. The magnitude of the damage was so large that on February 9, the U.S. Attorney General pledged to track down the criminals and ensure that the Internet remains secure. This assurance did not last too long, as can be seen from the following story told by Professor Turban: When I opened my e-mail on May 4, 2000, I noticed immediately that the number of messages was larger than usual. A closer observation revealed that about 20 mes-
Background image of page 2
Image of page 3
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 53

Chapter 15 - PART V Implementing and Managing IT 13. 14....

This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online