IS 402E
Information Technology Management
 Instructors: Tuba BAKICI, Hadj BARKAT, Arnaud
              POISSON, Pantelis FRANGOUDIS
 Rennes, September 2016
                                                 1
OVERVIEW
 Telecommunications, The Internet And Wireless Technology:
   • Telecommunications & Networking
   • Communication Networks
   • Internet
   • The Wireless Revolution
 Securing Information System
   • System Vulnerability and Abuse
   • Business Value of Security and Control & Establishing a
     Framework
   • Technologies and Tools for Protecting Information
     Resources
                                                               2
RFID and Wireless Technology Speed Up Production at Continental
Tires
• Problem: Inefficient manual processes; large
  production environment
• Solutions: Track components in real time, optimize
  transportation, and expedite communication
       •   Wi-Fi networks
       •   RFID technologies
       •   Mobile handhelds
       •   Material inventory tracking software
• Demonstrates use of technology in production and
  supply chain to increase efficiency and lower costs
TELECOMMUNICATIONS AND NETWORKING IN TODAY’S
BUSINESS WORLD
Networking and Communication Trends
  •   Telephone networks and computer networks converging
      into single digital network using Internet standards
  •   Broadband:
      • High-speed transmission technology
      • More than 68% U.S. Internet users have broadband access
  •   Broadband wireless:
      • Voice, data communication are increasingly taking place over
        broadband wireless platforms
TELECOMMUNICATIONS AND NETWORKING IN TODAY’S
BUSINESS WORLD
• Computer network
  Two or more connected computers
  Major components in simple network
      •   Client and server computers
      •   Network interfaces (NICs)
      •   Connection medium
      •   Network operating system
      •   Hubs, switches, routers
  Software-defined networking (SDN)
      • Functions of switches and routers managed by central program
                  Components of a Simple Computer Network
Illustrated here is a very simple computer network, consisting of computers, a network operating
system residing on a dedicated server computer, cabling (wiring) connecting the devices, network
interface cards (NIC), switches, and a router.
TELECOMMUNICATIONS AND NETWORKING IN TODAY’S
BUSINESS WORLD
Networks in large companies
  •   Hundreds of local area networks (LANs) linked to
      firmwide corporate network
  •   Various powerful servers
      • Web site
      • Corporate intranet, extranet
      • Backend systems
  •   Mobile wireless LANs (Wi-Fi networks)
  •   Videoconferencing system
  •   Telephone network
  •   Wireless cell phones
                             Corporate Network Infrastructure
Today’s corporate
network infrastructure is
a collection of many
different networks from
the public switched
telephone network, to
the Internet, to corporate
local area networks
linking workgroups,
departments, or office
floors.
TELECOMMUNICATIONS AND NETWORKING IN TODAY’S
BUSINESS WORLD
Key digital networking technologies
  1. Client/server computing
      • Distributed computing model
      • Clients linked through network controlled by
        network server computer
      • Server sets rules of communication for network
        and provides every client with an address so others
        can find it on the network
      • Has largely replaced centralized mainframe
        computing
      • The Internet: largest implementation of
        client/server computing
TELECOMMUNICATIONS AND NETWORKING IN TODAY’S
BUSINESS WORLD
Key digital networking technologies (cont.)
  2. Packet switching
      • Method of slicing digital messages into parcels
        (packets), sending packets along different
        communication paths as they become available,
        and then reassembling packets at destination
      • Packet switching more efficient use of network’s
        communications capacity
      Packet-Switched Networks and Packet Communications
Data are grouped into small packets, which are transmitted independently over various
communications channels and reassembled at their final destination.
TELECOMMUNICATIONS AND NETWORKING IN TODAY’S
BUSINESS WORLD
Key digital networking technologies (cont.)
  3. TCP/IP and connectivity
      • Protocols: rules that govern transmission of
        information between two points
      • Transmission Control Protocol/Internet Protocol
        (TCP/IP)
          – Common worldwide standard that is basis for
            Internet
COMMUNICATIONS NETWORKS
 Signals: digital (binary waves) vs. analog (continuous
  waves)
  • Modem: translates digital signals into analog form (and
    vice versa)
 Types of networks:
  •   Local-area networks (LANs)
  •   Wide-area networks (WANs)
  •   Metropolitan-area networks (MANs)
                                Functions of the Modem
A modem is a device that translates digital signals into analog form (and vice versa) so that
computers can transmit data over analog networks such as telephone and cable networks.
COMMUNICATIONS NETWORKS
• Physical transmission media
  •   Twisted pair wire (CAT5)
  •   Coaxial cable
  •   Fiber optics cable
  •   Wireless transmission media and devices
      • Satellites
      • Cellular systems
THE GLOBAL INTERNET
The Internet
  •   World’s most extensive network
  •   Internet service providers (ISPs)
       • Provide connections
Internet addressing and architecture
   • Internet protocol (IP) addresses: Every computer on
      internet is assigned a unique address
The Domain name system (DNS)
  • Converts IP addresses to domain names
  • Hierarchical structure
  • Top-level domains
                           The Domain Name System
The Domain Name
System is a hierarchical
system with a root
domain, top-level
domains, second-level
domains, and host
computers at the third
level.
                          Internet Network Architecture
The Internet backbone
connects to regional
networks, which in turn
provide access to
Internet service
providers, large firms,
and government
institutions. Network
access points (NAPs)
and metropolitan area
exchanges (MAEs) are
hubs where the
backbone intersects
regional and local
networks and where
backbone owners
connect with one
another.
                       Client/Server Computing on the Internet
Client computers running Web browser and other software can access an array of services on
servers over the Internet. These services may all run on a single server or on multiple specialized
servers.
THE GLOBAL INTERNET
  Virtual private network (VPN)
  • Secure, encrypted, private network run over
     Internet
THE GLOBAL INTERNET
The Web
     Hypertext Markup Language (HTML)
     Hypertext Transfer Protocol (HTTP):
       Communications standard used for transferring Web pages
     Uniform resource locators (URLs):
       Addresses of Web pages
           http://www.megacorp.com/content/features/082602.html
     Web servers
          – Software for locating and managing Web pages
Search engines
  •   Started as simpler programs using keyword indexes
  •   Google improved indexing and created page ranking
      system
                                      How Google Works
The Google search engine is continuously crawling the Web, indexing the content of each page,
calculating its popularity, and storing the pages so that it can respond quickly to user requests to see
a page. The entire process takes about one-half second.
THE WIRELESS REVOLUTION
Wireless computer networks and Internet
access
• Wi-Fi
  •   Used for wireless LAN and wireless Internet access
  •   Use access points: device with radio
      receiver/transmitter for connecting wireless devices
      to a wired LAN
  •   Hotspots: one or more access points in public place
      to provide maximum wireless coverage for a specific
      area
  •   Weak security features
                                A Wireless LAN
Mobile laptop computers
equipped with wireless
network interface cards link
to the wired LAN by
communicating with the
access point. The access
point uses radio waves to
transmit network signals from
the wired network to the
client adapters, which
convert them into data that
the mobile device can
understand. The client
adapter then transmits the
data from the mobile device
back to the access point,
which forward the data to the
wired network.
THE WIRELESS REVOLUTION
Radio frequency identification (RFID)
   RFID tags:
      • Tiny tags with embedded microchips contain data
        about an item and location
      • Transmit radio signals over short distances to RFID
        readers
   RFID readers:
      • Send data over network to computer for processing
   Active RFID:
      • Tags have batteries
      • Data can be rewritten
      • Range is hundreds of feet
THE WIRELESS REVOLUTION
RFID (cont.)
  • Passive RFID:
      • Range is shorter
      • Smaller, less expensive
      • Powered by radio frequency energy
   Common uses:
      • Automated toll-collection
      • Tracking goods in a supply chain
   Requires companies to have special hardware
    and software
                                         How RFID Works
RFID uses low-powered radio transmitters to read data stored in a tag at distances ranging from 1 inch
to 100 feet. The reader captures the data from the tag and sends them over a network to a host
computer for processing.
Securing information systems
You’re on LinkedIn? Watch Out!
• Problem: Massive data breach; using old security
  practices
• Solution: Initiative to use minimal up-to-date
  industry practices, for example, salting passwords
• Illustrates the need for security practices to keep up
  with current standards and threats
• Demonstrates the lack of regulation for corporate
  computer security and social network data security;
  poor data protection by many companies
SYSTEM VULNERABILITY AND ABUSE
Why systems are vulnerable
  • Accessibility of networks
  • Hardware problems (breakdowns, configuration errors,
    damage from improper use or crime)
  • Software problems (programming errors, installation
    errors, unauthorized changes)
  • Disasters
  • Use of networks/computers outside of firm’s control
  • Loss and theft of portable devices
         CONTEMPORARY SECURITY CHALLENGES AND VULNERABILITIES
The architecture of a Web-based application typically includes a Web client, a server, and corporate
information systems linked to databases. Each of these components presents security challenges and
vulnerabilities. Floods, fires, power failures, and other electrical problems can cause disruptions at any
point in the network.
SYSTEM VULNERABILITY AND ABUSE
Internet vulnerabilities
  – Network open to anyone
  – Size of Internet means abuses can have wide impact
  – Use of fixed Internet addresses with cable / DSL
    modems creates fixed targets for hackers
  – E-mail, IM
      • Interception
      • Attachments with malicious software
      • Transmitting trade secrets
                             WI-FI SECURITY CHALLENGES
Many Wi-Fi networks
can be penetrated easily
by intruders using sniffer
programs to obtain an
address to access the
resources of a network
without authorization.
SYSTEM VULNERABILITY AND ABUSE
Malware (malicious software)
   Viruses
      • Rogue software program that attaches itself to other
        software programs or data files in order to be executed
   Worms
      • Independent programs that copy themselves from one
        computer to other computers over a network.
   Worms and viruses spread by
      • Downloads (drive-by downloads)
      • E-mail, IM attachments
      • Downloads on Web sites and social networks
SYSTEM VULNERABILITY AND ABUSE
Malware (cont.)
  •   Trojan horses
      • Software that appears benign but does something other
        than expected
  •   SQL injection attacks
      • Hackers submit data to Web forms that exploits site’s
        unprotected software and sends rogue SQL query to
        database
  •   Spyware
       • Small programs install themselves surreptitiously
         on computers to monitor user Web surfing activity
         and serve up advertising
SYSTEM VULNERABILITY AND ABUSE
• Hackers and computer crime: System intrusion,
  System damage, Cybervandalism
• Spoofing
  – Misrepresenting oneself by using fake e-mail addresses or
    masquerading as someone else
  – Redirecting Web link to address different from intended
    one, with site masquerading as intended destination
• Sniffer
  – Eavesdropping program that monitors information traveling
    over network
  – Enables hackers to steal proprietary information such as e-
    mail, company files, and so on
SYSTEM VULNERABILITY AND ABUSE
• Denial-of-service attacks (DoS)
  •   Flooding server with thousands of false requests to
      crash the network
• Phishing
  •   Setting up fake Web sites or sending e-mail messages
      that look like legitimate businesses to ask users for
      confidential personal data.
SYSTEM VULNERABILITY AND ABUSE
• Pharming
  •   Redirects users to a bogus Web page, even when
      individual types correct Web page address into his or
      her browser
• Click fraud
  •   Occurs when individual or computer program
      deceptively clicks on online ad without any intention
      of learning more about the advertiser or making a
      purchase
• Cyberterrorism and Cyberwarfare
SYSTEM VULNERABILITY AND ABUSE
• Internal threats: Employees
  – Security threats often originate inside an organization
  – Inside knowledge
  – Sloppy security procedures
      • User lack of knowledge
  – Social engineering:
      • Tricking employees into revealing their passwords by
        pretending to be legitimate members of the company
        in need of information
SYSTEM VULNERABILITY AND ABUSE
• Software vulnerability
  – Commercial software contains flaws that create
    security vulnerabilities
      • Hidden bugs (program code defects)
      • Flaws can open networks to intruders
  – Patches
      • Small pieces of software to repair flaws
      • Exploits often created faster than patches can be
        released and implemented
BUSINESS VALUE OF SECURITY AND CONTROL
• Failed computer systems can lead to significant or
  total loss of business function.
• Confidential personal and financial data, Trade
  secrets, new products, strategies
• A security breach may cut into a firm’s market value
  almost immediately.
• Inadequate security and controls also bring forth
  issues of liability.
ESTABLISHING A FRAMEWORK FOR SECURITY AND CONTROL
Information systems controls
  •   Manual and automated controls
  •   General and application controls
Security policy
  • Ranks information risks, identifies acceptable
     security goals, and identifies mechanisms for
     achieving these goals
ESTABLISHING A FRAMEWORK FOR SECURITY AND CONTROL
MIS audit
  •   Examines firm’s overall security environment as well as
      controls governing individual information systems
  •   Reviews technologies, procedures, documentation,
      training, and personnel.
  •   May even simulate disaster to test response of
      technology, IS staff, other employees
  •   Lists and ranks all control weaknesses and estimates
      probability of their occurrence
  •   Assesses financial and organizational impact of each
      threat
TECHNOLOGIES AND TOOLS FOR PROTECTING INFORMATION
RESOURCES
Firewall:
  Combination of hardware and software that prevents
  unauthorized users from accessing private networks
TECHNOLOGIES AND TOOLS FOR PROTECTING INFORMATION
RESOURCES
 • Intrusion detection systems:
   •   Monitors hot spots on corporate networks to detect
       and deter intruders
   •   Examines events as they are happening to discover
       attacks in progress
 • Antivirus and antispyware software:
   •   Checks computers for presence of malware and can
       often eliminate it as well