Page 333 -
P. 333

Chapter 10 • Global, Ethics, and Security Management  291


             TABLE 10-1 List of Some Company Data Leaks
             Institution                 Type of Leak             Year           Records
             UCLA                        Hacked into database     2006           800,000
             Aetna                       Stolen backup tapes      2006           130,000
             Boeing                      Stolen laptop            2006           382,000
             Bank of America             Lost data tapes          2005         1,200,000
             Stanford University         Network breach           2005            10,000
             University of Connecticut   Hacking program on       2005            72,000
                                         server since 2003
             University of Southern      Flaw in online           2005           270,000
             California                  application database
             Wilcox Memorial             Theft of hard drive      2005           130,000
             Hospital


            overall system security. There are many published stories of hackers gaining access to a PC to
            gather information and to launch an attack on the rest of the company’s systems of which the
            ERP is the prime target.

            NETWORK SECURITY The Internet has its share of less-than-ethical individuals accessing it. In
            fact, there are likely many people doing a wide variety of illegal activities on the Internet. The
            Internet and illicit activities seem to be in the news every day. This illustrates how big the
            Internet has become, and that network security is in its infancy. There are devices that will
            address significant amounts of network security, but it is complex and requires constant updat-
            ing. Most companies implement some form of firewall(s), virus controls, and network or server,
            or both, intrusion detection to safeguard the networked environment. Operating systems need the
            latest patches, and virus software needs to be updated regularly with antispyware installed to
            prevent further access. All need to work together to ensure the network environment remains
            secure and stable. Network security is one of the more complex IT jobs around today. The staff
            needs to address its throughput and response time, and they must try to ensure the network is free
            from viruses, intrusions, and, in general terms, attacks to the environment.

            INTRUSION DETECTION Network and server intrusion detection comes in many forms of hardware
            and software. The notion is to catch and track intrusions in the best case as they are happening and
            worst after they have happened and been discovered.



             BOX 10-3

             An intrusion detection system (IDS) generally detects unwanted manipulations to computer systems,
             mainly through the Internet. The manipulations may take the form of attacks by skilled malicious hackers
             or script kiddies using automated tools.
                  An intrusion detection system is used to detect all types of malicious network traffic and computer
             usage that can’t be detected by a conventional firewall. This includes network attacks against vulnerable
             services, data-driven attacks on applications, host-based attacks such as privilege escalation, unautho-
             rized log-ins and access to sensitive files, and malware (viruses, Trojan horses, and worms).
   328   329   330   331   332   333   334   335   336   337   338