Page 327 -
P. 327

326 Part Two  Information Technology Infrastructure


                                   layer can cause harm by introducing errors or by accessing systems without
                                     authorization. It is possible to access data flowing over networks, steal valuable
                                   data during transmission, or alter messages without authorization. Radiation
                                   may disrupt a network at various points as well. Intruders can launch denial-
                                   of-service attacks or malicious software to disrupt the operation of Web sites.
                                   Those capable of penetrating corporate systems can destroy or alter corporate
                                   data stored in databases or files.
                                     Systems malfunction if computer hardware breaks down, is not configured
                                   properly, or is damaged by improper use or criminal acts. Errors in program-
                                   ming, improper installation, or unauthorized changes cause computer software
                                   to fail. Power failures, floods, fires, or other natural disasters can also disrupt
                                   computer systems.
                                     Domestic or offshore partnering with another company adds to system
                                     vulnerability if valuable information resides on networks and computers
                                     outside the organization’s  control. Without strong safeguards, valuable data
                                   could be lost, destroyed, or could fall into the wrong hands, revealing important
                                   trade secrets or information that violates  personal  privacy.
                                     The popularity of handheld mobile devices for business computing adds to
                                   these woes. Portability makes cell phones, smartphones, and tablet computers
                                   easy to lose or steal. Smartphones share the same security weaknesses as other
                                   Internet devices, and are  vulnerable to malicious software and penetration
                                   from outsiders. Smartphones used by  corporate employees often contain sen-
                                   sitive data such as sales figures, customer names, phone numbers, and e-mail
                                   addresses. Intruders may be able to access internal corporate systems through
                                   these devices.
                                   Internet Vulnerabilities
                                   Large public networks, such as the Internet, are more vulnerable than internal
                                   networks because they are virtually open to anyone. The Internet is so huge
                                   that when abuses do occur, they can have an enormously widespread impact.
                                   When the Internet becomes part of the corporate network, the organization’s
                                   information systems are even more vulnerable to actions from outsiders.
                                     Computers that are constantly connected to the Internet by cable modems
                                   or digital subscriber line (DSL) lines are more open to penetration by outsid-
                                   ers because they use fixed Internet addresses where they can be easily identi-
                                   fied. (With dial-up service, a temporary Internet address is assigned for each
                                     session.) A fixed Internet address creates a fixed target for hackers.
                                     Telephone service based on Internet technology (see Chapter 7) is more
                                     vulnerable than the switched voice network if it does not run over a secure
                                   private network. Most Voice over IP (VoIP) traffic over the public Internet is not
                                   encrypted, so anyone with a network can listen in on conversations. Hackers
                                   can intercept conversations or shut down voice service by flooding servers
                                     supporting VoIP with bogus traffic.
                                     Vulnerability has also increased from widespread use of e-mail, instant
                                     messaging (IM), and peer-to-peer file-sharing programs. E-mail may contain
                                   attachments that serve as springboards for malicious software or unauthor-
                                   ized access to internal corporate systems. Employees may use e-mail  messages
                                   to transmit valuable trade secrets, financial data, or confidential customer
                                     information to unauthorized recipients. Popular IM applications for consumers
                                   do not use a secure layer for text messages, so they can be intercepted and read
                                   by outsiders during transmission over the public Internet. Instant messaging
                                   activity over the Internet can in some cases be used as a back door to an oth-
                                   erwise secure network. Sharing files over peer-to-peer (P2P) networks, such as







   MIS_13_Ch_08 Global.indd   326                                                                             1/17/2013   3:10:20 PM
   322   323   324   325   326   327   328   329   330   331   332