6-Digital Postmaster and Email Scams
6-Digital Postmaster and Email Scams
6-Digital Postmaster and Email Scams
• Viewing E-mail
• Can You Take E-mail Back?
• Spam, Spam, and More Spam
• Cyber Stalking, Threats, and Harassment
Viewing E-mail
Some businesses have strict policies regarding viewing other people’s e-mail. In many cases, e-mail is a business
record; to view an e-mail message concerning a management action is the same as pulling someone’s
employment records out of the file cabinet in Human Resources. However, the anonymity of the Internet allows us
to think that no one is looking, which can quickly lead to compromised ethics. No one suffers greater temptation in
this area than the people with system privileges, the postmaster, and the system administrators, because they
have the computer authority to view any e-mail file.
Traffic Analysis
Traffic analysis reveals surprisingly detailed information that is very private. Keep this practice limited to
authorized investigations and legitimate troubleshooting in order to preserve your users’ expectation of privacy, as
defined by company policy
Mailing Lists
The rule of secrets is that if you tell no one, it is a secret, if you tell one other person, it possibly remains a secret, if
you tell five people, you have told the world. While some consider mailing lists “public,” not all mailing lists receive
full posting on the Internet. There is sensitive information in this type of traffic, which varies from personal
interests and hobbies to identifying with political agendas or seeking support for a medical condition. The question
is whether the employee is demonstrating good judgment, and if they are posting sensitive information to a
mailing list. The answer is “probably not.”
Certain sectors have strict regulatory burdens regarding document retention. Policies in the workplace should reflect legal
requirements in terms of retention and destruction of e-mail records.
Sins of Omission
Allowing the destruction of discoverable evidence is not only unethical, it is illegal. The court may haul you in to testify as to the
document destruction procedures that normally occur and all the actions you took that day, including when you knew about the
subpoena and who you talked to about it. While this is a sin of omission, it is also unethical to rationalize not complying with legal
orders. E-mail and other electronic records now constitute the majority of discovery requests.
Cyber stalking, threats, harassment, and other abusive behaviors occur through email on a daily
basis.There is something about e-mail that can make otherwise timid and shy people very aggressive
and threatening.This is especially true if there is a perception of anonymity on the part of the abusive
party
Online Stalking
Cyber stalking is a serious matter despite the fact that it is online and not facilitated by phone or snail
mail. Cyber stalking often transitions into physical stalking and can escalate into a violent workplace
incident. Even though it is “just e-mail” right now, it can have a devastating effect on the victim in
terms of mental health and productivity. Treat these cases with the same care as you would serious
harassing and stalking behavior originating offline. Also note that in some states, inaction on this kind
of victimization may become a legal problem if the victim (the user in this case) sues on the grounds of
“hostile work environment” if the company does nothing, since the company has been notified.
E-mail Scams
(Ethical Dilemmas)
• Monetary Gain
• Identity Theft and Scams for Personal Information
• E-mail Chain Letter
E-mail scams are rampant on the Internet and most people do not know what to
do when they receive them in their e-mail box. Unfortunately, many have fallen
victim to them. Individuals who are scam savvy just delete and forget about
them. However, some scams can fool even the most competent and aware
individual.The following is a sample of such a scam that is sure to catch
unsuspecting people off guard. In this example, the scammers pass themselves
off as the Federal Deposit Insurance Corporation (FDIC) and use real federal
government agent names.
It is imperative for e-mail and Internet users to understand exactly how thieves
steal sensitive financial information through e-mail scams. Scam artists are
ingenious at creating e-mails that sound legitimate and that also have a
psychological affect on the recipient.The psychological affect is a big part of the
scam, throwing the recipient off guard enough to respond to the scam. The
dangerous e-mail scams will request credit card information, bank account
numbers, and social security numbers. NEVER provide this information to
anyone unless you initiate the conversation. NEVER disclose this information
through e-mail.
Monetary Gain
In one sense, if an individual loses money on a scam for monetary gain, they deserve it.The reason we say that is that greed is the
number one reason people fall for these types of scams.This is nothing new; flim flam artists have been a part of human culture
throughout recorded history. In a culture that believes in the concept of an “honorable thief,” a good defrauding might actually be
applauded.The only thing technology has changed is the number of “marks” that can be targeted per hour. However, fraud is
certainly not ethical, and even if greed was the motivator, when a senior citizen loses everything they have, it is beyond sad. Each
of us should invest the time to talk to our parents, uncles, and aunts about these types of fraud.
• Chain letters seem to be the same whether done in paper or e-mail. Since they
have been done in e-mail, they are an Information Technology (IT) issue and so
we consider them in the following.
• Regardless of the dangers involved, whether they are minor irritations or
serious threats of identity theft, e-mail scams are unethical and have a
negative impact on the Internet and the individuals and businesses using the
Internet.
Identity Theft and
Scams for Personal Information
• Hacking
• Penetration Tests
• Viruses and Worms
• Encryption
• Handling Network Security Information
• Ensuring Information Security on the Personnel Level
The role of the Information Security Officer (ISO) includes the responsibility of
effectively securing their organization’s data systems and information resources.
They hold the balance between security and getting the job done. Proficient ISOs
can network well and bridge the gap through their communications skills
between managers and systems administrators. ISOs understand the threats and
risks to the corporation and corporate technology.They identify best practices
and utilize them to protect information resources.The ISO must effectively
communicate these best practices to everyone in the organization. Finally, a
strong ISO utilizes their knowledge to create a diversified protection strategy
Hacking
Computer hacking is a form of malicious attack whereby a person known as a “hacker” breaks into a computer
system that they are not authorized to use.This includes attempts to bypass the security mechanisms of an
information system or network for the purpose of obtaining damaging information.
OS Attacks
The footprint of Microsoft software is so large that it is not clear a significant number of attackers are actually targetingthem.
Although hacking another company’s computer system is unethical, there is often a round of applause when an attack on an
unethical business occurs. You must decide what sits right with you.
Spoofing
Technologists like to outsmart each other. It is a game to them. Sometimes these games can help serve security for each other’s
organizations, and other times it just eats up valuable resources and energy. At its worst, this behavior accidentally causes
destruction.
Penetration Tests
Penetrating testing is the process of ethically authorized hacking and probing a corporation’s
information systems and networks to determine potential security weaknesses or vulnerabilities that a
malicious attacker might exploit.The penetration testing method involves an investigation of all
security features of the system in question.The penetration tester then attempts to breech security
and penetrate the system and network.The tester simulates a hacker by using the same attack
scenarios, methods, and tools of a real malicious attack.After the test, the penetration tester submits a
report on the system vulnerabilities and suggests procedures for implementation to make the system
more secure.
Viruses and worms are forms of malicious code designed to disable or destroy information
systems.There are many types of viruses and worms. In addition, programmers launch new ones on a
daily basis. Some, such as Code Red, are devastating, while others are just a nuisance. Spam is also a
form of malicious code, which has grown significantly due to its marketing potential.
Attacking Attackers
ISO’s need to use many different tactics when addressing security breaches. In most cases, going on the offense is
not a good idea because you could end up in legal trouble. However, there may be instances where you find it is
your only option.
Bypassing Alerts
In the above ethical dilemma, both the vendor and the ISO are at fault. The vendor is at fault because their tool is
determinately tedious and generalized, and the ISO because they were lazy.
Encryption
Encryption is the procedure of encoding or scrambling plaintext data to make it difficult for someone
else to see the original data sent with the exception of the intended receiver.An encryption algorithm
complexity utilized determines the level of protection provided by encryption. Encryption protects e-
mail, secure on-line transactions, File Transfer Protocol (FTP) sites, and much more.
Backup Keys
Staying abreast of the most recent requirements in information security is a tiring job but necessary to
protect your company. Always keep current on the most recent tools such as key backup and recovery
systems that will protect your company.
VPN Encryption
For the most part, avoid using corporate resources, especially information security resources, for
personal means. In some cases, you or others may determine it is unethical. In most cases, it is simply
not smart.
Sending Unencrypted Documents
You may witness employees making the mistake in this issue but it is not one that the Information Security Professional should ever make.
Network security information is the reporting of security information and weakness such as malfunctions and
intrusions that affect the security of the network. Ethical issues concerning the reporting of software failures that
cause a breach in security and stealth sniffers monitoring corporate networks are discussed in this section. In both
cases, awareness is key.The ISO has the demanding responsibility to ensure that all employees are aware of the
corporate security policy and that all systems are closely monitored by them and remain secure
Software Malfunctions
ISO’s should provide adequate security awareness so that an issue such as this one does not arise. If the employee
was previously made aware of the security implications and still failed to report the incident, they are in breach of
their ethical responsibility to the corporation.
Stealth Sniffer
The ISO must assume responsibility for all security breaches. They must also further improve the system to
prevent them. Running a sniffer may be unethical on the part of the person doing it; however, you as the ISO fall
into the realm of unethical behavior if you do nothing to remediate the situation.
Ensuring Information
Security on the Personnel Level
ISO’s also hold responsibility on the personnel level. Issues such as lying to clients about the integrity of
information security fall under the realm of the ISO. Other ethical dilemmas discussed in this section
include sex in the workplace caught on security tape, handling evidence, and security reprimands.