Lecture 8
Lecture 8
Lecture_8
Prepared by:
Dr. Hebatulla M. Nabil
Text book:
Ethics in Information Technology
for GEORGE W.REYNOLDS
COMPUTER
AND
INTERNET CRIME
IT Security Incidents:
3
A Major Concern
➢ Safeguard:
• Confidential business data
• Private customer and employee data
➢ Protect against malicious acts of theft or disruption
➢ Balance against other business needs and issues
Why Computer Incidents Are So
4
Prevalent
1. Increasing complexity increases vulnerability
Cloud computing is the on-demand availability of computer system resources, especially data storage
and computing power, without direct active management by the user. The term is generally used to
describe data centers available to many users over the Internet.
Why Computer Incidents Are So
5
Prevalent (Cont.)
2. Higher computer user expectations
Today, time means money, and the faster computer users can solve a
problem, the sooner they can be productive. As a result, computer
help desks are under intense pressure to respond very quickly to users’
questions. Under duress, help desk personnel:
• Forget to verify users’ IDs or check authorizations
• Computer users share login IDs and passwords
Prevalent (Cont.)
3. Expanding/changing systems equal new risks
Network era
• Personal computers connect to networks with millions of other computers
• All capable of sharing information
Information technology
• Ubiquitous
• Necessary tool for organizations to achieve goals
• Increasingly difficult to match pace of technological change
Why Computer Incidents Are So
7
Prevalent (Cont.)
4 . Increased reliance on commercial software with known vulnerabilities
Exploit
Prevalent (Cont.)
Commercial software
Any software or program that is designed and developed for
licensing or sale to end users or that serves a commercial purpose.
Examples: Microsoft Windows Operating System, MS Office, off-the-shelf
software programs, such as games or those sold in computer
specialty stores or even music stores and grocery stores
This type of software includes financial, marketing and accounting
software.
During the last decades, however, some open-source applications
have also become commercial software, licensed to customers as is
or as part of a service.
Why Computer Incidents Are So
9
Prevalent (Cont.)
Zero-day attack:
- A zero day exploit is a cyber attack that occurs on the same
day a weakness is discovered in software. At that point, it's
exploited before a fix becomes available from its creator.
- Before a vulnerability is discovered or fixed
Types of attacks
1. Virus
2. Worm
3. Trojan horse
4. Distributed denial of service
5. Rootkit
6. Spam
7. Phishing (spear-phishing, smishing, and vishing)
1. Viruses
11
Harmful programs
Reside in active memory of a computer
Duplicate themselves
(DDoS) Attacks
Malicious hacker takes over computers on the Internet and causes them
to flood a target site with demands for data and other small tasks
• The computers that are taken over are called zombies
• Botnet is a very large group of such computers
Attacker can gain full control of the system and even obscure the
presence of the rootkit
Types of phishing:
Spear-phishing
Fraudulent emails to an organization’s employees
Smishing
Phishing via text messages
Vishing
Phishing via voice mail messages
Types of Perpetrators
19
Perpetrators include:
• Thrill seekers wanting a challenge
• Common criminals looking for financial gain
• Industrial spies trying to gain an advantage
• Terrorists seeking to cause destruction
1. Hackers
Test limitations of systems out of intellectual curiosity
Some smart and talented
Others inept; termed “lamers” or “script kiddies”
2. Crackers
Cracking is a form of hacking – Cause problem- steal data
Clearly criminal activity
Types of Perpetrators (Cont.)
22
3. Malicious Insiders
Major security concern for companies
Fraud within an organization is usually due to weaknesses in internal
control procedures
Collusion → Cooperation between an employee and an outsider
Insiders
are not necessarily employees → Can also be consultants
and contractors
Extremely difficult to detect or stop → Authorized to access the very
systems they abuse
Negligent insiders have potential to cause damage
Types of Perpetrators (Cont.)
23
4. Industrial Spies
Use illegal means to obtain trade secrets from competitors
Trade secrets are protected by the Economic Espionage Act of 1996
Types of spies:
A. Competitive intelligence
• Uses legal techniques
• Gathers information available to the public
B. Industrial espionage
• Uses illegal means
• Obtains information not available to the public
Types of Perpetrators (Cont.)
24
5. Cybercriminals
Hack into corporate computers to steal
5. Cybercriminals (Cont.)
Smart cards
• Contain a memory chip
• Updated with encrypted data each time card is used
• Used widely in Europe
• Not widely used in the U.S.
6. Hacktivism
Hacking to achieve a political or social goal
7. Cyberterrorist
Attacks computers or networks in an attempt to force a
government in order to advance certain political or social
objectives
Seeks to cause harm rather than gather information
Uses techniques that destroy or disrupt services
Federal Laws for Prosecuting 27
Computer Attacks
Over the years, several laws have been enacted to prosecute those
responsible for computer-related crime, including: