0% found this document useful (0 votes)
19 views

Lecture 8

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views

Lecture 8

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 28

PROFFESSIONAL ETHICS

Lecture_8

Prepared by:
Dr. Hebatulla M. Nabil

Text book:
Ethics in Information Technology
for GEORGE W.REYNOLDS
COMPUTER
AND
INTERNET CRIME
IT Security Incidents:
3

A Major Concern

Security of information technology is of utmost importance

➢ Safeguard:
• Confidential business data
• Private customer and employee data
➢ Protect against malicious acts of theft or disruption
➢ Balance against other business needs and issues
Why Computer Incidents Are So
4

Prevalent
1. Increasing complexity increases vulnerability

 Computing environment is enormously complex


• Continues to increase in complexity
• Number of entry points expands continuously
• Cloud computing and virtualization software

Cloud computing is the on-demand availability of computer system resources, especially data storage
and computing power, without direct active management by the user. The term is generally used to
describe data centers available to many users over the Internet.
Why Computer Incidents Are So
5

Prevalent (Cont.)
2. Higher computer user expectations
 Today, time means money, and the faster computer users can solve a
problem, the sooner they can be productive. As a result, computer
help desks are under intense pressure to respond very quickly to users’
questions. Under duress, help desk personnel:
• Forget to verify users’ IDs or check authorizations
• Computer users share login IDs and passwords

 This can enable workers to gain access to information systems and


data for which they are not authorized.
Why Computer Incidents Are So
6

Prevalent (Cont.)
3. Expanding/changing systems equal new risks
 Network era
• Personal computers connect to networks with millions of other computers
• All capable of sharing information
 Information technology
• Ubiquitous
• Necessary tool for organizations to achieve goals
• Increasingly difficult to match pace of technological change
Why Computer Incidents Are So
7

Prevalent (Cont.)
4 . Increased reliance on commercial software with known vulnerabilities
 Exploit

 Attack on information system


 Takes advantage of system vulnerability
 Due to poor system design or implementation
 Patch

 “Fix” to eliminate the problem


 Users are responsible for obtaining and installing
 Delays expose users to security breaches
Why Computer Incidents Are So
8

Prevalent (Cont.)
Commercial software
 Any software or program that is designed and developed for
licensing or sale to end users or that serves a commercial purpose.
 Examples: Microsoft Windows Operating System, MS Office, off-the-shelf
software programs, such as games or those sold in computer
specialty stores or even music stores and grocery stores
 This type of software includes financial, marketing and accounting
software.
 During the last decades, however, some open-source applications
have also become commercial software, licensed to customers as is
or as part of a service.
Why Computer Incidents Are So
9

Prevalent (Cont.)
 Zero-day attack:
- A zero day exploit is a cyber attack that occurs on the same
day a weakness is discovered in software. At that point, it's
exploited before a fix becomes available from its creator.
- Before a vulnerability is discovered or fixed

 U.S. companies rely on commercial software with known


vulnerabilities
Types of Exploits
10

 Computers as well as smartphones can be target

 Types of attacks
1. Virus
2. Worm
3. Trojan horse
4. Distributed denial of service
5. Rootkit
6. Spam
7. Phishing (spear-phishing, smishing, and vishing)
1. Viruses
11

 Pieces of programming code, Often attached to files and usually


disguised as something else.
 Cause unexpected and undesirable behavior
 Spread by actions of the “infected” computer user
• Infected e-mail document attachments
• Downloads of infected programs
• Visits to infected Web sites
 Deliver a “payload”: which is the part of transmitted data that is the
actual intended message. Headers and metadata are sent only to
enable payload delivery. In the context of a computer virus or worm, the
payload is the portion of the malware which performs malicious.
2. Worms
12

 Harmful programs
 Reside in active memory of a computer
 Duplicate themselves

 Can propagate without human intervention

 Negative impact of worm attack


 Lost data and programs
 Lost productivity
 Additional effort for IT workers
3. Trojan Horses
13

 Malicious code hidden inside seemingly


harmless programs
 Users are tricked into installing them
 Delivered via email attachment,
downloaded from a Web site, or
contracted via a removable media
device
 Logic bomb: a set of instructions secretly
incorporated into a program so that if a
particular condition is satisfied they will be
carried out, usually with harmful effects →
executes when triggered by certain event
4. Distributed Denial-of-Service
14

(DDoS) Attacks
 Malicious hacker takes over computers on the Internet and causes them
to flood a target site with demands for data and other small tasks
• The computers that are taken over are called zombies
• Botnet is a very large group of such computers

 Does not involve a break-in at the target computer


• Target machine is busy responding to a stream of automated requests
• Legitimate users cannot access target machine
5. Rootkits
15

 Set of programs that enables its user to gain administrator-level access


to a computer without the end user’s consent or knowledge

 Attacker can gain full control of the system and even obscure the
presence of the rootkit

 Fundamental problem in detecting a rootkit is that the operating system


currently running cannot be trusted to provide valid test results
6. Spam
16

 Abuse of email systems to send unsolicited email to large numbers of


people
• Low-cost commercial advertising for questionable products
• Method of marketing also used by many legitimate organizations

 Controlling the Assault of Non-Solicited Pornography and Marketing


(CAN-SPAM) Act → Legal to spam if basic requirements are met

 Completely Automated Public Turing Test to Tell Computers and Humans


Apart (CAPTCHA) → Software generates tests that humans can pass but
computer programs cannot
7. Phishing
17

 It is the fraudulent practice of sending emails purporting to be from


reputable companies in order to induce individuals to reveal personal
information, such as passwords and credit card numbers.

 Act of using email fraudulently to try to get the recipient to reveal


personal data

 Legitimate-looking emails lead users to counterfeit Web sites


7. Phishing (Cont.)
18

Types of phishing:

 Spear-phishing
Fraudulent emails to an organization’s employees

 Smishing
Phishing via text messages

 Vishing
Phishing via voice mail messages
Types of Perpetrators
19

 Perpetrators include:
• Thrill seekers wanting a challenge
• Common criminals looking for financial gain
• Industrial spies trying to gain an advantage
• Terrorists seeking to cause destruction

 Different objectives and access to varying resources

 Willing to take different levels of risk to accomplish an


objective
Types of Perpetrators (Cont.)
20

There are many different kinds


of people who launch
computer attacks, including:

the hacker, cracker, malicious


insider, industrial spy,
cybercriminal, hacktivist, and
cyberterrorist.
Types of Perpetrators (Cont.)
21

1. Hackers
 Test limitations of systems out of intellectual curiosity
 Some smart and talented
 Others inept; termed “lamers” or “script kiddies”

2. Crackers
 Cracking is a form of hacking – Cause problem- steal data
 Clearly criminal activity
Types of Perpetrators (Cont.)
22

3. Malicious Insiders
 Major security concern for companies
 Fraud within an organization is usually due to weaknesses in internal
control procedures
 Collusion → Cooperation between an employee and an outsider
 Insiders
are not necessarily employees → Can also be consultants
and contractors
 Extremely difficult to detect or stop → Authorized to access the very
systems they abuse
 Negligent insiders have potential to cause damage
Types of Perpetrators (Cont.)
23

4. Industrial Spies
 Use illegal means to obtain trade secrets from competitors
 Trade secrets are protected by the Economic Espionage Act of 1996
 Types of spies:
A. Competitive intelligence
• Uses legal techniques
• Gathers information available to the public
B. Industrial espionage
• Uses illegal means
• Obtains information not available to the public
Types of Perpetrators (Cont.)
24

5. Cybercriminals
 Hack into corporate computers to steal

 Engage in all forms of computer fraud

 To reduce potential for online credit card fraud:


• Use encryption technology
• Verify the address submitted online against the issuing bank
• Request a card verification value (CVV)
• Use transaction-risk scoring software
Types of Perpetrators (Cont.)
25

5. Cybercriminals (Cont.)

 Smart cards
• Contain a memory chip
• Updated with encrypted data each time card is used
• Used widely in Europe
• Not widely used in the U.S.

 Loss of customer trust has more impact than fraud


Types of Perpetrators (Cont.)
26

6. Hacktivism
 Hacking to achieve a political or social goal

7. Cyberterrorist
 Attacks computers or networks in an attempt to force a
government in order to advance certain political or social
objectives
 Seeks to cause harm rather than gather information
 Uses techniques that destroy or disrupt services
Federal Laws for Prosecuting 27

Computer Attacks
Over the years, several laws have been enacted to prosecute those
responsible for computer-related crime, including:

1. The USA Patriot Act,


2. The Identity Theft and Assumption Deterrence Act,
3. The Fraud and Related Activity in Connection with Access Devices Statute,
4. The Computer Fraud and Abuse Act,
5. Stored Wire and Electronic Communications and Transactional Record
Access Statutes.
Federal Laws for Prosecuting 28

Computer Attacks (Cont.)

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy