1 Ethics in Information Technology, Second Edition Computer & Society Week 5.

Slides:



Advertisements
Similar presentations
ETHICAL HACKING A LICENCE TO HACK
Advertisements

COMP6005 An Introduction to Computing Session One: An Introduction to Computing Security Issues.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Fundamentals of Information Systems, Second Edition 1 Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 9.
Chapter 3 Computer and Internet Crime
Chapter 9 Information Systems Ethics, Computer Crime, and Security
1 Topic 1 – Lesson 3 Network Attacks Summary. 2 Questions ► Compare passive attacks and active attacks ► How do packet sniffers work? How to mitigate?
E-Commerce Security Issues. General E-Business Security Issues Any E-Business needs to be concerned about network security. The Internet is a “ public.
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
Ethics in Information Technology, Fourth Edition
 ICT Security › If the firm is a victim of a computer crime, should they pursue prosecution of the criminals at all costs, should they maintain a low.
Security, Privacy, and Ethics Online Computer Crimes.
Security+ Guide to Network Security Fundamentals
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
FIT3105 Security and Identity Management Lecture 1.
Business Data Communications, Fourth Edition Chapter 10: Network Security.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Ethics in Information Technology, Second Edition
Lecture 11 Reliability and Security in IT infrastructure.
Chapter 3 Computer and Internet Crime
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
Network security policy: best practices
Citadel Security Software Presents Are you Vulnerable? Bill Diamond Senior Security Engineer
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
Security. If I get 7.5% interest on $5,349.44, how much do I get in a month? (.075/12) = * 5, = $ What happens to the.004? =
ICS 434: Computer and Internet crime Aj. Thoranin Intarajak.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Defining Security Issues
PART THREE E-commerce in Action Norton University E-commerce in Action.
© Paradigm Publishing Inc. 8-1 Chapter 8 Security Issues and Strategies.
© Paradigm Publishing Inc. 8-1 Chapter 8 Security Issues and Strategies.
Security Chapter 8 Objectives Societal impact of information and information technology –Explain the meaning of terms related to computer security and.
Ethics in Information Technology, Second Edition 1 Computer & Society Week 4 Marwan Al-Namari.
Cyber crime & Security Prepared by : Rughani Zarana.
Lecture 10 Intrusion Detection modified from slides of Lawrie Brown.
BUSINESS B1 Information Security.
Business Computing 550 Lesson 6. 2 Security Threats on Web Sites Issues and vulnerabilities 1.Illegal Access and Use (Hacking the system or users exposing.
Introduction to Computer Ethics
 a crime committed on a computer network, esp. the Internet.
C8- Securing Information Systems
What is Ethics? Ethics Ethical behavior
Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time.
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
Topic 5: Basic Security.
Chap1: Is there a Security Problem in Computing?.
Security and Assurance in IT organization Name: Mai Hoang Nguyen Class: INFO 609 Professor: T. Rohm.
Module 12: Responding to Security Incidents. Overview Introduction to Auditing and Incident Response Designing an Audit Policy Designing an Incident Response.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
1 Integrated Site Security Project Denise Heagerty CERN 22 May 2007.
Issues for Computer Users, Electronic Devices, Computer and Safety.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
UNIT II COMPUTER AND INTERNET CRIME. OBJECTIVES 1.Identify key trade-offs and ethical issues associated with safeguarding of data and information systems.
Seminar On Ethical Hacking Submitted To: Submitted By:
Instructor Materials Chapter 7 Network Security
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Forensics Week 12.
SECURITY POLICIES, LAWS AND COMPUTER CRIMES (CCI410) PERTEMUAN 12
INFORMATION SYSTEMS SECURITY and CONTROL
Computer Security By: Muhammed Anwar.
Chapter # 3 COMPUTER AND INTERNET CRIME
Presentation transcript:

1 Ethics in Information Technology, Second Edition Computer & Society Week 5

 Security of information technology is of utmost importance  Protect confidential data  Safeguard private customer and employee data  Protect against malicious acts of theft or disruption  Must be balanced against other business needs and issues  Number of IT-related security incidents is increasing around the world 2 Ethics in Information Technology, Second Edition

 Computer Emergency Response Team Coordination Center (CERT/CC)  Established in 1988 at the Software Engineering Institute (SEI)  Charged with  Coordinating communication among experts during computer security emergencies  Helping to prevent future incidents 3 Ethics in Information Technology, Second Edition

 Computer help desks  Under intense pressure to provide fast responses to users’ questions  Sometimes forget to  Verify users’ identities  Check whether users are authorized to perform the requested action  Computer users share login IDs and passwords 4 Ethics in Information Technology, Second Edition

 Network era  Personal computers connect to networks with millions of other computers  All capable of sharing information  Information technology  Ubiquitous  Necessary tool for organizations to achieve goals  Increasingly difficult to keep up with the pace of technological change 5 Ethics in Information Technology, Second Edition

 Exploit  Attack on information system  Takes advantage of a particular system vulnerability  Due to poor system design or implementation  Patch  “Fix” to eliminate the problem  Users are responsible for obtaining and installing patches  Delays in installing patches expose users to security breaches 6 Ethics in Information Technology, Second Edition

 Zero-day attack  Takes place before a vulnerability is discovered or fixed  U.S. companies rely on commercial software with known vulnerabilities 7 Ethics in Information Technology, Second Edition

8

 Most frequent attack is on a networked computer from an outside source  Types of attacks  Virus  Worm  Trojan horse  Denial of service 9 Ethics in Information Technology, Second Edition

 Pieces of programming code  Usually disguised as something else  Cause unexpected and usually undesirable events  Often attached to files  Deliver a “payload” 10 Ethics in Information Technology, Second Edition

 Does not spread itself from computer to computer  Must be passed on to other users through  Infected document attachments  Programs on diskettes  Shared files  Macro viruses  Most common and easily created viruses  Created in an application macro language  Infect documents and templates 11 Ethics in Information Technology, Second Edition

 Harmful programs  Reside in active memory of a computer  Duplicate themselves  Can propagate without human intervention  Negative impact of virus or worm attack  Lost data and programs  Lost productivity  Effort for IT workers 12 Ethics in Information Technology, Second Edition

13 Ethics in Information Technology, Second Edition

 Program that a hacker secretly installs  Users are tricked into installing it  Logic bomb  Executes under specific conditions 14 Ethics in Information Technology, Second Edition

 Malicious hacker takes over computers on the Internet and causes them to flood a target site with demands for data and other small tasks  The computers that are taken over are called zombies  Does not involve a break-in at the target computer  Target machine is busy responding to a stream of automated requests  Legitimate users cannot get in  Spoofing generates a false return address on packets 15 Ethics in Information Technology, Second Edition

 Ingress filtering - When Internet service providers (ISPs) prevent incoming packets with false IP addresses from being passed on  Egress filtering - Ensuring spoofed packets don’t leave a network 16 Ethics in Information Technology, Second Edition

17

 Hackers  Test limitations of systems out of intellectual curiosity  Crackers  Cracking is a form of hacking  Clearly criminal activity 18 Ethics in Information Technology, Second Edition

 Top security concern for companies  Estimated 85 percent of all fraud is committed by employees  Usually due to weaknesses in internal control procedures  Collusion is cooperation between an employee and an outsider  Insiders are not necessarily employees  Can also be consultants and contractors  Extremely difficult to detect or stop  Authorized to access the very systems they abuse 19 Ethics in Information Technology, Second Edition

 Illegally obtain trade secrets from competitors  Trade secrets are protected by the Economic Espionage Act of 1996  Competitive intelligence  Uses legal techniques  Gathers information available to the public  Industrial espionage  Uses illegal means  Obtains information not available to the public 20 Ethics in Information Technology, Second Edition

 Hack into corporate computers and steal  Engage in all forms of computer fraud  Chargebacks are disputed transactions  Loss of customer trust has more impact than fraud  To reduce the potential for online credit card fraud sites:  Use encryption technology  Verify the address submitted online against the issuing bank  Request a card verification value (CVV)  Use transaction-risk scoring software 21 Ethics in Information Technology, Second Edition

 Smart cards  Contain a memory chip  Are updated with encrypted data every time the card is used  Used widely in Europe  Not widely used in the U.S. 22 Ethics in Information Technology, Second Edition

 Intimidate or coerce governments to advance political or social objectives  Launch computer-based attacks  Seek to cause harm  Rather than gather information  Many experts believe terrorist groups pose only a limited threat to information systems 23 Ethics in Information Technology, Second Edition

 Security  Combination of technology, policy, and people  Requires a wide range of activities to be effective  Assess threats to an organization’s computers and network  Identify actions that address the most serious vulnerabilities  Educate users  Monitor to detect a possible intrusion Create a clear reaction plan 24 Ethics in Information Technology, Second Edition

 Organization’s review of:  Potential threats to computers and network  Probability of threats occurring  Identify investments that can best protect an organization from the most likely and serious threats  Reasonable assurance  Improve security in areas with:  Highest estimated cost  Poorest level of protection 25 Ethics in Information Technology, Second Edition

26 Ethics in Information Technology, Second Edition

 A security policy defines  Organization’s security requirements  Controls and sanctions needed to meet the requirements  Delineates responsibilities and expected behavior  Outlines what needs to be done  Not how to do it  Automated system policies should mirror written policies 27 Ethics in Information Technology, Second Edition

 Trade-off between  Ease of use  Increased security  Areas of concern  attachments  Wireless devices  VPN uses the Internet to relay communications but maintains privacy through security features  Additional security includes encrypting originating and receiving network addresses 28 Ethics in Information Technology, Second Edition

 Educate users about the importance of security  Motivate them to understand and follow security policy  Discuss recent security incidents that affected the organization  Help protect information systems by:  Guarding passwords  Not allowing others to use passwords  Applying strict access controls to protect data  Reporting all unusual activity 29 Ethics in Information Technology, Second Edition

 Implement a layered security solution  Make computer break-ins harder  Firewall  Limits network access  Antivirus software  Scans for a specific sequence of bytes  Known as the virus signature  Norton Antivirus  Dr. Solomon’s Antivirus from McAfee 30 Ethics in Information Technology, Second Edition

31 Ethics in Information Technology, Second Edition

32 Ethics in Information Technology, Second Edition

 Antivirus software  Continually updated with the latest virus detection information  Called definitions  Departing employees  Promptly delete computer accounts, login IDs, and passwords  Carefully define employee roles  Create roles and user accounts 33 Ethics in Information Technology, Second Edition

 Keep track of well-known vulnerabilities  SANS (System Administration, Networking, and Security) Institute  CERT/CC  Back up critical applications and data regularly  Perform a security audit 34 Ethics in Information Technology, Second Edition

 Detection systems  Catch intruders in the act  Intrusion detection system  Monitors system and network resources and activities  Notifies the proper authority when it identifies  Possible intrusions from outside the organization  Misuse from within the organization  Knowledge-based approach  Behavior-based approach 35 Ethics in Information Technology, Second Edition

 Intrusion prevention systems (IPSs)  Prevent attacks by blocking  Viruses  Malformed packets and Other threats  Sits directly behind the firewall  Honeypot  Provides would-be hackers with fake information about the network and Decoy servers  Well-isolated from the rest of the network  Can extensively log activities of intruders 36 Ethics in Information Technology, Second Edition

 Response plan  Develop well in advance of any incident  Approved by  Legal department  Senior management  Primary goals  Regain control  Limit damage  Incident notification defines:  Who to notify and Who not to notify 37 Ethics in Information Technology, Second Edition

 Avoid releasing information about a security compromise in public forums.  Document all details of a security incident  All system events and Specific actions taken  All external conversations  Act quickly to contain an attack  Eradication effort  Collect and log all possible criminal evidence from the system  Verify necessary backups are current and complete  Create new backups 38 Ethics in Information Technology, Second Edition

 Follow-up  Determine how security was compromised  Prevent it from happening again  Review  Determine exactly what happened  Evaluate how the organization responded  Consider the potential for negative publicity  Legal precedent  Hold organizations accountable for their own IT security weaknesses 39 Ethics in Information Technology, Second Edition