Computer Security Ethics

Slides:



Advertisements
Similar presentations
Digital Citizenship in the Classroom
Advertisements

Chapter 1  Introduction 1 Introduction Chapter 1  Introduction 2 The Cast of Characters  Alice and Bob are the good guys  Trudy is the bad guy 
Ethics, Privacy and Information Security
 Someone who exercises playful ingenuity  Misusers of the internet who try to obtain or corrupt information; people who try to prevent it.
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
Is There a Security Problem in Computing? Network Security / G. Steffen1.
OV 2- 1 Copyright © 2005 Element K Content LLC. All rights reserved. Security Threats  Social Engineering  Software-based Threats  Hardware-based Threats.
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
Internet Safety/Cyber Ethics
Computer Security and Penetration Testing
Hacker Ethics Kim Bissett Sabrina Short. Hacker Ethic: In General  Freedom of Information The web is not physical; it couldn’t be interpreted as property,
BUSINESS PLUG-IN B6 Information Security.
Computers in Society Week 8: Computer Security and Hacking.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 1 Introduction to Security.
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved ETHICS SECTION 4.1.
EDUC 260: Week 13 Hand-in your Position Paper. Overview Administrivia Ethics of computing in classrooms What did we learn in the course? Course evaluations.
January 14, 2010 Introduction to Ethical Hacking and Network Defense MIS © Abdou Illia.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Computer and Ethics. Ethical Problems Proliferation of computers and their networks have created new ethical problems The ACM has issued a Code of Ethics.
Computer Hacking Cybercrime (1).
Security Awareness Challenges of Security No single simple solution to protecting computers and securing information Different types of attacks Difficulties.
Cultural Competence “Whenever people of different races come together in groups, leaders can assume that race is an issue, but not necessarily a problem.”
Department of Mathematics Computer and Information Science1 Basics of Cyber Security and Computer Forensics Christopher I. G. Lanclos.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Computer Hacking By: Caleb Herring Katie Edom. What is Computer Hacking Computer Hacking is defined as one who uses programming skills to access, legally.
Issues Raised by ICT.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
Introduction Computers and English Matt Barton. What is this course all about? This course is designed to introduce you to the field of Computers and.
BUSINESS B1 Information Security.
Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?
Online Safety and Awareness. Introductions We are students at UNM We are taking an Information Security course this semester. It is our mission to teach.
Security Awareness: Applying Practical Security in Your World Chapter 1: Introduction to Security.
INTRODUCTION. The security system is used as in various fields, particularly the internet, communications data storage, identification and authentication.
Attacks On systems And Networks To understand how we can protect our system and network we need to know about what kind of attacks a hacker/cracker would.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Chapter 01: Introduction to Network Security. Network  A Network is the inter-connection of communications media, connectivity equipment, and electronic.
Chapter 1  Introduction 1 Chapter 1: Introduction.
Ethics, Computing, and the Internet
Lecture 21 Computer Security Ethics
Computer Crime crime accomplished through knowledge or use of computer technology. Computers are tools – we choose how to use / apply the technology.
Human Resource Management Lecture-38. Summary of Lecture-37.
James McQuillen. Data protection Act 1998 The main aim of it is to protect people's fundamental rights and freedom to a particular right to privacy of.
Digital Citizen Project By: Frances Murphey Technology and Education.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
PREPARED BY : Harsh patel dhruv patel sreejit sundaram.
MUHAMMAD GHAZI AIMAN BIN MOHD AIDI. DEFINITION  A computer virus is a malware program that, when executed, replicates by inserting copies of itself (possibly.
Professional Ethics and Responsibilities Part-II
Social Impacts of IT: P6 By André Sammut. Social Impacts IT impacts our life both in good ways and bad ways. Multiplayer Games Social Networks Anti-social.
Information Security and Privacy in HRIS
Technical Implementation: Security Risks
Digital Citizenship in the Classroom
Add video notes to lecture
Network Security Fundamentals
Cyber Security By: Pratik Gandhi.
Fundamentals of Information Systems
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Digital Citizenship in the Classroom
Answer the questions to reveal the blocks and guess the picture.
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Video: Digital citizenship is defined as the norms of appropriate,
Digital Citizenship in the Classroom
Computer Crime and Security Measures
Welcome to the E Safety Workshop
Chapter # 3 COMPUTER AND INTERNET CRIME
Test 3 review FTP & Cybersecurity
Privacy, Security, and Ethics
Presentation transcript:

Computer Security Ethics Mehrdad Saadatmand

Before we start… Being ethical is not necessarily following one’s feelings; “feelings frequently deviate from what is ethical“ Often because of the way one is raised, ethics and religion are coupled; but ethics is not confined to religion nor is the same as religion Being ethical is not solely following the law. Elements of practical ethics through basic philosophy: Ethical thought Ethical definition Ethical values Example: “If a person conceives of engineering activity as only making money, then one's definition of practical ethics, one's actions and values will, be guided by this basic philosophical position. “

Security in: Client / Workstation / Terminal Intra-networks Inter-networks In terms of: Physical Security Non-Physical Security

Security Threats (sources, causes, people behind) : Hackers Crackers Script Kiddies Unethical Employees (logic bombs, backdoor,…) Cyberterrorists Corporate Spy Worm / Virus / Trojan (incl. keyloggers,…) Spoofing / Sniffing / Phishing DoS / DDoS attacks Hoax / Spam ...

Examples:

Examples (cont): Virtual Private Network (VPN) Generic Routing Encapsulation (GRE) Encapsulation Security Payload (ESP) Remote Access VPN Site to Site (Router to Router) VPN

Example of Phishing:

Hackers’ Code of Ethics: Hacker creed (Steven Levy’s “Hackers: Heroes of Computer Revolution” - 1984 ): Access to computers should be unlimited and total. Always yield to the Hands-On Imperative All information should be free. Mistrust authority -- promote decentralization. Hackers should be judged by their hacking. You can create art and beauty on a computer. Computers can change your life for the better.

New Code of Ethics (90s) - Steven Mizrach : "Above all else, do no harm" Protect Privacy "Waste not, want not." Exceed Limitations The Communicational Imperative Leave No Traces Share! Self Defense Hacking Helps Security Trust, but Test! In Short : 1) protect data and hardware 2) respect and protect privacy 3) utilize what is being wasted by others 4) exceed unnecessary restrictions 5) promote peoples' right to communicate 6) leave no traces 7) share data and software 8) be vigilant against cyber-tyranny and 9) test security and system integrity of computer systems.

New(er) Hacker Ethics: Hackers share and are willing to teach their knowledge. Hackers are skilled. Many are self-taught, or learn by interacting with other hackers. Hackers seek knowledge. This knowledge may come from unauthorized or unusual sources, and is often hidden. Hackers like to understand how things work, and want to make their own improvements or modifications. Hackers often disagree with authority, including parents, employers, social customs and laws. They often seek to get around authority they disagree with. Hackers disagree with each other. Different hackers have different values, and come from all backgrounds. This means that what one hacker is opposed to might be embraced by another.

New(er) Hacker Ethics: Hackers are persistent, and are willing to devote hours, days and years to pursuing their individual passions. This Code is not to prescribe how hackers act. Instead, it is to help us to recognize our own diversity and identity. Every hacker must make his or her own decisions about what is right or wrong, and some might do things they believe are illegal, amoral or anti-social. Hackers' motivations are their own, and there is no reason for all hackers to agree. Hackers have a shared identity, however, and many shared interests. By reading this Code, hackers can recognize themselves and each other, and understand better the group they are a part of.

Hackers’ Code of Ethics: Old code vs new code Are new hackers aware of the original hacker ethics? Are new hackers aware of any hacker ethics? Influence of technology and social issues on changes in hacker ethics Similarity between the old and new ethics and ethical continuity

Ethical Issues in Security Courses More security subjects are moved from graduate level to undergraduate level ; graduate students are more mature than undergraduate ones Are security courses’ materials really appropriate? (some include: trying DDOS, writing and spreading a virus,…) Major of computer hackers are under the age of 25 and many of them are college students Using hacking tools in labs and classes increases “comfort level” with such tools  the more comfortable people become with one computer technology, the more likely they are to use them

Ethical Issues in Security Courses There are many justifications for teaching such sensitive issues: to strengthen the nations defense against attacks. But do we need to know the details of how to make a bomb in order to defend ourselves against bomb attacks? Using password crackers is not necessary to teach the dangers of using weak and insecure passwords. “Students would learn them on their own anyway. We are presenting this material in a responsible manner.” The big question is : how to really present this material in a responsible manner ?

Ethical Issues in Security Courses Requiring students to sign a statement and take an ethical oath? Teaching ethical issues as part of a course? Problem: ethical standards cannot be integrated in individuals just over a short period of time! Ethical subjects are necessary especially in computer security curricula. Ethical standards should be taught to students early in the program and students should be reminded of them throughout the program. Students should become aware about the consequences of misuse of their knowledge

Ethical Issues in Security Courses The problem of “deindividualism” (group size, anonymity) “Deindividualism is a feeling of separation and anonymity that can lead to individuals engaging in a broader range of unethical behaviors.” “Deindividuation is the psychological state of separation of the individual from others“ It is often seen in chatrooms and message boards. Making students aware that they are trusted with something important encourages them to live up to that trust. Sensitive topics should be taught and discussed at higher levels of a program.