Copyright © 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 6: Computer and Network Security Ethics for the Information Age Forth.

Slides:



Advertisements
Similar presentations
Shelby County Technology Scope and Sequence 6-8 #8: AUP Computer Fraud Copyright Violations Penalties Nancy Law Columbiana Middle School.
Advertisements

Good or Bad?.  One of the closest contests in US history  Florida was the pivotal state  Neither Democrat Al Gore nor Republican George W. Bush had.
Chapter 6 Computer and Network Security. Copyright © 2006 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Slide 4- 2 Chapter Overview Introduction.
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
Computer Viruses and Worms* *Referred to slides by Dragan Lojpur, Zhu Fang at Florida State University.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
1 COMPUTER SECURITY AND ETHICS Chapter Five. Computer Security Risks 2.
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
Computer Crime Computer and Network Security. Copyright © 2006 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Slide 4- 2 Identity Theft.
Chapter 7: Computer and Network Security
7.1 Copyright © 2011 Pearson Education, Inc. 7 Chapter Securing Information Systems.
Computers in Society Week 8: Computer Security and Hacking.
Malicious Attacks By Chris Berg-Jones, Ethan Ungchusri, and Angela Wang.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Copyright © 2002 Pearson Education, Inc. Slide 5-1 PERTEMUAN 8.
Copyright © 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 6: Computer and Network Security Ethics for the Information Age Third.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
S EC (4.5): S ECURITY 1. F ORMS OF ATTACK There are numerous way that a computer system and its contents can be attacked via network connections. Many.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Chapter 11 Security and Privacy: Computers and the Internet.
Chapter 6: Computer and Network Security Ethics for the Information Age Fourth Edition by Michael J. Quinn Copyright © 2011 Pearson Education,
Viruses.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
 Computer Hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose.  the act.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
BUSINESS B1 Information Security.
Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Ethics for the Information Age Fourth Edition by Michael J. Quinn Chapter.
C8- Securing Information Systems
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
Introduction of Internet security Sui Wang IS300.
Cyber Security Anchorage School District – 7 th grade Internet Safety.
Viruses, Computer Security & Ethical Issues Digital Communication Systems Ms. Powers.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Attacks On systems And Networks To understand how we can protect our system and network we need to know about what kind of attacks a hacker/cracker would.
Chapter 5: General Computer Topics Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills /1436.
IT internet security. The Internet The Internet - a physical collection of many networks worldwide which is referred to in two ways: The internet (lowercase.
Trojan Horses on the Web. Definition: A Trojan horse a piece of software that allows the user think that it does a certain task, while actually does an.
Types of Electronic Infection
Security at NCAR David Mitchell February 20th, 2007.
Company LOGO Malicious Attacks Brian Duff Nidhi Doshi Timmy Choi Dustin Hellstern.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Topic 5: Basic Security.
Malicious Software.
Computer Skills and Applications Computer Security.
Computer Security By Duncan Hall.
INTRODUCTION TO COMPUTER & NETWORK SECURITY INSTRUCTOR: DANIA ALOMAR.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Security Issues and Ethics in Education Chapter 8 Brooke Blanscet, Morgan Chatman, Lynsey Turner, Bryan Howerton.
Computer and Network Security Brendan Duncombe Bahein Maung.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Chapter 6: Computer and Network Security
IT Security  .
BCT 2.00 Analyze Technology Issues
Chapter 6: Computer and Network Security
Presentation transcript:

Copyright © 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 6: Computer and Network Security Ethics for the Information Age Forth Edition by Michael J. Quinn

1-2 Copyright © 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 6-2 Chapter Overview Introduction Viruses, worms, and Trojan horses Phreaks and hackers Denial-of-service attacks Online voting

1-3 Copyright © 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 6-3 Introduction Computers getting faster and less expensive Utility of computers increasing – –Web surfing –Shopping –Managing personal information Increasing use of computers  growing importance of computer security

1-4 Copyright © 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 6-4 Viruses (1/2) Virus: piece of self-replicating code embedded within another program (host) Viruses associated with program files –Hard disks, floppy disks, CD-ROMS – attachments How viruses spread –Diskettes or CDs – –Files downloaded from Internet

1-5 Copyright © 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 6-5 Viruses (2/2) Well-known viruses –Brain –Michelangelo –Melissa –Love Bug Viruses today –Commercial antivirus software –Few people keep up-to-date

1-6 Copyright © 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 6-6 Worms Worm –Self-contained program –Spreads through a computer network –Exploits security holes in networked computers Famous worms –WANK –Code Red –Sapphire (Slammer) –Blaster –Sasser

1-7 Copyright © 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 6-7 The Internet Worm Robert Tappan Morris, Jr. –Graduate student at Cornell –Released worm onto Internet from MIT computer Effect of worm –Spread to 6,000 Unix computers –Infected computers kept crashing or became unresponsive –Took a day for fixes to be published Impact on Morris –Suspended from Cornell –3 years’ probation hours community service –$150,000 in legal fees and fines

1-8 Copyright © 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 6-8 Ethical Evaluation Kantian evaluation –Morris used others by gaining access to their computers without permission Social contract theory evaluation –Morris violated property rights of organizations Utilitarian evaluation –Benefits: Organizations learned of security flaws –Harms: Time spent by those fighting worm, unavailable computers, disrupted network traffic, Morris’s punishments Morris was wrong to have released the Internet worm

1-9 Copyright © 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 6-9 Trojan Horses Trojan horse: program with benign capability that masks a sinister purpose Remote access Trojan: Trojan horse that gives attack access to victim’s computer –Back Orifice –SubSeven RAT servers often found within files downloaded from erotica/porn Usenet sites provide the attacker with complete control of the victim's system. Attackers usually hide these Trojan horses in games and other small programs that unsuspecting users then execute on their PCs.

1-10 Copyright © 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 6-10 Bot Networks Bot: A software program that responds to commands from a program on another computer Some bots support legitimate activities –Internet Relay Chat –Multiplayer Internet games Other bots support illegitimate activities –Distributing spam –Collecting person information for ID theft –Distributed denial-of-service attacks

1-11 Copyright © 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 6-11 Defensive Measures System administrators play key role Authorization: determining that a user has permission to perform a particular action Authentication: determining that people are who they claim to be Firewall: a computer monitoring packets entering and leaving a local area network –Ex: packet filter which accepts packets only from trusted computer on the Internet

1-12 Copyright © 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 6-12 Mon Hackers (1/2) Original meaning (1950s) –Explorer –Risk-taker –Technical virtuoso –Make a system do something never done before MIT developed a system to control movement of trains Hacker ethic –Hands-on imperative Access to computers that might teach you something about the work –Free exchange of information –Mistrust of authority---  promote decentralization –Value skill above all else  not degrees, position, … –Optimistic view of technology  computer can change your life to the better

1-13 Copyright © 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 6-13 Hackers (2/2) Meaning of “hacker” changed –Movie WarGames (1983) –Teenagers accessing corporate or government computers by trying to get user names and passwords: Dumpster diving –Looking through garbage for interesting bits of information Social engineering: manipulation of a person inside an organization to gain access to confidential info. –A hacker calling a system admin. Pretending he is his boss’s boss and asks for revealing passwords. –Modern use of hacking means Malicious acts Computer break-ins Destroying databases Stealing confidential personal information

1-14 Copyright © 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 6-14 Phone Phreaking Phone phreak: someone who manipulates phone system to make free calls Most popular methods –Steal long-distance telephone access codes –Guess long-distance telephone access codes –Use a “blue box” to get free access to long- distance lines --- mimic the actual frequency Access codes posted on “pirate boards” by phreaks to share codes and credit card No.

1-15 Copyright © 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 6-15 Penalties for Hacking Examples of illegal activities –Accessing without authorization any Internet computer –Transmitting a virus or worm –Trafficking in computer passwords –Intercepting a telephone conversation, , or any other data transmission –Accessing stored messages without authorization –Adopting another identity to carry out an illegal activity Maximum penalty: 20 years in prison + $250,000 fine

1-16 Copyright © 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 6-16 Denial-of-Service Attacks Denial-of-service attack: an intentional action designed to prevent legitimate users from making use of a computer service Goal of attack: disrupt a server’s ability to respond to its clients About 4,000 Web sites attacked each week Asymmetrical attack: a single person can harm huge organization (multinational organization) Asymmetrical attack that may prove popular with terrorists –Ex: mafiaboy Dos of amazon, yahoo, cnn, ebay, dell

1-17 Copyright © 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 6-17 SATAN Security Administrator Tool for Analyzing Networks (SATAN) Allows administrators (especially novices) to test their systems Could be used by a hacker to probe other computers for security weaknesses Critics worried SATAN would turn unskilled teenagers into hackers That never happened

1-18 Copyright © 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 6-18 Motivation for Online Voting 2000 U.S. Presidential election closely contested Florida pivotal state Most Florida counties used keypunch voting machines Two voting irregularities traced to these machines –Hanging chad –“Butterfly ballot” in Palm Beach County

1-19 Copyright © 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 6-19

1-20 Copyright © 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 6-20 Benefits of Online Voting More people would vote Votes would be counted more quickly No ambiguity with electronic votes Cost less money Eliminate ballot box tampering Software can prevent accidental over-voting Software can prevent under-voting

1-21 Copyright © 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 6-21 Risks of Online Voting Gives unfair advantage to those with home computers More difficult to preserve voter privacy –The system records the ballot as well as the identity of voter More opportunities for vote selling –X:voter, y: candidate, z: broker who watch voting of x from his PC Obvious target for a DDoS attack Security of election depends on security of home computers –Susceptible to vote-changing virus or RAT Susceptible to phony vote servers –Redirected to phony server, getting credentials, then vote on your behalf from the actual site No paper copies of ballots for auditing or recounts