Computer Security And Computer Crimes. Problem under consideration A software flaw was found in a national bank's web site that allows anyone who knows.

Slides:



Advertisements
Similar presentations
Web Security for Network and System Administrators1 Chapter 1 Introduction to Information Security.
Advertisements

© 2007 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice Application Security and Testing.
Ethics, Privacy and Information Security
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
Confidentiality and HIPAA
Black, White, Grey Hat Hackers Not all hackers are bad…which one’s which?
Protection from Internet Theft By James Seegars. What Is Hacking? Definition – A)To change or alter(Computer Program) – B) To gain access to (a computer.
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
1 Defining System Security Policies. 2 Module - Defining System Security Policies ♦ Overview An important aspect of Network management is to protect your.
Computer Threats I can understand computer threats and how to protect myself from these threats.
Netiquette Rules.
Hacker Ethics Kim Bissett Sabrina Short. Hacker Ethic: In General  Freedom of Information The web is not physical; it couldn’t be interpreted as property,
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
Security, Privacy, and Ethics Online Computer Crimes.
Ethical Hacking by Shivam.
Overview of IS Auditing n Need for control and Audit of Computers –Org cost of data loss –cost of incorrect decision –Value of hardware, software, personnel.
1 Pertemuan 9 Network Security and E-Commerce Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi: >
Vulnerability Assessments
Acceptable Use Policy (AUP) What does it actually say? Why is it necessary?
Security Awareness Challenges of Security No single simple solution to protecting computers and securing information Different types of attacks Difficulties.
Chapter 3 Ethics, Privacy & Security
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Chapter Two Ethical & Legal Issues.
TITLE : E-SAFETY NAME : ABDUL HAFIQ ISKANDAR BIN ROZLAN PROGRAM : SR221 NO.STUDENT :
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
Question: Future Sessions AI and Military (UAS) Virtual Worlds Privacy and NSA Free Software Movement.
Update from Business Week Number of Net Fraud Complaints – 2002 – 48,252 – 2004 – 207,449.
1 Introduction to Security Chapter 5 Risk Management: The Foundation of Private Security.
Staying Safe Online Keep your Information Secure.
Personal Safety Unit - Level 7. The Internet is not anonymous. Your address, screen name, and password serve as barriers between you and others.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
Prepared by: Dinesh Bajracharya Nepal Security and Control.
INTRODUCTION Why AIS threats are increasing
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS). SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe.
Jan 11 Encryption and Hacking. Your Answer Encryption is used to keep information safe from unauthorised users. The best way to keep the system safe is.
Threat Assessment in a Logical Environment U.S. Financial Infrastructure Physical to Logical environment Protection and Threat Assessment Safe School.
Being Audited – Life on the Other Side of the Fence.
Security Awareness Challenges of Securing Information No single simple solution to protecting computers and securing information Different types of attacks.
STAY SAFE!! Don’t fall for the same old tricks !!.
First Look at Security and Privacy Jeremiah Burleson.
What is a case?  A written description of a business situation or problem  Provides factual information about a company’s background ○ organizational.
ITC Summer I Table of Contents Glossary of terms Glossary of terms Safety Tips Quiz Credits Standards Multimedia Connections Multimedia.
CSCE 522 Secure Software Development Best Practices.
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
APPLICATION PENETRATION TESTING Author: Herbert H. Thompson Presentation by: Nancy Cohen.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
Institutional affiliation Date.  Security is very important as it keeps your secret from other know.  An insecure network exposes a business to various.
My Digital Footprint.
Introduction to Information Security
Security Policies. Threats to security and integrity  Threats to information systems include  Human error –keying errors, program errors, operator errors,
Computer Ethics. Computer Virus  A Virus is a computer program written to alter the way a computer operates, without the permission or knowledge of the.
PENETRATION TESTING. A scare at bedtime! There is no hiding place, you can be found through a variety of means: DNS, Name Server Lookup, NSlookup, Newsgroups,
Copyright © 2007 Pearson Education Canada 23-1 Chapter 23: Using Advanced Skills.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Society & Computers PowerPoint
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
NETWORK SECURITY LAB Rehab AlFallaj. Learning Objective ■In this Lecture you will learn: –Ethical Issues related to network security.
Digital Footprints Cyberbullying Passwords The Digital Community Staying Safe Online
Technological Awareness for Teens and Young Adults.
Common Methods Used to Commit Computer Crimes
Chapter 7 Blowing the Whistle.
Can Cyber Insurance Stand in the Data Breach
How to build a good reputation online
Year 10 ICT ECDL/ICDL IT Security.
Unit 7 – Organisational Systems Security
STOP. THINK. CONNECT. Online Safety Quiz.
Cyber Issues Facing Medical Practice Managers
Presentation transcript:

Computer Security And Computer Crimes

Problem under consideration A software flaw was found in a national bank's web site that allows anyone who knows about the flaw to read all information about other people's bank accounts. You consider it a serious privacy risk. You sent to the bank about the problem but received no answer. What should you do next? Discuss pros and cons of various possible actions.A software flaw was found in a national bank's web site that allows anyone who knows about the flaw to read all information about other people's bank accounts. You consider it a serious privacy risk. You sent to the bank about the problem but received no answer. What should you do next? Discuss pros and cons of various possible actions.

Discussions covered Individual’s standpoint Bank’s perspective

Individual’s stand point Customer Decision Tree Call Customer Support Representative Take AdvantageDo NothingTry Again Stage I Stage II

Individual’s stand point (cont’d.) [ Customer Decision Tree…] Harmless Hacking Malicious Hacking Hactivism Close Account Follow Executive Hierarchy Repetition till remedy Eye on possibility of threats (Take Advantage)(Do Nothing) (Try Again)

Individual’s standpoint (cont’d.) 1.Take Advantage of the Situation Use your knowledge to hack the web site –Harmless hacking Let the bank know they have been hacked Probably illegal Forces the bank to confront security breach Is this ethically justified?

Individual’s standpoint (cont’d.) [ 1.Take Advantage of the Situation…] –Malicious hacking Access accounts yourself Disrupt service and/or steal money Very much illegal Severe penalties No ethical justification

Individual’s standpoint (cont’d.) [ 1.Take Advantage of the Situation…] –Hacktivism Disrupt service Tell other customers that web site is unsafe Very much illegal or valid civil disobedience? Penalties may not be as severe

Individual’s standpoint (cont’d.) [ 1.Take Advantage of the Situation…] In all three hacking examples the bank may incur serious losses –Financial –Customer relationships –Service disruptions

Close account and go away –Problem still exists –Save your own hide –No recognition of responsibility to anyone beyond yourself; socially irresponsible –Absolutely the least one can do –Don’t care about bank’s further actions Individual’s standpoint (cont’d.) 2. Do Nothing

Go up one level in complaint –Threaten to leave –Threaten to go to authorities (FDIC) –Threaten to go to media Repeat process as necessary, through chain of command Individual’s standpoint (cont’d.) 3. Try again

Individual’s standpoint (cont’d.) [ 3. Try again…] Follow through on threats Shows –Social responsibility –Customer loyalty

Bank’s Perspective Decision Tree Informed of Glitch Do Nothing Do Something Internal Fix External Fix

Bank’s Perspective Bank’s Perspective 1. Keep quiet about it –Don’t draw attention Keep secret from hackers –Reliance on secrecy Cheap –Cost of fix vs. cost of liability Cost of exposure could have consequences beyond the cost of fixing the problem

Bank’s Perspective (cont’d.) 2. Analyze and fix problem internally –Problem can be fixed without undue publicity –Minimal disruption of service –Question of competence Can we trust the people who broke it to fix it? –Potentially most cost effective

Bank’s Perspective (cont’d.) [ 2. Analyze and fix problem internally…] –Check the flaw and see if any others exist –Check on potential of IT team Maybe hire a hacker to test other parts of the system –Let it stay within the bank

Bank’s Perspective (cont’d.) 3. Third party security audit –What requires auditing? Hardware Software Network –Personnel evaluation

Bank’s Perspective (cont’d.) [ 3. Third party security audit …] –Question of security Threat of exposure Exposes secrets to outside entity

Bank’s Perspective (cont’d.) How to decide –Has anyone been injured Loss of money Loss of personal information –Consequences of breach becoming known Known only to hackers Known to general public –Ethical considerations

Comments / Questions