Computers in Society Week 8: Computer Security and Hacking.

Slides:



Advertisements
Similar presentations
CSCI 240 Computers and Society1 Computer Security Notice: This set of slides is based on the notes by Professor Guattery of Bucknell and by the textbook.
Advertisements

Shelby County Technology Scope and Sequence 6-8 #8: AUP Computer Fraud Copyright Violations Penalties Nancy Law Columbiana Middle School.
POSSIBLE THREATS TO DATA
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
Social Network Security Issues: Social Engineering and Phishing Attacks Jeffrey Allen, Leon Gomez, Marlon Green, Phillip Ricciardi, Christian Sanabria.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
PEOPLE’S REPUBLIC OF HACKING By: Lani N, Ashley R, Michael R, Gregory R.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
The development of Internet A cow was lost in Jan 14th If you know where it is, please contact with me. My QQ number is QQ is one of the.
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
Class 11: Information Systems Ethics and Crime MIS 2101: Management Information Systems Based on material from Information Systems Today: Managing in the.
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
Computer Security and Penetration Testing
Malicious Attacks By Chris Berg-Jones, Ethan Ungchusri, and Angela Wang.
HACKER NOT CRACKER. HACKER IS  A person who enjoys exploring the details of programmable systems and how to stretch their capabilities  Most often programmers.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
Security Advice Georgie Pepper Campsmount Acadamy.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
Viruses.
Digital Citizenship By: Miranda Scorver.
Unit 2 - Hardware Computer Security.
Introduction Computers and English Matt Barton. What is this course all about? This course is designed to introduce you to the field of Computers and.
 Computer Hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose.  the act.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Cyber crime & Security Prepared by : Rughani Zarana.
Spyware and Viruses Group 6 Magen Price, Candice Fitzgerald, & Brittnee Breze.
Viruses & Destructive Programs
C HAPTER 5 General Computer Topics. 5.1 Computer Crimes Computer crime refers to any crime that involves a computer and a network. Net crime refers to.
Computer crime University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot March 2011 March 2011 ITSS 4201 Internet Insurance and.
Introduction of Internet security Sui Wang IS300.
Chapter 5: General Computer Topics Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills /1436.
Trojan Horses on the Web. Definition: A Trojan horse a piece of software that allows the user think that it does a certain task, while actually does an.
Computer Defining denial of service, worm, virus and hoax. Examples of negligence or incompetence that leads to crime. CI R M E By: Megan Price.
Lecture 21 Computer Security Ethics
About Phishing Phishing is a criminal activity using social engineering techniques.criminalsocial engineering Phishers attempt to fraudulently acquire.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
James McQuillen. Data protection Act 1998 The main aim of it is to protect people's fundamental rights and freedom to a particular right to privacy of.
Computer security By Isabelle Cooper.
Topic 5: Basic Security.
Computer Ethics. Computer Virus  A Virus is a computer program written to alter the way a computer operates, without the permission or knowledge of the.
Computer Skills and Applications Computer Security.
Computer crimes.
Understand Malware LESSON Security Fundamentals.
HACKERS: HEROES OF THE COMPUTER REVOLUTION 25 TH ANNIVERSARY By: Brett Delaney Living in a Networked World: The Good, the Bad, and the Ugly CS 408 Section.
Types of Computer Malware. The first macro virus was written for Microsoft Word and was discovered in August Today, there are thousands of macro.
PREPARED BY : Harsh patel dhruv patel sreejit sundaram.
Computer and Internet Security (How to protect your computer from Threats) By: Steven Siggers Instructor: Dr. Marko Puljic.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Hackers: Heroes of the Computer Revolution By: Steven Levy.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Threats To Data 30 Threats To Data 30. Threats To Data 30 We’re now going to look at a range of different threats to people’s data: Opportunity Threats.
Computer Security Keeping you and your computer safe in the digital world.
Cyber crimes is the most popular news we come across daily In good olden days there were no development in the usage of computers as we have now As.
Digital Citizenship Project Submitted by: Etta Pope Instructor: Laurie Fowler.
Prepared for: Dr. Mokhairi Mokhtar Prepared by: Ana Syafiqah Binti Zahari Hazira Hamiza
Social Impacts of IT: P6 By André Sammut. Social Impacts IT impacts our life both in good ways and bad ways. Multiplayer Games Social Networks Anti-social.
Security Risks Todays Lesson Security Risks Security Precautions
3.6 Fundamentals of cyber security
Network security threats
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Computers and Society Computer Security
HOW DO I KEEP MY COMPUTER SAFE?
Faculty of Science IT Department By Raz Dara MA.
Presentation transcript:

Computers in Society Week 8: Computer Security and Hacking

Last Lecture: Threats to Privacy Information collection: individuals and organizations can gather information that can be used for other purposes Information processing: activities such as data mining can be used to draw conclusions about collected data. Information dissemination: collected data can be distributed to harass or embarrass one Invasion: individuals or organizations can interfere in one’s life

Computer Security Computer security focuses on protecting the privacy of people’s computers and data. Note that with the growth of cloud services, such data may not be resident only on the computer. People who attempt to access others’ computers are called hackers ( 黑客 in Chinese).

Goals of Hacking Attempts to access others’ data may be only curiosity. However, such attempts are often malicious and aimed at stealing services, valuables, or private information. Hackers are often involved in identity theft, theft of financial information, theft of computer services (for example, for spamming), spying, or disruption of services.

Hacking History The first people who were called hackers were early computer enthusiasts such as members of the Tech Model Railroad Club at MIT. The Jargon File defines hacker as "A person who enjoys exploring the details of programmable systems and stretching their capabilities, as opposed to most users, who prefer to learn only the minimum necessary."

Hacking History (2) Steven Levy, in his book Hackers: Heroes of the Computer Revolution, describes the hacker ethic as including the following: Access to computers should be unlimited All information should be free Mistrust authority – promote decentralization Judge hackers by their work, not by their credentials Beauty can be created on a computer Computers can change lives for the better

Hacking History (3) At the same time that computer hackers were trying to make the world better, a culture of telephone hackers was working to gain free access to telephone service and also telephone company systems. These phone hackers stole service and, rarely, equipment from the telephone companies. On occasion they used their skills to hurt others, for example by cutting off their phone service.

Hacking History (4) The phone hackers eventually began calling themselves phreaks, a corruption of the word “freak” with the “ph” from phone. The phone phreaks were loosely organized, with their own publications (Phrack) and organizations (the Legion of Doom). As computers became popular in the 1980’s and 1990’s, phone phreaks turned more and more to computer hacking.

Hacking History (5) The phone phreaks stole telephone service and interfered with telephone company operations. However, law enforcement agencies sometimes overstated their effects, and overreacted in ways that ended up damaging legitimate businesses (Steve Jackson Games) or leading to failed prosecutions (Craig Neidorf/E911).

Hacking History (6) The hacking culture today has elements that resemble the old phone phreak culture. Information is freely exchanged on hacking websites, and there is an element of the old computer hacking culture in the respect for people with skills and knowledge to create new hacking tools. However, organized crime and governments have also become involved.

Hacking Attacks - Viruses A computer virus is a piece of self-replicating code embedded in another piece of code (called the host). Viruses were initially spread by copying infected software. Eventually viruses were embedded in s, allowing viruses to actively propogate themselves.

Hacking Attacks - Worms A computer worm is a self-contained program that spreads itself. An early worm was the Internet worm developed by Robert Tappan Morris. It started as an experiment, but programming errors caused it to spread out of control, bringing down much of the internet for a day or two.

The Conficker Worm The Conficker worm (or Downadup) is a highly sophisticated worm that has spread widely throughout the world. Its developers have watched the attempts to stop it, and have modified the Conficker program to counter attacks on the worm. No one knows who the authors are, but evidence points to Ukranian organized crime elements.

Hacking Attacks – Denial of Service Denial of Service attacks are intentional action designed to prevent legitimate users from making use of a computer service (Quinn). There are a number of ways in which denial of service attacks can be launched. They typically involve overloading some resource of the attacked computer(s). This is a favorite tactic of the group Anonymous.

Hacking Attacks – Social Techniques Social attacks take advantage of user carelessness or stupidity. Dumpster diving attempts to find useful technical information that has been thrown in the trash. Social engineering involves tricking people into giving away information about how to access and use systems.

Hacker Motivations Author Bruce Sterling in The Hacker Crackdown suggests that many hackers think of hacking like a game. Cyberspace doesn’t seem real because it’s not physical. The rules for real life don’t apply. Quinn ties this to similar notions underlying media piracy. The pirated material isn’t physical, it’s just a copy of the bits that isn’t worth what the owners think it’s worth.

Hacker Motivations (2) However, such comments apply to “hobbyist” hackers. The internet nowadays provides access to all kinds of economically valuable information. That draws in organized criminal activity as well. Organized crime is not treating this as a game. The information may be even more valuable to governments. Recent developments have exposed government involvement in hacking exploits.