Introduction to Computer Ethics

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Thank you to IT Training at Indiana University Computer Malware.
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
COMP6005 An Introduction to Computing Session One: An Introduction to Computing Security Issues.
 Application software consists of programs designed to make users more productive and/or assist with personal tasks.  Growth of internet simplified.
SECURITY CHECK Protecting Your System and Yourself Source:
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Information System protection and Security. Need for Information System Security §With the invent of computers and telecommunication systems, organizations.
Lecturer: Fadwa Tlaelan
Acceptable Use Policy –The Acceptable Use Policy defines the rules of the machine and internet connection you are on. –Specific policies differ by machine.
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
Computer Crime The Internet has opened the door to new kinds of crime and new ways of carrying out traditional crimes. Computer crime is any act that violates.
Unit 18 Data Security 1.
Prepared by: Nahed Al-Salah
Computer Viruses.
 ICT Security › If the firm is a victim of a computer crime, should they pursue prosecution of the criminals at all costs, should they maintain a low.
Security, Privacy, and Ethics Online Computer Crimes.
Lecture 2 Page 1 CS 236, Spring 2008 Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher Spring, 2008.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
January 14, 2010 Introduction to Ethical Hacking and Network Defense MIS © Abdou Illia.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Chapter Nine Maintaining a Computer Part III: Malware.
Chapter 11 Security and Privacy: Computers and the Internet.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
Viruses.
PART THREE E-commerce in Action Norton University E-commerce in Action.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
 Computer Hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose.  the act.
Prepared by: Dinesh Bajracharya Nepal Security and Control.
Introduction to Computer Ethics
1 Higher Computing Topic 8: Supporting Software Updated
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
Viruses, Trojans and Worms The commonest computer threats are viruses. Virus A virus is a computer program which changes the way in which the computer.
Attacks On systems And Networks To understand how we can protect our system and network we need to know about what kind of attacks a hacker/cracker would.
Security at NCAR David Mitchell February 20th, 2007.
Course code: ABI 204 Introduction to E-Commerce Chapter 5: Security Threats to Electronic Commerce AMA University 1.
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Security CS Introduction to Operating Systems.
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
James McQuillen. Data protection Act 1998 The main aim of it is to protect people's fundamental rights and freedom to a particular right to privacy of.
Topic 5: Basic Security.
Malicious Software.
Computer Security By Duncan Hall.
W elcome to our Presentation. Presentation Topic Virus.
Types of Computer Malware. The first macro virus was written for Microsoft Word and was discovered in August Today, there are thousands of macro.
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
ICT and the Law Mr Conti. Did you see anything wrong with that? Most people wouldn’t want that sort of information posted in a public place. Why? Because.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Issues for Computer Users, Electronic Devices, Computer and Safety.
COMPUTER VIRUSES ….! Presented by: BSCS-I Maheen Zofishan Saba Naz Numan Sheikh Javaria Munawar Aisha Fatima.
Information Systems CS-507 Lecture 32. Physical Intrusion The intruder could physically enter an organization to steal information system assets or carry.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
Cyber crimes is the most popular news we come across daily In good olden days there were no development in the usage of computers as we have now As.
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Chap 10 Malicious Software.
UNIT 18 Data Security 1.
Chap 10 Malicious Software.
Chapter # 3 COMPUTER AND INTERNET CRIME
Securing your system, protecting your digital data and devices.
Presentation transcript:

Introduction to Computer Ethics Text: George Reynolds, Ethics in Information Technology, Thomson Course Technology, Second Edition, 2006

Computer and Internet Crime Quote: In view of all the deadly computer viruses that have been spreading lately, Weekend Update would like to remind you: when you link up to another computer, you’re linking up to every computer that that computer has ever linked up to. (Dennis Miller, Saturday Night Live)

Real Case: Sasser Worm Unleashed in April 2004, the Sasser worm hit IT systems around the world hard and fast. http://www.symantec.com/security_response/writeup.jsp?docid=2004-050116-1831-99 http://www.pcworld.com/article/id,115979-page,1/article.html Didn’t spread through e-mail, but moved undetected across the Internet from computer to computer Exploited the weakness in Windows XP and 2000 By the first week of May, American Express, the Associated Press, the British Coast Guard, universities and hospitals reported that Sasser worm has swamped their systems Delta Airlines cancelled around 40 flights and delayed many others

Sasser Worm Microsoft posted a $250,000 reward By mid-May, authorities apprehended Sven Jaschan, a German teenager. Jaschan confessed and was convicted after a three-day trial: http://news.bbc.co.uk/2/hi/europe/3695857.stm He could receive up to five years in prison, but because he was tried as a minor, the court suspended his 21-month sentence, leaving him with only 30 hours of community service: http://news.bbc.co.uk/2/hi/technology/4659329.stm

Sasser Worm Just a few month after Jaschan’s indictment, the Securepoint, a German IT security company hired him as a programmer: http://www.sophos.com/pressoffice/news/articles/2004/09/va_jaschanjob.html Lawyers disagree over punishment in Sasser trial: http://www.computerworld.com/securitytopics/security/story/0,10801,103005,00.html?source=x73

Introduction to Ethics Quote from Aristotle: “Man, when perfected, is the best of the animals, but when separated from law and justice, he is the worst of all”

What is Ethics? Each society forms a set of rules that establishes the boundaries of generally accepted behavior. These rules are often expressed in statements about how people should behave, and they fit together to form the moral code by which a society lives. Ethics is the set of beliefs about right and wrong behavior. Ethical behavior conforms to generally accepted social norms, many of which are almost universal. Virtues are habits that incline people to do what is acceptable, and vices are habits of unacceptable behavior People’s virtues and vices help define their value system – the complex scheme of moral values by which they live

Professional Codes of Ethics A professional code of ethics states the principles and core values that are essential to the work of a particular occupational group. Association of Computing Machinery ACM (founded 1947) has a code of ethics and professional conduct. See: http://www.acm.org/constitution/code.html Association of Information Technology Professionals AITP (founded 1996) – provides quality IT-related education, information on relevant IT issues, and forums for networking with experienced peers and other IT professionals. The AITP also has a code of ethics, see: http://www.aitp.org/join/SCOH17CodeEthicsStdsCdt.pdf

Professional Codes of Ethics Computer Society of the Institute of Electrical and Electronics Engineers (IEEE – CS) (founded in 1946). The Software Engineering Code of Ethics and Professional Practice: http://www.acm.org/serving/se/code.htm Project Management Institute (PMI) – established in 1969. PMI Member Code of Ethics: http://www.pmi.org/info/AP_MemEthStandards.pdf

Common Ethical Issues for IT Users Software Piracy: a common violation occurs when employees copy software from their work computers for use at home Inappropriate Use of Computing Resources: some employees use their work computers to surf popular Web sites that have nothing to do with their jobs. “Half of Fortune 500 companies have dealt with at least one incident related to computer porn in the workplace over the past 12 months, according to a survey released today. Corporations are taking the problem seriously, and fired the offenders in 44% of the cases and disciplined those responsible in 41% of the instances”. (China Martens, Survey: Computer porn remains issue at U.S. companies, Computer-world, June 21, 2005 http://www.computerworld.com/action/article.do?command=viewArticleBasic&articleId=102664

Common Ethical Issues for IT Users Inappropriate Sharing of Information: Organizations stored vast amount of information that can be classified as private or confidential. Private data describes individual employees – for example, salary, attendance, performance rating, health record. Confidential information describes a company and its operations: sales, promotion plans, research and development. Sharing this information with unauthorized party, even inadvertently, has violated someone’s privacy or created the potential that company information could fall into the hands of competitors.

Supporting The Ethical Practices of IT Users Defining and Limiting the Appropriate Use of IT Resources Companies must develop, communicate and enforce written guidelines that encourage employees to respect corporate IT resources and use them to enhance their job performance. Effective guidelines allow some level of personal use while prohibiting employees from visiting objectionable Web sites or using company e-mail to send offensive or harassing messages. See: Widener University ITS Procedures: http://www.widener.edu/Administration/Information_Technology_Services/Information/Procedures/6662/

Supporting The Ethical Practices of IT Users Establishing Guidelines for Use of Company Software Company IT managers must provide clear rules that govern the use of home computers and associated software. The goal should be to ensure that employees have legal copies of all software Structuring Information Systems to Protect Data and Information Implement system and procedures that limit data access to employees who need it. Employees should be prohibited from accessing the data about research and development results, product formulae, and staffing projections if they don’t need it to do their job

Supporting The Ethical Practices of IT Users Installing and Maintaining a Corporate Firewall Firewall is a software or hardware device that serves as a barrier between a company and the outside world and limits access to the company’s network based on the Internet usage policy. Firewall can be configured to serve as an effective detergent unauthorized Web surfing by blocking access to specific, objectionable Web sites. Firewall can serve as an effective barrier to incoming e-mail from certain Web sites, companies or users Can be programmed to block e-mail with certain kinds of attachments, which reduces the risk of harmful computer viruses

Computer and Internet Crime IT Security Incidents The security of IT used in business is very important Although, the necessity of security is obvious, it often must be balanced against other business needs and issues IT professionals and IT users all face a number of ethical decisions regarding IT security:

Ethical Decisions Regarding IT Security Business managers, IP professionals, and IT users all face a number of ethical decisions regarding IT security: If their firm is a victim of a computer crime, should they pursue prosecution of the criminals at all costs, should they maintain a low profile to avoid the negative publicity, must they inform their affected customers, or should they take some other actions? How much effort and money should be spent to safeguard against computer crime (how safe is safe enough?)

Ethical Decisions Regarding IT Security If their firm produces software with defects that allow hackers to attack customer data and computers, what actions should they take? What tactics should management ask employees to use to gather competitive intelligence without doing anything illegal? What should be done if recommended computer security safeguards make life more difficult for customers and employees, resulting in lost sales and increasing costs?

What could be done to deal with the increasing number of IT-related security incidents, not only in USA but around the world? To deal with the incidents, the Computer Emergency Response Team Coordination Center (CERT/CC) was established in 1988 at the Software Engineering Institute (SEI) – federally funded research and development center at Carnegie Mellon: Study Internet Security vulnerabilities Handle Computer Security Incidents Publish Security Alerts Research long-term changes in networked systems Develop information and training Conduct ongoing public awareness campaign FBI Cyber Program, Internet Crime Complaint Center http://www.fbi.gov/cyberinvest/cyberhome.htm

Some Statistics The number of security problems reported to CERT/CC grew between 1997 and 2003 from 2134 to 137,529 From 2004 the CERT/CC no longer publishes the number of incidents reported

Challenges Increasing complexity increases vulnerability: The computing environment has become very complex Networks, computers, OS, applications, Web sites, switches, routers and gateways are interconnected and driven by hundreds of millions of lines of code The number of possible entry points to a network expands continually as more devices are added, increasing the possibility of security breaches

Challenges Higher computer user expectations: Time means money Help desks are under intense pressure to provide fast responses to user’s questions. Sometimes forgets to verify user’s identities, or to check authorization to perform a requested action

Challenges Expanding and changing systems introduce new risks: Businesses had moved from an era of stand-alone computers to a network era – personal computers connect to networks with millions of other computers all capable of sharing information. E-commerce, mobile computing, collaborative work groups, global business It is increasingly difficult to keep up with the pace of technological change, successfully perform an ongoing assessment of new security risks, and implement approaches for dealing with them

Challenges Increases reliance on commercial software with known vulnerabilities: Exploit is an attack on an information system that takes advantage of a particular system vulnerability. Often, this attack is due to poor system design or implementation. Once a vulnerability is discovered, software developers create and issue a “fix” or patch to eliminate the problem. Users are responsible for obtaining and installing the patch. Any delay in installing a patch exposes the user to a security breach. A rate of discovering software vulnerabilities exceeds 10 per day, creating a serious work overload for developers who are responsible for security fixes.

Challenges: Increases reliance on commercial software with known vulnerabilities: A zero-day attack take place BEFORE the security community or a software developer knows about a vulnerability or has been able to repair it. http://www.computerworld.com/securitytopics/security/hacking/story/0,10801,90447,00.html?f=x583 Malicious hackers are getting better and faster at exploiting flaws. The SQL Slammer worm appeared in January 2004, eight month after the vulnerability it targeted was disclosed: http://www.computerworld.com/softwaretopics/software/groupware/story/0,10801,89637,00.html

Challenges: Increases reliance on commercial software with known vulnerabilities: In August 2005, the ZOTOB computer worm began targeting corporate networks that run Windows 2000, less than a week after Microsoft released a critical patch addressing the vulnerability http://www.cnn.com/2005/TECH/internet/08/16/computer.worm/index.html In an attempt to avoid further attacks and the ultimate zero-day attack, computer security firms and software manufactures are paying hackers to identify vulnerabilities before they can be exploited. http://www.businessweek.com/magazine/content/05_34/b3948022_mz011.htm?chan=tc

Types of Attacks Security incidents can take many forms, but one of the most frequent is an attack on a networked computer from outside source. Most attacks involve: Viruses Worms Trojan Horses Denial – of – Service (DoS)

Viruses Computer virus has become an umbrella term for many types of malicious code. Technically, virus is a piece of programming code that seeks out other programs and “infects” a file by embedding a copy of itself inside the program. The infected program is often called a virus host. When the host procedure runs, the virus code runs as well and performs the instruction it was intended to perform. [1] A virus needs a host to infect. Without a host, the virus cannot replicate.

Viruses Viruses cause some unexpected and usually undesirable event. Most viruses deliver a “payload” or malicious act. For example, the virus may be programmed to display a certain message on the screen, delete or modify certain document, or reformat the hard drive. A true virus doesn’t spread itself from computer to computer. To propagate to other machines, it must be passed through e-mail attachment, shared files, etc…. It takes action by the computer user to spread a virus. Macro virus: attackers use an application macro language (Visual Basics Scripting) to create programs that infects documents and templates. After an infected document is opened, the virus is executed and infects the user’s application template. Macros can insert unwanted words, numbers or phrases into documents. After a macro virus infects user’s application, it can embed itself in all future documents created with the application

Viruses Virus is a program that can be broken into three functional parts [2]: Replication Concealment Bomb

Worms A worm is different from a virus in that it is a standalone program [1]. A typical worm maintains only a functional copy of itself in active memory and duplicate itself [2]. They differ from viruses because they can propagate without human intervention, sending copies of themselves to other computers by e-mail, for example. In the last few years, the boundary between worms and viruses has become increasingly blurry, starting with Melissa (1999). Melissa was a worm/virus hybrid that could infect a system like a virus by modifying documents to include quotes from The Simpsons TV show. But it could also use the Address Book in Microsoft Outlook and Outlook Express to resend itself like a worm to other clients, who where then subsequently infected by an attached document (which might be a confidential document [2]).

Trojan Horse The Trojan horse is an application that hides a nasty surprise [2]. The Trojan horse is a program that a hacker secretly installs on a computer. The program harmful payload can allow the hacker to steal password, SSN, or spy on users recording keystrokes and transmitting them to a server operated by a third party. The data may then be sold to criminals who use this info to obtain credit cards.

Trojan Horse The Trojan horse is standalone application that appears to perform some helpful or neutral purpose, but is actually performing a malicious act while the user watches the program appear to do something else [1], [2]. Trojan horse doesn’t replicate itself, and doesn’t attach itself to other files.

Logic Bomb Type of Trojan horse, which executes under specific conditions. A logic bomb can execute based on a date and time, or when you shut down your machine for the 33rd time [1] or based on typing a specific series of keystrokes. Any event works.

References [1] Information Security Illuminated, Michael G. Solomon, Mike Chapple, Jones and Bartlett Publishers, Inc. [2] Mastering Network Security, Chris Brenron, Cameron Hunt, Sybex Inc.