Download presentation
Presentation is loading. Please wait.
Published byMary Gardner Modified over 9 years ago
1
Computer Security The expression computer security often conjures up notions that are related to: reliability availability safety integrity confidentiality privacy.
2
Defining Computer Security
As applied to cybertechnology, security can be thought of in terms of various measures designed to protect against: (i) unauthorized access to computer systems (ii) alteration of data that resides in and is transmitted between computer systems (iii) disruption, vandalism, and sabotage of computers systems and networks.
3
Defining Computer Security (continued)
Garfinkel and Spafford (1996) suggest that a computer is secure "if you can depend on it and its software behaves as you expect." According to this definition, at least two conditions must be satisfied: (a) you can depend on your computer (i.e., it is reliable and available) (b) your computer system's software does what it is supposed to do.
4
Defining Computer Security (continued)
Kizza (1998) argues that computer security involves three elements: Confidentiality; Integrity; Availability. Confidentiality focuses on protecting against un- authorized disclosure of information to third parties. Integrity can be understood as preventing unauthorized modification of files. Availability means preventing unauthorized withholding of information from those who need it when they need it.
5
Computer Security and Computer Crime
Computer security issues often overlap with issues analyzed under the topic of computer crime. Virtually every violation of security involving cybertechnology is also criminal in nature. But not every instance of crime in cyberspace necessarily involves a breach or violation of security.
6
Computer Security Issues as Distinct from Computer Crime
Some computer-related crimes have no direct implications for computer security. An individual can use a personal computer to: Make unauthorized copies of software programs; Stalk a victim in cyberspace; Elicit sex with young children; Distribute child pornography; Engage in illegal gambling activities. None of these kinds of crimes are a direct result of insecure computer systems.
7
Security as Related to Privacy
Cyber-related issues involving privacy and security often overlap. Some important distinctions can be drawn. Privacy concerns often arise because on-line users are concerned about losing control over ways in which personal information about them can be accessed by organizations (especially by businesses and government agencies). Many of these organizations claim to have some legitimate need for that personal information in order to make important decisions.
8
Security as Related to Privacy (continued)
Cyber-related security concerns (unlike those of privacy) typically arise because of either: Fears that many individuals and organizations have that their data could be accessed by those who have no legitimate need for, or right to, such information. Worries that personal data or proprietary information, or both, could be retrieved and possibly altered by individuals and organizations who are not authorized to access that data.
9
Security as Related to Privacy (continued)
Privacy and security concerns can be thought of as two sides of a single coin, where each side complements and completes the other. Many people wish to control who has information about them, and how that information is accessed by others. Securing personal information stored in computer databases is an important element in helping individuals to achieve and maintain their privacy. The objectives of privacy would seem compatible with, and even complementary to, security.
10
Security as Related to Privacy (continued)
Sometimes the objectives of privacy and security seem to be at odds with each other. i.e., a tension exists between these two notions. When cyberethics issues are examined from the perspective of security, the goal of protecting personal autonomy is not given the same importance as it is when those issues are analyzed from the vantage-point of privacy.
11
Security as Related to Privacy (continued)
When examined from the perspective of security rather than privacy: (a) the protection of system resources and proprietary data are generally considered more critical; (b) those issues will receive a higher priority than protecting the privacy and anonymity of individual users of a computer system.
12
How Do Security Issues Raise Ethical Concerns?
To realize autonomy, individuals need to be able to have some control over how information about them is gathered and used. Computer security can help users realize this goal. Personal privacy also requires that certain kinds of information stored in electronic databases be kept confidential. Secure computers are needed to ensure this.
13
Two Distinct Aspects of Computer Security
The expression “computer security" is sometimes used ambiguously. In one sense, "computer security" refers to concerns related to a computer system's vulnerability to attacks involving system hardware and software resources from "malicious programs" (viruses and worms). This aspect of computer security can be referred to as system security.
14
Two Senses of “Security”
Another sense of "computer security" is concerned with vulnerability to unauthorized access of data. The data can be either: (a) resident in one or more disk drives or databases in a computer system; (b) transmitted between two or more computer systems. We call this “data security.”
15
Figure 6-1 Computer Security System Security Data Security
Resident Data Transmitted Data
16
System Security Examples of malicious programs that disrupted system security: Internet Worm (1988) ILOVEYOU Virus (2001) Code Red Worm (2002) Blaster virus (2004)
17
System Security (Continued)
Richard Power (2000) differentiates between a virus and a worm in the following way. A virus is a "program that can 'infect' other programs by modifying them to include a possibly evolved copy of itself." A worm is an "independent program that replicates from machine to machine across network connections often clogging networks and information systems as it spreads."
18
Data Security: Protecting Information Integrity
Spinello (2000) notes that information integrity requires that: …proprietary or sensitive information under one's custodial care is kept confidential and secure, that information being transmitted is not altered in form or content and cannot be read by unauthorized parties, and that all information being disseminated or otherwise made accessible through Web sites and on-line data repositories is as accessible and reliable as possible. [Italics Added]
19
Computer Security and Computer Hackers
Levy (1984) describes the “Hacker Ethic” as a system comprising the following beliefs: (i) Access to computers should be unlimited and total. (ii) All information should be free. (iii) Mistrust Authority - Promote Decentralization. (iv) Hackers should be judged by their hacking, not bogus criteria such as degrees, age, race, or position. (v) You can create art and beauty on a computer. (vi) Computers can change life for the better.
20
Hacking Activities Hacking activities in cyberspace embrace three principles: (1) Information should be free; (2) Hackers provide society with a useful and important service; (3) Activities in cyberspace are virtual in nature and thus do not harm real people in the real (physical) world.
21
“Information Wants to Be Free”
This view is regarded by critics as idealistic or romantic. According to Spafford (1992), it is also naïve. Spafford points out that if information were free, privacy would not be possible because we would not be able to control how infor- mation about them was collected and used. Also, it would not be possible to ensure integrity and accuracy of that information since information that was freely available.
22
Do Hackers Really Provide an Important Service?
Spafford (1992) provides counterexamples to this version of the hacker argument Spafford asks whether we would permit someone to start a fire in a crowded shopping mall in order to expose the fact that the mall's sprinkler system was not adequate. Would you be willing to thank a burglar who successfully broke into your house? e.g., would you thank a burglar who shows that your home security system was inadequate?
23
Does Hacking Causes Only Virtual Harm, Not Real Harm?
Some argue that break-ins and vandalism in cyberspace cause no real harm to persons because they are activities that occur only in the virtual realm. This argument commits a logical fallacy by confusing the connection between the real and the virtual regarding harm by reasoning: The virtual world in not the real (physical) world; so any harms that occur in the virtual world are not real harms. (James Moor calls this the Virtuality Fallacy.)
24
Can Computer Break-ins Ever Be Ethically Justified?
Spafford (1992) believes that in certain extreme cases, breaking into a com- puter could be the "right thing to do." e.g., breaking into a computer to get medical records to save one’s life. He also argues that computer break-ins always cause harm; and from this point, he infers that hacker break-ins are never ethically justifiable.
25
Cyberterrorism Denning (2000) defines cyberterrorism as the "convergence of cyberspace and terrorism." Cyberterrorism covers a range of politically motivated hacking operations intended to cause grave harm that can result in either loss of life or severe economic loss, or both. In some cases, it is difficult to separate acts of hacking and cybervandalism from cyberterrorism.
26
Cyberterrorism vs. Hacktivism
In February 2000, "denial-of-service" attacks prevented tens of thousands of persons from accessing e-commerce Web sites. These attacks resulted in severe economic loss for major corporations. Should these particular cyber-attacks be classified as instances of cyberterrorism? Or are they better understood as another form of malicious hacking by individuals with no particular political agenda or ideology?
27
Hacktivism Manion and Goodrum (2000) questioned whether some cyber-attacks might not be better understood as acts of hacktivism. They consider the growing outrage on the part of some hackers and political activists over an increasingly "commodified Internet.“ They also question whether this behavior suggests a new form of civil disobedience, which they describe as hacktivism.
28
Hacktivism (continued)
Hacktivism integrates the talent of traditional computer hackers with the interests and social consciousness of political activists. Manion and Godrum note that while hackers continue to be portrayed as vandals, terrorists, and saboteurs, hardly anyone has considered the possibility that at least some of these individuals might be "electronic political activists" or hacktivists.
29
Hacktivism vs. Cyberterrorism
Can a meaningful distinction be drawn between hacktivism and cyberterrorism? Denning (1999) attempts to draw some critical distinctions among three related notions: activism hacktivism Cyberterrorism.
30
Activism, Hacktivism, and Cyberterrorism
Activism includes the normal, non-disruptive use of the Internet to support a cause. e.g, an activist could use the Internet to discuss issues, form coalitions, and plan and coordinate activities. Activists could engage in a range of activities from browsing the Web to sending , posting material to a Web site, constructing a Web site dedicated to their political cause or causes, and so forth.
31
Activism, Hacktivism, and Cyberterrorism (continued)
Hacktivism is the convergence of activism and computer hacking, which uses hacking techniques against a target Internet site with intent to disrupt normal operations but without intending to cause serious damage. These disruptions could be caused by " bombs" and "low grade" viruses that cause only minimal disruption, and would not result in severe economic damage or loss of life.
32
Activism, Hacktivism, and Cyberterrorism (continued)
Cyberterorism consists of operations that are intended to cause great harm such as loss of life or severe economic damage, or both. e.g., a cyberterrorist might attempt to bring down the US stock market or take control of a trans- portation unit in order to cause trains to crash. Denning believes that conceptual distinctions can be used to differentiate various activities included under the headings of activism, hacktivism, and cyberterrorism.
33
Denning’s Analysis Denning admits that as we progress from activism to cyberterrorism the boundaries become "fuzzy." e.g., should an " bomb" sent by a hacker who is also a political activist be classified as a form of hacktivism or as an act of cyberterrorism? Many in law-enforcement argue that more effort should be devoted to finding ways to deter and catch these individuals rather than trying to understand their ideological beliefs, goals, and objectives.
34
Cybertechnology and Terrorist Organizations
Some members of al Quaeda have fairly sophisticated computer devices, despite the fact that some operate out of caves in Afghanistan. It is not clear that terrorists have used cyber-technology to enhance their acts of terrorism in ways that technology could have been. Why have terrorists not made more direct use of cyber-technology so far I carrying out specific acts of terror?
35
Cybertechnology and Terrorism (continued)
One explanation is that they have not yet gained the expertise with cybertechnology. This may change as the next generation of terrorists, who will likely be more skilled in the use of computers and cyber-technology, replace those currently in leadership roles. When terrorists targeted the the Twin Towers, many gave up their lives. Imagine if terrorists are someday be able to gain control of onboard computer systems on airplanes and override the airplane’s computerized controls.
36
Information Warfare Denning (1999) defines information warfare (or IW) as "operations that target or exploit information media in order to win some objective over an adversary." Certain aspects of cyberterrorism also seem to conform to Denning's definition of IW. Information warfare is a slightly broader concept than cyberterrorism; e.g., it need not involve loss of life or severe economic loss, even though such results can occur.
37
Information Warfare (continued)
IW, unlike conventional or physical warfare, tends to be more disruptive than destructive. The instruments of war in IW typically strike at a nation's infrastructure. The "weapons" used, which are deployable from cyberspace, consist of "logic bombs" and viruses. The disruption caused by viruses and worms can be more damaging, in certain respects, than physical damage caused to a nation by conventional weapons.
38
Table 6-1: Hacktivism, Cyberterrorism, and Information Warfare
The convergence of political activism and computer hacking techniques to engage in a new form of civil disobedience. Cyberterrorism The convergence of cyber-technology and terrorism for carrying acts of terror in (or via) cyberspace. Information Warfare Using information to deceive the enemy; and using conventional warfare tactics to take out an enemy's computer and information systems.
39
Security Countermeasures
Power (2000) defines a countermeasure as an action, device, procedure, technique or other measure that reduces the vulnerability of a threat to a computer system. We have come to rely increasingly on countermeasures. Many security analysts believe that countermeasures would not be as necessary as they currently are if better security features were built into computer systems.
40
Security Countermeasures (continued)
Spafford (2002) argues that successful security cannot be thought of as an "add-on" to computer systems. Security should be embedded in the systems themselves (not added on). Until that is accomplished, however, it is prudent to use existing tools and technologies to combat security threats involving computer systems.
41
Four Types of Security Counterreasures
Firewalls Anti-Virus Software Encryption Tools Anonymity Tools
42
Firewall Technology Power (2000) defines a firewall as a system or combination of systems that enforces a boundary between two or more networks. Firewalls help to secure systems not only from unauthorized access to information in databases, but also help prevent unwanted and unauthorized communication into or out of a privately owned network. A firewall is a "blockade" between an internal privately owned network and an external network, which is not assumed to be secure (Oplinger, 1997).
43
Anti-Virus Software Anti-virus software is designed to "inoculate" computer systems against viruses, worms, and other malicious or rogue programs. Anti-virus software, now considered a standard security countermeasure, has been installed on most networked computer systems, including desktop computers. Typically used in conjunction with firewall technology to protect individual computer systems as well as network domains in universities, and governmental and commercial organizations.
44
Encryption Tools Encryption is the technique used to convert the information in a message composed in ordinary text ("plain text"), into "ciphertext." The use of data encryption or cryptography techniques in communicating sensitive information is not new. Dates back as least as far as the Roman era, where Julius Caesar encrypted messages sent to his generals.
45
Encryption Tools (Continued)
The party receiving the encrypted message uses a "key" to decrypt the ciphertext back into plain text. So long as both parties have the appropriate key, they can decode a message back into its original form (i.e., plain text). One challenge in ensuring the integrity of encrypted communications has been to make sure that the key, which must remain private, can be successfully communicated.
46
Encryption Tools (Continued)
An encrypted communication will be only as secure and private as its key. In private-key encryption, both parties use the same encryption algorithm and the same private key. Public cryptography uses two keys: one public and the other private.
47
Encryption (Continued) – public Cryptography
If A wishes to communicate with B, A uses B's public key to encode the message. That message can then only be decoded with B's private key, which is secret. Similarly when B responds to A, B uses A's public key to encrypt the message. That message can be decrypted only by using A's private key. Although information about an individual's public key is accessible to others, that individual's ability to communicate encrypted information is not compromised.
48
Anonymity Tools Users want to secure the integrity and confi- dentiality of their electronic communications. They also wish to protect their identity while engaging in on-line activities. Anonymity tools such as the Anonymizer, and pseudonymity agents such as Lucent's Personalized Web Assistant, enable users to roam the Web either anonymously or pseudonymously.
49
Anonymity Tools (Continued)
Wallace (1999) describes a person as being anonymous when that person has no traits that can be coordinated in way that would make that person uniquely identifiable. An individual is anonymous in cyberspace when that person is able to navigate the Internet is a way that his or her personal identity is not revealed. e.g., the user cannot be identified beyond certain technical information such as the user's IP (Internet protocol) address, ISP, and so forth.
50
Security and a Code of Networks Ethics
Is a Code of Network Ethics Needed to Address Security Concerns in Cyberspace? Are currently available countermeasures sufficient to safeguard our contemporary infrastructure, which increasingly depends on secure and reliable networked computer systems? Some believe a code of ethics is needed to require to require computer companies to produce more secure computer systems than those that are currently being sold to consumers and to organizations.
51
Code of Network Ethics for Security (continued)
Steele (2000) argues that computer systems are not secure because the software on which they run is not reliable. Steele also believes that the software is not reliable because it is not properly tested and regulated. He notes that other products of comparable significance are required to be tested by regulating agencies.
52
Code of Network Ethics for Security (continued)
We seem willing to accept the fact that software products and systems are neither exhaustively tested nor regulated, and thus are not fully secure. Steele asks whether people would purchase automobiles if wheels on cars routinely fell off while motorists were driving in their cars.
53
Code of Network Ethics for Security (continued)
Would you would be willing to purchase an automobile that could not be locked (secured) and thus protected against theft? Steele points out that there are no adequate "locks" for computers. He blames Microsoft and other large computer corporations for not ensuring and guaranteeing that the computer software products are more secure.
54
Code of Network Ethics for Security (Continued)
Steele also believes that corporations that produce computer software should assume full responsibility, legal and moral, for any insecure software products they sell. He concludes that we need a "Code of Network Ethics" with a "due diligence" clause, which would spell out specific requirements for businesses engaged in the production of software.
55
Criticism of Steele’s Argument for a Network Code of Ethics
We can agree with Steele's assumptions that consumers desire reliable products and that they expect dependable computer systems. We can also question whether the analogy that Steele draws between computer systems and automobiles is a useful one, or whether it breaks down in certain crucial respects. It is not yet possible to test computer systems for reliability in the same way that we can test automobile systems.
56
Total Security in Cyberspace
Can total security in cyberspace be achieved? If so, would it be a desirable goal? When asked if we would prefer a secure cyberspace, we would likely answer "yes." But we might not be willing to accept the consequences of such a level of security. e.g., more secure systems might require certain additional features in cyber-technology that would result in computer systems being less friendly and thus more difficult for ordinary users to operate.
57
Tradeoffs Involving Computer Security
More secure computer systems might also result in products that are more expensive. Would consumers be willing to spend more money for securer computer systems? The costs associated with computer security can be measured both in monetary and non-monetary terms (such as convenience and flexibility) because more secure systems might also be less user-friendly.
58
Accepting Some Insecurity
There are certain levels of insecurity that most of us seem willing to accept. Most of us drive automobiles, despite the fact that these vehicles are vulnerable to collisions and breakdowns that result in the deaths of thousands of motorists and pedestrians each year. We could invest billions of dollars into programs designed to make cars safer. But how much are we willing (or able) to spend for safer cars? Would consumers be willing to spend $90,000 on average for a car? Could they afford to do so?
59
Viewing Security as a Process Rather Than as a Product
Scheier (2000) claims that anyone who promises a totally secure or "hacker proof" system is selling "snake oil.“ Many security experts assume we simply need to find the right technology or the foolproof encryption device or the right security countermeasures.
60
Security as a Process (continued)
For Schneier, security is a process, not a product. Schneier believes that an important element in that process is risk assessment. Seeking perfect security would make a system useless, because "anything worth doing requires some risk."
61
Computer Security and Risk Analysis
Risk analysis is a methodology used to come to an informed decision about the most cost-effective controls to limit the risks to your assets vis-à-vis the spectrum of threats. Banks and credit card companies can tolerate a considerable amount of credit risk and fraud because they know how to anticipate loses and price their services accordingly. What is the acceptable level of risk in computer systems? How can we assess it?
62
Risk Analysis (Continued)
Schneier believes that risk can be understood and assessed in terms of the net result of the impacts of five elements: Assets; Threats; Vulnerabilities; Impact; safeguards.
63
Risk Analysis (Continued)
Consider how these five elements could be applied in a process for determining how to secure an automobile you purchased. Imagine that you wish to install a security device in to protect a 1990 Toyota against theft or vandalism. Suppose that you live in an urban area where there is a high degree of crime involving automobile theft. Even though a 1990 Toyota would have a low blue-book value (say, for example, $800), vehicles of that type might be useful to certain car thieves for the automotive parts that could be sold once the stolen vehicles have been "stripped."
64
Risk Analysis (Continued)
You decide that you need to take the appropriate measures to make your car secure. Suppose that purchasing a security system for your car would cost approximately $1100. Is your asset (the 1990 Toyota) worth the price required to secure it? According to the risk assessment model, it would be advisable to find some alternative means to secure your car.
65
Risk Analysis (Continued)
Should the results of a decision procedure based on conventional risk analysis be used to determine security policies involving our national infrastructure? This can have implications for the safety and well being of millions of people? If the private sector is not willing to pay for enhanced security, does the federal government have an obligation to do so?
66
Risk Assessment (Continued)
Many of the ethical issues surrounding computer security are not trivial. They have implications for public safety that can result in the deaths of significant numbers of persons. So it is not clear that all computer security issues can be understood simply in terms of the risk analysis model advocated by Schneier.
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.