0% found this document useful (0 votes)
122 views

Security and Ethics

Computer Security Risks are events or actions that could cause a loss of or damage to computer hardware, software, data, information, or processing capability. Cybercrime is an online or Internet-based illegal act Hackers Crackers Script Kiddies Corporate Spies Unethical employees. Discover computers 2011: Living in a digital world, page 555.
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
122 views

Security and Ethics

Computer Security Risks are events or actions that could cause a loss of or damage to computer hardware, software, data, information, or processing capability. Cybercrime is an online or Internet-based illegal act Hackers Crackers Script Kiddies Corporate Spies Unethical employees. Discover computers 2011: Living in a digital world, page 555.
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 56

Discovering Computers 2011

Living in a Digital World

ObjectivesOverview
Definetheterm, computersecurity i risks, ik andbrieflydescribethe typesofcybercrime perpetrators Describevarioustypes of fInternet I and dnetwork k attacks,andidentify waystosafeguard againsttheseattacks Explaintheways softwaremanufacturers p g protectagainst softwarepiracy

Discusstechniquesto preventunauthorized computeraccessand use

Identifysafeguards againsthardwaretheft andvandalism

Discusshowencryption works,andexplainwhy itisnecessary

SeePage555 forDetailedObjectives

DiscoveringComputers2011:LivinginaDigitalWorld Chapter11

ObjectivesOverview

Discussthetypesof devicesavailablethat protectcomputersfrom systemfailure

Explaintheoptions availableforbackingup computerresources

Identifyrisksand safeguardsassociated withwireless communications

Discusswaystoprevent healthrelateddisorders j dueto andinjuries computeruse

Recogni eissuesrelated Recognize toinformationaccuracy, intellectualproperty rights codesofconduct, rights, conduct andgreencomputing

Discussissues surroundinginformation privacy

SeePage555 forDetailedObjectives

DiscoveringComputers2011:LivinginaDigitalWorld Chapter11

ComputerSecurityRisks
Acomputersecurityrisk isanyeventoractionthatcould causealossofordamagetocomputerhardware, software,data,information,orprocessingcapability Acybercrime isanonlineorInternetbasedillegalact
Hackers Crackers ScriptKiddies CorporateSpies

Unethical Employees
Pages556 557

Cyberextortionists

Cyberterrorists

DiscoveringComputers2011:LivinginaDigitalWorld Chapter11

ComputerSecurityRisks

Pages556 557 Figure111

DiscoveringComputers2011:LivinginaDigitalWorld Chapter11

InternetandNetworkAttacks
Informationtransmittedovernetworkshasahigher degreeofsecurityriskthaninformationkeptonan organizationspremises Anonlinesecurityservice isaWebsitethatevaluates yourcomputertocheckforInternetandemail vulnerabilities

Click to view Web Link, click Chapter 11, Click Web Link from left navigation, then click Computer Emergency Response Team Coordination Center below Chapter 11

Page558 Figure112

DiscoveringComputers2011:LivinginaDigitalWorld Chapter11

InternetandNetworkAttacks
Computer Virus Affectsa computer negatively ti l by b alteringthe waythe computer works Worm Copiesitself repeatedly, using i up resources andpossibly shutting downthe p or computer network TrojanHorse Amalicious programthat hid within hides ithi orlookslike alegitimate program Rootkit Programthat hidesina computer t andallows someone froma remote locationto takefull control
7

Page558

DiscoveringComputers2011:LivinginaDigitalWorld Chapter11

Video:AttackoftheMobileViruses

CLICKTOSTART
DiscoveringComputers2011:LivinginaDigitalWorld Chapter11 8

InternetandNetworkAttacks
Aninfectedcomputerhasoneormoreofthe gsymptoms: y p following
Operatingsystem runsmuchslower thanusual Availablememory islessthan expected Filesbecome corrupted Screendisplays unusualmessage orimage Unknown programsorfiles mysteriously appear

M i orunusual l Music soundplays randomly

Existingprograms andfilesdisappear

P Programs orfil files donotwork properly

Systemproperties change
Pages558 559

Operatingsystem doesnotstartup

Operatingsystem shutsdown unexpectedly


9

DiscoveringComputers2011:LivinginaDigitalWorld Chapter11

InternetandNetworkAttacks

Page559 Figure113

DiscoveringComputers2011:LivinginaDigitalWorld Chapter11

10

InternetandNetworkAttacks

Page561 Figure116

DiscoveringComputers2011:LivinginaDigitalWorld Chapter11

11

InternetandNetworkAttacks
Userscantakeseveral precautionstoprotect theirhomeandwork computersandmobile devicesfromthese maliciousinfections

Page560 561 Figure117

DiscoveringComputers2011:LivinginaDigitalWorld Chapter11

12

InternetandNetworkAttacks
Abotnet isagroupofcompromisedcomputersconnectedtoa network
Acompromisedcomputerisknownasazombie

Adenialofserviceattack(DoS attack)disruptscomputeraccessto Internetservices


DistributedDoS (DDoS)

Abackdoor isap program g orsetofinstructionsinap program g that allowuserstobypasssecuritycontrols Spoofing isatechniqueintrudersusetomaketheirnetworkor Internettransmissionappearlegitimate
Click to view Web Link, click Chapter 11, Click Web Link from left navigation, then click DoS Attacks below Chapter 11

Pages562 563

DiscoveringComputers2011:LivinginaDigitalWorld Chapter11

13

InternetandNetworkAttacks
Afirewall ishardwareand/orsoftwarethat protectsanetworksresourcesfromintrusion p

Click to view Web Link, click Chapter 11, Click Web Link from left navigation, then click Firewalls below Chapter 11

Pages563 564 Figure118

DiscoveringComputers2011:LivinginaDigitalWorld Chapter11

14

InternetandNetworkAttacks
Intrusiondetectionsoftware
Analyzes A l all llnetwork t ktraffic t ffi Assessessystemvulnerabilities Identifies d ifi anyunauthorized h i di intrusions i Notifiesnetworkadministratorsofsuspiciousbehavior tt t b h patterns orsystem breaches

Honeypot yp
Vulnerablecomputerthatissetuptoenticeanintruderto breakintoit
Page564 DiscoveringComputers2011:LivinginaDigitalWorld Chapter11 15

UnauthorizedAccessandUse

Unauthorizedaccess is theuseofacomputeror networkwithout permission

Unauthorizeduse isthe useofacomputerorits dataforunapprovedor possiblyillegalactivities

Page564

DiscoveringComputers2011:LivinginaDigitalWorld Chapter11

16

UnauthorizedAccessandUse
O Organizations i i take k severalmeasuresto helpprevent unauthorizedaccess anduse
Acceptableusepolicy Disablefileandprinter sharing Firewalls Intrusiondetection software
Page565 Figure1110 DiscoveringComputers2011:LivinginaDigitalWorld Chapter11 17

UnauthorizedAccessandUse
Accesscontrolsdefinewhocanaccessa p whenthey ycanaccessit,andwhat computer, actionstheycantake
Twophaseprocessescalledidentificationand authentication User U name Password Passphrase CAPTCHA
Pages565 567 Figure1111 DiscoveringComputers2011:LivinginaDigitalWorld Chapter11 18

UnauthorizedAccessandUse
Apossessedobjectisany itemthatyoumustcarryto gainaccesstoacomputer orcomputerfacility
Oftenareusedin combinationwithapersonal identificationnumber (PIN)

Abiometricdevice authenticatesapersons identitybytranslatinga personalcharacteristicinto g codethatis adigital comparedwithadigital codeinacomputer

Click to view Web Link, click Chapter 11, Click Web Link from left navigation, then click Biometric Devices below Chapter 11

Page568 Figure1114

DiscoveringComputers2011:LivinginaDigitalWorld Chapter11

19

UnauthorizedAccessandUse
Digitalforensics isthediscovery,collection,and y ofevidencefoundoncomputers p and analysis networks Manyareasusedigitalforensics
Law enforcement Criminal prosecutors Military y intelligence

Insurance g agencies
Page569

Information security d departments t t


20

DiscoveringComputers2011:LivinginaDigitalWorld Chapter11

HardwareTheftandVandalism

Hardwaretheft isthe actofstealing t equipment i t computer

Hardwarevandalism istheactofdefacing ordestroying computerequipment

Page570

DiscoveringComputers2011:LivinginaDigitalWorld Chapter11

21

HardwareTheftandVandalism
Tohelpreducetheofchancesoftheft,companies yofsecurity ymeasures andschoolsuseavariety
Physicalaccesscontrols Alarmsystems Cablestolock equipment

Realtimelocation system

Passwords,possessed objects,andbiometrics

Click to view Web Link, click Chapter 11, Click Web Link from left navigation, then click RTLS below Chapter 11

Page570 Figure1115

DiscoveringComputers2011:LivinginaDigitalWorld Chapter11

22

SoftwareTheft
Softwaretheft occurswhensomeone:

Stealssoftware media

Intentionally y erasesprograms

Illegallycopiesa program
Page571

Illegally Ill ll registersand/or activatesa program


23

DiscoveringComputers2011:LivinginaDigitalWorld Chapter11

SoftwareTheft
Asingleuserlicenseagreement typicallycontainsthe followingconditions:
Permittedto
Installthesoftwareononecomputer Makeonecopyofthesoftware Removethesoftwarefromyourcomputerbeforegivingitawayorsellingit

Notpermittedto
Installthesoftwareonanetwork Givecopiestofriendsorcolleagueswhilecontinuingtousethesoftware Exportthesoftware R orl Rent leasethe h software f
DiscoveringComputers2011:LivinginaDigitalWorld Chapter11 24

Page571

SoftwareTheft
Copying,loaning, borrowing,renting,or distributingsoftware canbeaviolationof copyrightlaw Somesoftwarerequires productactivation to functionfully
Click to view Web Link, click Chapter 11, Click Web Link from left navigation, then click Business Software Alliance below Chapter 11

Pages571 572 Figure1116

DiscoveringComputers2011:LivinginaDigitalWorld Chapter11

25

InformationTheft
Informationtheftoccurswhensomeonesteals personalorconfidentialinformation p Encryption isaprocessofconvertingreadable dataintounreadablecharacterstoprevent unauthorizedaccess

Pages572 573 Figure1117

DiscoveringComputers2011:LivinginaDigitalWorld Chapter11

26

InformationTheft

Page573 Figure1118

DiscoveringComputers2011:LivinginaDigitalWorld Chapter11

27

InformationTheft
Adigitalsignature isanencryptedcodethata person,Website,ororganization p g attachestoan electronicmessagetoverifytheidentityofthe sender
Oftenusedtoensurethatanimpostorisnot participatinginanInternettransaction

WebbrowsersandWebsitesuseencryption techniques
Page574 DiscoveringComputers2011:LivinginaDigitalWorld Chapter11 28

InformationTheft
Popularsecuritytechniquesinclude Digital Certificates TransportLayer Security(TLS)

SecureHTTP
Click to view Web Link, click Chapter 11, Click Web Link from left navigation, then click Digital Certificates below Chapter 11

VPN

Pages574 575

DiscoveringComputers2011:LivinginaDigitalWorld Chapter11

29

InformationTheft

Pages574 575 Figures1119 1120

DiscoveringComputers2011:LivinginaDigitalWorld Chapter11

30

SystemFailure
Asystemfailureistheprolongedmalfunctionofa p computer Avarietyoffactorscanleadtosystemfailure, including:
Aginghardware Naturaldisasters Electricalp powerp problems
Noise,undervoltages,andovervoltages

Errorsincomputerprograms
Page575 DiscoveringComputers2011:LivinginaDigitalWorld Chapter11 31

SystemFailure
Twowaystoprotectfromsystemfailurescaused yelectricalpower p variationsincludesurge g by protectors anduninterruptablepowersupplies (UPS)

Click to view Web Link, click Chapter 11, Click Web Link from left navigation, then click Surge Protectors below Chapter 11

Page576 Figures1121 1122

DiscoveringComputers2011:LivinginaDigitalWorld Chapter11

32

BackingUp TheUltimateSafeguard
Abackup isaduplicateofafile,program,ordisk g islost,damaged, g thatcanbeusediftheoriginal ordestroyed
Tobackup afilemeanstomakeacopyofit

Offsitebackupsarestoredinalocationseparate fromthecomputersite
Cloud Storage
Page577 DiscoveringComputers2011:LivinginaDigitalWorld Chapter11 33

BackingUp TheUltimateSafeguard
Twocategoriesof backups:
Fullbackup Selectivebackup

Threegeneration backuppolicy
Grandparent

Parent

Child

Page577

DiscoveringComputers2011:LivinginaDigitalWorld Chapter11

34

WirelessSecurity
Wirelessaccessposesadditionalsecurityrisks
About80percentofwirelessnetworkshavenosecurity protection

Wardrivingallowsindividualstodetectwireless networkswhiledrivingavehiclethroughthearea

Click to view Web Link, click Chapter 11, Click Web Link from left navigation, then click War Driving below Chapter 11

Page578 Figure1123

DiscoveringComputers2011:LivinginaDigitalWorld Chapter11

35

WirelessSecurity
Inadditionaltousingfirewalls,somesafeguards p security yofwirelessnetworks: improve
Awirelessaccess pointshouldnot broadcastanSSID ConfigureaWAP sothatonly certaindevicescan accessit
Page578

Changethedefault SSID

UseWPAorWPA2 securitystandards
36

DiscoveringComputers2011:LivinginaDigitalWorld Chapter11

HealthConcernsofComputerUse
Thewidespreaduseof computershasledto healthconcerns
Repetitivestraininjury (RSI)
Tendonitis Carpaltunnelsyndrome (CTS)

Computer p vision syndrome (CVS)

Page579 Figure1124

DiscoveringComputers2011:LivinginaDigitalWorld Chapter11

37

HealthConcernsofComputerUse

Page580 Figure1125

DiscoveringComputers2011:LivinginaDigitalWorld Chapter11

38

HealthConcernsofComputerUse
Ergonomicsisan appliedsciencedevoted toincorporating comfort,efficiency,and safetyintothedesignof itemsintheworkplace

Page580 Figure1126

DiscoveringComputers2011:LivinginaDigitalWorld Chapter11

39

HealthConcernsofComputerUse
Computeraddiction occurswhenthecomputer consumessomeonesentiresociallife Symptomsofusersinclude:
Craves computer ti time Irritable I it bl when h notatthe computer
Page581

Overjoy when atthe computer t Neglects N l t familyand friends

Unabletostop computer activity ti it Problems P bl at t workor school


40

DiscoveringComputers2011:LivinginaDigitalWorld Chapter11

EthicsandSociety
Computerethics are themoralguidelines thatgoverntheuseof computersand informationsystems Informationaccuracyis aconcern
Notallinformationon theWebiscorrect

Pages581 582 Figure1128

DiscoveringComputers2011:LivinginaDigitalWorld Chapter11

41

EthicsandSociety
Intellectualpropertyrightsaretherightstowhichcreators areentitledfortheirwork
Acopyright py g p protectsany ytangible g formofexpression p

AnITcodeofconduct isawrittenguidelinethathelps determinewhetheraspecificcomputeractionisethicalor unethical


Click to view Web Link, click Chapter 11, Click Web Link from left navigation, then click Digital Rights Management below Chapter 11

Page582

DiscoveringComputers2011:LivinginaDigitalWorld Chapter11

42

EthicsandSociety

Page583 Figure1129

DiscoveringComputers2011:LivinginaDigitalWorld Chapter11

43

EthicsandSociety
Greencomputing involvesreducingtheelectricity gacomputer p andenvironmentalwastewhileusing

Pages583 584 Figure1130

DiscoveringComputers2011:LivinginaDigitalWorld Chapter11

44

EthicsandSociety
Informationprivacyreferstotherightof p todeny yorrestrictthe individualsandcompanies collectionanduseofinformationaboutthem Hugedatabasesstoredataonline Itisimportanttosafeguardyourinformation

Page584

DiscoveringComputers2011:LivinginaDigitalWorld Chapter11

45

EthicsandSociety

Page584 Figure1131

DiscoveringComputers2011:LivinginaDigitalWorld Chapter11

46

EthicsandSociety
Whenyoufillouta form,themerchantthat receivestheform usuallyentersitintoa database Manycompaniestoday allowpeopletospecify whethertheywant theirpersonal informationdistributed
Page585 Figure1132 DiscoveringComputers2011:LivinginaDigitalWorld Chapter11 47

EthicsandSociety
Acookie isasmalltextfilethataWebserverstoreson yourcomputer Websitesusecookiesforavarietyofreasons:
Allowfor personalization Storeusers passwords Assistwith h online shopping

Click to view Web Link, click Chapter 11, Click Web Link from left navigation, then click Cookies below Chapter 11

Trackhow oftenusers visitasite

Target advertisements
48

Pages585 586

DiscoveringComputers2011:LivinginaDigitalWorld Chapter11

EthicsandSociety

Page586 Figure1133

DiscoveringComputers2011:LivinginaDigitalWorld Chapter11

49

EthicsandSociety
S Spam is i anunsolicited li i d emailmessageor newsgroupposting Emailfiltering blocks emailmessagesfrom designatedsources Antispamprograms attempttoremove spambeforeitreaches yourinbox
Page587 Figure1134 DiscoveringComputers2011:LivinginaDigitalWorld Chapter11 50

EthicsandSociety
Phi Phishing hi is i ascami in whichaperpetratorsends anofficiallookingemail messagethatattemptsto obtainyourpersonaland financialinformation Pharming isascam where h aperpetrator attemptstoobtainyour personalandfinancial informationviaspoofing
Pages587 588 Figure1135

DiscoveringComputers2011:LivinginaDigitalWorld Chapter11

51

EthicsandSociety
Theconcernaboutprivacyhasledtothe g gthe enactmentoffederalandstatelawsregarding storageanddisclosureofpersonaldata
SeeFigure1136onpage589foralistingofmajorU U.S. S governmentlawsconcerningprivacy

Th The1970 Fair F i Credit C di Reporting R i Act A limits li i the h rightsofothersviewingacreditreporttoonly thosewithalegitimatebusinessneed


Page588 DiscoveringComputers2011:LivinginaDigitalWorld Chapter11 52

EthicsandSociety
Socialengineering isdefinedasgaining unauthorizedaccessorobtainingconfidential informationbytakingadvantageoftrustandnaivety Employeemonitoring involvestheuseofcomputers toobserve observe,record record,andreviewanemployees employee suseof acomputer
Click to view Web Link, click Chapter 11, Click Web Link from left navigation, then click Social Engineering below Chapter 11

Page590

DiscoveringComputers2011:LivinginaDigitalWorld Chapter11

53

EthicsandSociety
C Contentfil filtering i is i the h processofrestricting accesstocertainmaterial ontheWeb Many ybusinessesuse contentfiltering InternetContentRating Association(ICRA) Webfilteringsoftware restrictsaccessto specifiedWebsites
Pages590 591 Figure1137 DiscoveringComputers2011:LivinginaDigitalWorld Chapter11 54

Summary

Potentialcomputerrisksand thesafeguards

Wirelesssecurityrisksand safeguards

Computer p relatedhealth issuesandpreventions

Ethi li di Ethical issuessurrounding informationaccuracy, intellectualp property p yrights, g codesofconduct,green computing,andinformation privacy
55

Page591

DiscoveringComputers2011:LivinginaDigitalWorld Chapter11

Discovering Computers 2011


Living in a Digital World

Chapter11Complete

You might also like