Security and Ethics
Security and Ethics
ObjectivesOverview
Definetheterm, computersecurity i risks, ik andbrieflydescribethe typesofcybercrime perpetrators Describevarioustypes of fInternet I and dnetwork k attacks,andidentify waystosafeguard againsttheseattacks Explaintheways softwaremanufacturers p g protectagainst softwarepiracy
SeePage555 forDetailedObjectives
DiscoveringComputers2011:LivinginaDigitalWorld Chapter11
ObjectivesOverview
Recogni eissuesrelated Recognize toinformationaccuracy, intellectualproperty rights codesofconduct, rights, conduct andgreencomputing
SeePage555 forDetailedObjectives
DiscoveringComputers2011:LivinginaDigitalWorld Chapter11
ComputerSecurityRisks
Acomputersecurityrisk isanyeventoractionthatcould causealossofordamagetocomputerhardware, software,data,information,orprocessingcapability Acybercrime isanonlineorInternetbasedillegalact
Hackers Crackers ScriptKiddies CorporateSpies
Unethical Employees
Pages556 557
Cyberextortionists
Cyberterrorists
DiscoveringComputers2011:LivinginaDigitalWorld Chapter11
ComputerSecurityRisks
DiscoveringComputers2011:LivinginaDigitalWorld Chapter11
InternetandNetworkAttacks
Informationtransmittedovernetworkshasahigher degreeofsecurityriskthaninformationkeptonan organizationspremises Anonlinesecurityservice isaWebsitethatevaluates yourcomputertocheckforInternetandemail vulnerabilities
Click to view Web Link, click Chapter 11, Click Web Link from left navigation, then click Computer Emergency Response Team Coordination Center below Chapter 11
Page558 Figure112
DiscoveringComputers2011:LivinginaDigitalWorld Chapter11
InternetandNetworkAttacks
Computer Virus Affectsa computer negatively ti l by b alteringthe waythe computer works Worm Copiesitself repeatedly, using i up resources andpossibly shutting downthe p or computer network TrojanHorse Amalicious programthat hid within hides ithi orlookslike alegitimate program Rootkit Programthat hidesina computer t andallows someone froma remote locationto takefull control
7
Page558
DiscoveringComputers2011:LivinginaDigitalWorld Chapter11
Video:AttackoftheMobileViruses
CLICKTOSTART
DiscoveringComputers2011:LivinginaDigitalWorld Chapter11 8
InternetandNetworkAttacks
Aninfectedcomputerhasoneormoreofthe gsymptoms: y p following
Operatingsystem runsmuchslower thanusual Availablememory islessthan expected Filesbecome corrupted Screendisplays unusualmessage orimage Unknown programsorfiles mysteriously appear
Existingprograms andfilesdisappear
Systemproperties change
Pages558 559
Operatingsystem doesnotstartup
DiscoveringComputers2011:LivinginaDigitalWorld Chapter11
InternetandNetworkAttacks
Page559 Figure113
DiscoveringComputers2011:LivinginaDigitalWorld Chapter11
10
InternetandNetworkAttacks
Page561 Figure116
DiscoveringComputers2011:LivinginaDigitalWorld Chapter11
11
InternetandNetworkAttacks
Userscantakeseveral precautionstoprotect theirhomeandwork computersandmobile devicesfromthese maliciousinfections
DiscoveringComputers2011:LivinginaDigitalWorld Chapter11
12
InternetandNetworkAttacks
Abotnet isagroupofcompromisedcomputersconnectedtoa network
Acompromisedcomputerisknownasazombie
Abackdoor isap program g orsetofinstructionsinap program g that allowuserstobypasssecuritycontrols Spoofing isatechniqueintrudersusetomaketheirnetworkor Internettransmissionappearlegitimate
Click to view Web Link, click Chapter 11, Click Web Link from left navigation, then click DoS Attacks below Chapter 11
Pages562 563
DiscoveringComputers2011:LivinginaDigitalWorld Chapter11
13
InternetandNetworkAttacks
Afirewall ishardwareand/orsoftwarethat protectsanetworksresourcesfromintrusion p
Click to view Web Link, click Chapter 11, Click Web Link from left navigation, then click Firewalls below Chapter 11
DiscoveringComputers2011:LivinginaDigitalWorld Chapter11
14
InternetandNetworkAttacks
Intrusiondetectionsoftware
Analyzes A l all llnetwork t ktraffic t ffi Assessessystemvulnerabilities Identifies d ifi anyunauthorized h i di intrusions i Notifiesnetworkadministratorsofsuspiciousbehavior tt t b h patterns orsystem breaches
Honeypot yp
Vulnerablecomputerthatissetuptoenticeanintruderto breakintoit
Page564 DiscoveringComputers2011:LivinginaDigitalWorld Chapter11 15
UnauthorizedAccessandUse
Page564
DiscoveringComputers2011:LivinginaDigitalWorld Chapter11
16
UnauthorizedAccessandUse
O Organizations i i take k severalmeasuresto helpprevent unauthorizedaccess anduse
Acceptableusepolicy Disablefileandprinter sharing Firewalls Intrusiondetection software
Page565 Figure1110 DiscoveringComputers2011:LivinginaDigitalWorld Chapter11 17
UnauthorizedAccessandUse
Accesscontrolsdefinewhocanaccessa p whenthey ycanaccessit,andwhat computer, actionstheycantake
Twophaseprocessescalledidentificationand authentication User U name Password Passphrase CAPTCHA
Pages565 567 Figure1111 DiscoveringComputers2011:LivinginaDigitalWorld Chapter11 18
UnauthorizedAccessandUse
Apossessedobjectisany itemthatyoumustcarryto gainaccesstoacomputer orcomputerfacility
Oftenareusedin combinationwithapersonal identificationnumber (PIN)
Click to view Web Link, click Chapter 11, Click Web Link from left navigation, then click Biometric Devices below Chapter 11
Page568 Figure1114
DiscoveringComputers2011:LivinginaDigitalWorld Chapter11
19
UnauthorizedAccessandUse
Digitalforensics isthediscovery,collection,and y ofevidencefoundoncomputers p and analysis networks Manyareasusedigitalforensics
Law enforcement Criminal prosecutors Military y intelligence
Insurance g agencies
Page569
DiscoveringComputers2011:LivinginaDigitalWorld Chapter11
HardwareTheftandVandalism
Page570
DiscoveringComputers2011:LivinginaDigitalWorld Chapter11
21
HardwareTheftandVandalism
Tohelpreducetheofchancesoftheft,companies yofsecurity ymeasures andschoolsuseavariety
Physicalaccesscontrols Alarmsystems Cablestolock equipment
Realtimelocation system
Passwords,possessed objects,andbiometrics
Click to view Web Link, click Chapter 11, Click Web Link from left navigation, then click RTLS below Chapter 11
Page570 Figure1115
DiscoveringComputers2011:LivinginaDigitalWorld Chapter11
22
SoftwareTheft
Softwaretheft occurswhensomeone:
Stealssoftware media
Intentionally y erasesprograms
Illegallycopiesa program
Page571
DiscoveringComputers2011:LivinginaDigitalWorld Chapter11
SoftwareTheft
Asingleuserlicenseagreement typicallycontainsthe followingconditions:
Permittedto
Installthesoftwareononecomputer Makeonecopyofthesoftware Removethesoftwarefromyourcomputerbeforegivingitawayorsellingit
Notpermittedto
Installthesoftwareonanetwork Givecopiestofriendsorcolleagueswhilecontinuingtousethesoftware Exportthesoftware R orl Rent leasethe h software f
DiscoveringComputers2011:LivinginaDigitalWorld Chapter11 24
Page571
SoftwareTheft
Copying,loaning, borrowing,renting,or distributingsoftware canbeaviolationof copyrightlaw Somesoftwarerequires productactivation to functionfully
Click to view Web Link, click Chapter 11, Click Web Link from left navigation, then click Business Software Alliance below Chapter 11
DiscoveringComputers2011:LivinginaDigitalWorld Chapter11
25
InformationTheft
Informationtheftoccurswhensomeonesteals personalorconfidentialinformation p Encryption isaprocessofconvertingreadable dataintounreadablecharacterstoprevent unauthorizedaccess
DiscoveringComputers2011:LivinginaDigitalWorld Chapter11
26
InformationTheft
Page573 Figure1118
DiscoveringComputers2011:LivinginaDigitalWorld Chapter11
27
InformationTheft
Adigitalsignature isanencryptedcodethata person,Website,ororganization p g attachestoan electronicmessagetoverifytheidentityofthe sender
Oftenusedtoensurethatanimpostorisnot participatinginanInternettransaction
WebbrowsersandWebsitesuseencryption techniques
Page574 DiscoveringComputers2011:LivinginaDigitalWorld Chapter11 28
InformationTheft
Popularsecuritytechniquesinclude Digital Certificates TransportLayer Security(TLS)
SecureHTTP
Click to view Web Link, click Chapter 11, Click Web Link from left navigation, then click Digital Certificates below Chapter 11
VPN
Pages574 575
DiscoveringComputers2011:LivinginaDigitalWorld Chapter11
29
InformationTheft
DiscoveringComputers2011:LivinginaDigitalWorld Chapter11
30
SystemFailure
Asystemfailureistheprolongedmalfunctionofa p computer Avarietyoffactorscanleadtosystemfailure, including:
Aginghardware Naturaldisasters Electricalp powerp problems
Noise,undervoltages,andovervoltages
Errorsincomputerprograms
Page575 DiscoveringComputers2011:LivinginaDigitalWorld Chapter11 31
SystemFailure
Twowaystoprotectfromsystemfailurescaused yelectricalpower p variationsincludesurge g by protectors anduninterruptablepowersupplies (UPS)
Click to view Web Link, click Chapter 11, Click Web Link from left navigation, then click Surge Protectors below Chapter 11
DiscoveringComputers2011:LivinginaDigitalWorld Chapter11
32
BackingUp TheUltimateSafeguard
Abackup isaduplicateofafile,program,ordisk g islost,damaged, g thatcanbeusediftheoriginal ordestroyed
Tobackup afilemeanstomakeacopyofit
Offsitebackupsarestoredinalocationseparate fromthecomputersite
Cloud Storage
Page577 DiscoveringComputers2011:LivinginaDigitalWorld Chapter11 33
BackingUp TheUltimateSafeguard
Twocategoriesof backups:
Fullbackup Selectivebackup
Threegeneration backuppolicy
Grandparent
Parent
Child
Page577
DiscoveringComputers2011:LivinginaDigitalWorld Chapter11
34
WirelessSecurity
Wirelessaccessposesadditionalsecurityrisks
About80percentofwirelessnetworkshavenosecurity protection
Wardrivingallowsindividualstodetectwireless networkswhiledrivingavehiclethroughthearea
Click to view Web Link, click Chapter 11, Click Web Link from left navigation, then click War Driving below Chapter 11
Page578 Figure1123
DiscoveringComputers2011:LivinginaDigitalWorld Chapter11
35
WirelessSecurity
Inadditionaltousingfirewalls,somesafeguards p security yofwirelessnetworks: improve
Awirelessaccess pointshouldnot broadcastanSSID ConfigureaWAP sothatonly certaindevicescan accessit
Page578
Changethedefault SSID
UseWPAorWPA2 securitystandards
36
DiscoveringComputers2011:LivinginaDigitalWorld Chapter11
HealthConcernsofComputerUse
Thewidespreaduseof computershasledto healthconcerns
Repetitivestraininjury (RSI)
Tendonitis Carpaltunnelsyndrome (CTS)
Page579 Figure1124
DiscoveringComputers2011:LivinginaDigitalWorld Chapter11
37
HealthConcernsofComputerUse
Page580 Figure1125
DiscoveringComputers2011:LivinginaDigitalWorld Chapter11
38
HealthConcernsofComputerUse
Ergonomicsisan appliedsciencedevoted toincorporating comfort,efficiency,and safetyintothedesignof itemsintheworkplace
Page580 Figure1126
DiscoveringComputers2011:LivinginaDigitalWorld Chapter11
39
HealthConcernsofComputerUse
Computeraddiction occurswhenthecomputer consumessomeonesentiresociallife Symptomsofusersinclude:
Craves computer ti time Irritable I it bl when h notatthe computer
Page581
DiscoveringComputers2011:LivinginaDigitalWorld Chapter11
EthicsandSociety
Computerethics are themoralguidelines thatgoverntheuseof computersand informationsystems Informationaccuracyis aconcern
Notallinformationon theWebiscorrect
DiscoveringComputers2011:LivinginaDigitalWorld Chapter11
41
EthicsandSociety
Intellectualpropertyrightsaretherightstowhichcreators areentitledfortheirwork
Acopyright py g p protectsany ytangible g formofexpression p
Page582
DiscoveringComputers2011:LivinginaDigitalWorld Chapter11
42
EthicsandSociety
Page583 Figure1129
DiscoveringComputers2011:LivinginaDigitalWorld Chapter11
43
EthicsandSociety
Greencomputing involvesreducingtheelectricity gacomputer p andenvironmentalwastewhileusing
DiscoveringComputers2011:LivinginaDigitalWorld Chapter11
44
EthicsandSociety
Informationprivacyreferstotherightof p todeny yorrestrictthe individualsandcompanies collectionanduseofinformationaboutthem Hugedatabasesstoredataonline Itisimportanttosafeguardyourinformation
Page584
DiscoveringComputers2011:LivinginaDigitalWorld Chapter11
45
EthicsandSociety
Page584 Figure1131
DiscoveringComputers2011:LivinginaDigitalWorld Chapter11
46
EthicsandSociety
Whenyoufillouta form,themerchantthat receivestheform usuallyentersitintoa database Manycompaniestoday allowpeopletospecify whethertheywant theirpersonal informationdistributed
Page585 Figure1132 DiscoveringComputers2011:LivinginaDigitalWorld Chapter11 47
EthicsandSociety
Acookie isasmalltextfilethataWebserverstoreson yourcomputer Websitesusecookiesforavarietyofreasons:
Allowfor personalization Storeusers passwords Assistwith h online shopping
Click to view Web Link, click Chapter 11, Click Web Link from left navigation, then click Cookies below Chapter 11
Target advertisements
48
Pages585 586
DiscoveringComputers2011:LivinginaDigitalWorld Chapter11
EthicsandSociety
Page586 Figure1133
DiscoveringComputers2011:LivinginaDigitalWorld Chapter11
49
EthicsandSociety
S Spam is i anunsolicited li i d emailmessageor newsgroupposting Emailfiltering blocks emailmessagesfrom designatedsources Antispamprograms attempttoremove spambeforeitreaches yourinbox
Page587 Figure1134 DiscoveringComputers2011:LivinginaDigitalWorld Chapter11 50
EthicsandSociety
Phi Phishing hi is i ascami in whichaperpetratorsends anofficiallookingemail messagethatattemptsto obtainyourpersonaland financialinformation Pharming isascam where h aperpetrator attemptstoobtainyour personalandfinancial informationviaspoofing
Pages587 588 Figure1135
DiscoveringComputers2011:LivinginaDigitalWorld Chapter11
51
EthicsandSociety
Theconcernaboutprivacyhasledtothe g gthe enactmentoffederalandstatelawsregarding storageanddisclosureofpersonaldata
SeeFigure1136onpage589foralistingofmajorU U.S. S governmentlawsconcerningprivacy
EthicsandSociety
Socialengineering isdefinedasgaining unauthorizedaccessorobtainingconfidential informationbytakingadvantageoftrustandnaivety Employeemonitoring involvestheuseofcomputers toobserve observe,record record,andreviewanemployees employee suseof acomputer
Click to view Web Link, click Chapter 11, Click Web Link from left navigation, then click Social Engineering below Chapter 11
Page590
DiscoveringComputers2011:LivinginaDigitalWorld Chapter11
53
EthicsandSociety
C Contentfil filtering i is i the h processofrestricting accesstocertainmaterial ontheWeb Many ybusinessesuse contentfiltering InternetContentRating Association(ICRA) Webfilteringsoftware restrictsaccessto specifiedWebsites
Pages590 591 Figure1137 DiscoveringComputers2011:LivinginaDigitalWorld Chapter11 54
Summary
Potentialcomputerrisksand thesafeguards
Wirelesssecurityrisksand safeguards
Ethi li di Ethical issuessurrounding informationaccuracy, intellectualp property p yrights, g codesofconduct,green computing,andinformation privacy
55
Page591
DiscoveringComputers2011:LivinginaDigitalWorld Chapter11
Chapter11Complete