Ciis451 Legal & Ethical Use of It_lesson3_computer & Internet Crime
Ciis451 Legal & Ethical Use of It_lesson3_computer & Internet Crime
Use of Information
Technology
Lesson 3: Computer and
Internet Crime
3
Ethical Decisions Regarding IT
Security
To deal with computer crime, the firm
should:
Pursue prosecution of the criminals at all costs
Maintain a low profile to avoid the negative
publicity
Inform affected customers or take some other
action
Following decisions should be taken by the
firm
How much resources should be spent to
safeguard against computer crime
4
Why Computer Incidents are
So Prevalent
Increasing complexity increases
vulnerability
Number of entry points to a network
expands continually, increasing the
possibility of security breaches
Cloud computing: Environment where
software and data storage are provided via the
Internet
Virtualization software: Operates in a
software layer that runs on top of the operating
system
Enables multiple virtual machines to run on a
5
single
Why Computer Incidents are
So Prevalent (cont.)
Higher computer user expectations
Not verifying users’
Sharing of login IDs and passwords by users
Expanding and changing systems require
one to:
Keep up with the pace of technological change
Perform an ongoing assessment of new
security risks
Implementing approaches for dealing with
them
6
Why Computer Incidents are
So Prevalent
Bring your own device (BYOD):
Business policy that permits employees
to use their own mobile devices to
access company computing resources
and applications
Increased reliance on commercial
software with known vulnerabilities
Exploit: Attack on an information system
that takes advantage of a particular system
vulnerability
Zero-day attack: Takes place before the
security community or software developer 7
Types of
Exploits
Virus
Worm
Trojan Horse
10
Types of
Phishing Phisher sends
Spear-phishing:
fraudulent
emails to a certain organization’s
employees
Emails are designed to look like they came
from high-
level executives within the organization
Smishing: Legitimate-looking text
message sent to people, telling them to
call a specific phone number or to log on
to a Web site
Vishing: Victims receive a voice mail 11
Types of
Perpetrators
Thrill seekers wanting a challenge
13
Types of
Perpetrators
Hackers: Test the limitations of
information systems out of intellectual
curiosity
Lamers or script kiddies: Terms used to
refer to
technically inept hackers
Malicious insiders
Employees, consultants, or contractors
Have some form of collusion
Collusion: Cooperation between an employee
and an outsider
Negligent insiders: Poorly trained and 14
Types of
Perpetrators
Industrial spies
Competitive intelligence: Legally
obtained data gathered using sources
available to the public
Industrial espionage: Using illegal means to
obtain information that is not available to the
public
Cybercriminals
Hack into computers to steal and engage in
computer fraud
Data breach: Unintended release of sensitive
data or the access of sensitive data by 15
Types of
Perpetrators
Hacktivists: Hack to achieve a political or
social goal
Cyberterrorists: Launch computer-based
attacks to intimidate or coerce an
organization in order to advance certain
political or social objectives
Use techniques that destroy or disrupt services
Consider themselves to be at war
Have a very high acceptance of risk
Seek maximum impact
16
Strategies to Reduce Online
Credit Card
Fraud
Use encryption technology
Verify the address submitted online
against the issuing bank
Request a card verification value (CVV)
Use transaction-risk scoring software
Use smart cards
Smart cards: Memory chips are
updated with encrypted data every time
the card is used
17
Trustworthy
Computing
18
Actions taken by Microsoft to
support trustworthy
computing
Risk
Assessmentrisks to an
Assessing security-related
organization’s computers and
networks from internal and external
threats
Identify investments that will protect the
organization from most likely and serious
threats
Asset - Hardware, software, information
system, network, or database used by an
organization to achieve its business
objectives
20
General Security Risk
Assessment
Source Line: General Security Risk Assessment Guidelines, ASIS International (2003). See the Standards and Guidelines page of the ASIS International website
(www.asisonline.org) for revisions and/or updates. Reprinted by permission.
21
Security
Policy
Defines an organization’s security
requirements and the controls and
sanctions needed to meet those
requirements
Delineates responsibilities and expected
behavior
Outlines what needs to be done and not
how it should be done
22
Establishing a Security
Policy
Areas of concern
Use of email attachments
Use of wireless devices
Virtual private network (VPN):
Works by using the Internet to relay
communications
Encrypts data at the sending end and decrypts
it at the receiving end
23
Educating Employees and
Contract Workers
Motivates them to understand and
follow the security policies
Users must help protect an
organization’s
information systems and data by:
Guarding their passwords
Prohibiting others from using their
passwords
Applying strict access controls
Reporting all unusual activity to the
organization’s IT
24
security group
Preventi
on
Install a corporate firewall
• Limits network access based on the
organization’s access
policy
Intrusion detection system (IDS)
• Monitors system and network resources and
activities
• Notifies network security personnel when
network traffic
attempts to circumvent the security measures
Antivirus software
• Scans for a specific sequence of bytes, known as
25
Preventi
on
Implement safeguards against attacks by malicious
insiders
• Promptly delete the computer accounts, login IDs, and
passwords of
departing employees and contractors
Defend against cyberterrorism
• Department of National Security:Aims to secure critical
infrastructure and information systems
Address critical internet security threats
• High-impact vulnerabilities should be fixed on priority basis
Minimize
Catch the
Intruders Impact of
in the Act
Intruders
27
Response
Plan
Incident notification
Define who to notify and who not to notify
Refrain from giving out specific information
about a
compromise in public forums
Protection of evidence and activity logs
Document all details of a security incident to
help with future prosecution and incident
eradication
Incident containment
Determine if an attack is dangerous enough to
28
warrant shutting down the systems
Response Plan
(cont.)
Eradication
Collect and log all criminal evidence from the
system
Verify that all backups are current, complete,
and free of
any virus
Incident follow-up
Determine how the security was compromised
Conduct a review to evaluate how the
organization responded
Create a detailed chronology of all events
29
Computer
CombinesForensics
elements of law and computer
science to:
Identify, collect, examine, and preserve data
from
computer systems
Collect data in a manner that preserves the
integrity of the data gathered so that it is
admissible as evidence in a court of law
30
Summa
ryin determining
Ethical decisions
which information systems and
data most need protection
Most common computer exploits
Viruses and worms
Trojan horses
Distributed denial-of-service attacks
Rootkits and spam
Phishing and spear-fishing
Smishing and vishing
31
Summa
Perpetrators ry
include:
Hackers
Crackers
Malicious insider
Industrial spies
Cybercriminals
Hacktivist
Cyberterrorists
32
Summa
Must implementry
multilayer process for
managing security vulnerabilities,
including:
Assessment of threats
Identifying actions to address vulnerabilities
User education
IT must lead the effort to implement:
Security policies and procedures
Hardware and software to prevent security
breaches
Computer forensics is key to fighting 33