Lecture Note 3 Computer Threats and Risks
Lecture Note 3 Computer Threats and Risks
Lecture Note 3 Computer Threats and Risks
Technology
Chapter 3
Computer Threats and Risks
Terminology
Threat---a potential cause of an incident that may result in
harm to a system or organization
Vulnerability---a weakness of an asset (resource) or a group
of assets that can be exploited by one or more threats
Risk---potential for loss, damage, or destruction of an asset
as a result of a threat exploiting a vulnerability
Example: In a system that allows weak passwords,
Vulnerability---password is vulnerable for dictionary or exhaustive
key attacks
Threat---An intruder can exploit the password weakness to break
into the system
Risk---the resources within the system are prone for illegal
access/modify/damage by the intruder.
Threat agent---entities that would knowingly seek to
manifest a threat
Who is the enemy? Why do
they do it?
Offenders
Crackers---mostly teenagers doing as
intellectual challenge
Information system’s criminals---Espionage
and/or Fraud/abuse---for a nation/company to
gain a competitive advantage over its rivals
Vandals---authorized users and strangers
(cracker or a criminal)---motivated by anger
directed at an individual/organization/life in
general
Types of Perpetrators
Perpetrators include:
Thrill seekers wanting a challenge
Common criminals looking for financial gain
Industrial spies trying to gain an advantage
Terrorists seeking to cause destruction
Different objectives and access to varying
resources
Willing to take different levels of risk to
accomplish an objective
Ethics in Information Technology, Fourth Edition
Malicious Insiders
Major security concern for companies
Fraud within an organization is usually due to
weaknesses in internal control procedures
Collusion
Cooperation between an employee and an
outsider
Insiders are not necessarily employees
Can also be consultants and contractors
Extremely difficult to detect or stop
Authorized to access the very systems they abuse
Negligent insiders have potential to cause
damage
Ethics in Information Technology, Fourth Edition
Industrial Spies
Use illegal means to obtain trade secrets from
competitors
Trade secrets are protected by the Economic
Espionage Act of 1996
Competitive intelligence
Uses legal techniques
Gathers information available to the public
Industrial espionage
Uses illegal means
Obtains information not available to the public
Ethics in Information Technology, Fourth Edition
Cybercriminals
Hack into corporate computers to steal
Engage in all forms of computer fraud
Chargebacks are disputed transactions
Loss of customer trust has more impact than fraud
To reduce potential for online credit card fraud:
Use encryption technology
Verify the address submitted online against the
issuing bank
Request a card verification value (CVV)
Use transaction-risk scoring software
What it is:
The process by which cyber criminals gain
access to your computer.
Hacking is a term used to describe actions
taken by someone to gain unauthorized
access to a computer. The availability of
information online on the tools, techniques,
and malware makes it easier for even non-
technical people to undertake malicious
activities.
Ethics in Information Technology
Malware
What it is:
A means to point you to a malicious and illegitimate
website by redirecting the legitimate URL. Even if the
URL is entered correctly, it can still be redirected to a
fake website.
What it can do:
Convince you that the site is real and legitimate by
spoofing or looking almost identical to the actual site
down to the smallest details. You may enter your
personal information and unknowingly give it to
someone with malicious intent.
What it does:
Trick you into giving them information by asking you to update,
validate or confirm your account. It is often presented in a manner
than seems official and intimidating, to encourage you to take
action.
Provides cyber criminals with your username and passwords so that
they can access your accounts (your online bank account,
shopping accounts, etc.) and steal your credit card numbers.
What it is:
Ransomware is a type of malware that restricts access to your computer or your
files and displays a message that demands payment in order for the restriction to
be removed. The two most common means of infection appear to be phishing
emails that contain malicious attachments and website pop-up advertisements.
Ransomware will display a notification stating that your computer or data have
been locked and demanding a payment be made for you to regain
access. Sometimes the notification states that authorities have detected illegal
activity on your computer, and that the payment is a fine to avoid prosecution.
What it is:
The mass distribution of unsolicited messages, advertising or
pornography to addresses which can be easily found on the
Internet through things like social networking sites, company
websites and personal blogs.
What it can do:
Annoy you with unwanted junk mail.
Create a burden for communications service providers and
businesses to filter electronic messages.
Phish for your information by tricking you into following links
or entering details with too-good-to-be-true offers and
promotions.
Provide a vehicle for malware, scams, fraud and threats to
your privacy.
What it is:
A website or email address that is created to look like it
comes from a legitimate source. An email address may
even include your own name, or the name of someone
you know, making it difficult to discern whether or not
the sender is real.
What it does:
Spends spam using your email address, or a variation
of your email address, to your contact list.
Recreates websites that closely resemble the
authentic site. This could be a financial institution or
other site that requires login or other personal
information.
What it is:
Software that collects personal information about you without you
knowing. They often come in the form of a ‘free' download and are
installed automatically with or without your consent. These are difficult
to remove and can infect your computer with viruses.
What it is:
A malicious program that is disguised as, or embedded
within, legitimate software. It is an executable file that
will install itself and run automatically once it's
downloaded.
What it can do:
Delete your files.
Use your computer to hack other computers.
Watch you through your web cam.
Log your keystrokes (such as a credit card number
you entered in an online purchase).
Record usernames, passwords and other personal
information.
Ethics in Information Technology,
Viruses
What it is:
Virtual “listening in” on information that's shared over
an unsecure (not encrypted) WiFi network.