Lecture Note 3 Computer Threats and Risks

Download as pdf or txt
Download as pdf or txt
You are on page 1of 36

Professional Ethics in Information

Technology

Chapter 3
Computer Threats and Risks
Terminology
 Threat---a potential cause of an incident that may result in
harm to a system or organization
 Vulnerability---a weakness of an asset (resource) or a group
of assets that can be exploited by one or more threats
 Risk---potential for loss, damage, or destruction of an asset
as a result of a threat exploiting a vulnerability
 Example: In a system that allows weak passwords,
 Vulnerability---password is vulnerable for dictionary or exhaustive
key attacks
 Threat---An intruder can exploit the password weakness to break
into the system
 Risk---the resources within the system are prone for illegal
access/modify/damage by the intruder.
 Threat agent---entities that would knowingly seek to
manifest a threat
Who is the enemy? Why do
they do it?
 Offenders
 Crackers---mostly teenagers doing as
intellectual challenge
 Information system’s criminals---Espionage
and/or Fraud/abuse---for a nation/company to
gain a competitive advantage over its rivals
 Vandals---authorized users and strangers
(cracker or a criminal)---motivated by anger
directed at an individual/organization/life in
general
Types of Perpetrators
 Perpetrators include:
 Thrill seekers wanting a challenge
 Common criminals looking for financial gain
 Industrial spies trying to gain an advantage
 Terrorists seeking to cause destruction
 Different objectives and access to varying
resources
 Willing to take different levels of risk to
accomplish an objective
Ethics in Information Technology, Fourth Edition
Malicious Insiders
 Major security concern for companies
 Fraud within an organization is usually due to
weaknesses in internal control procedures
 Collusion
 Cooperation between an employee and an
outsider
 Insiders are not necessarily employees
 Can also be consultants and contractors
 Extremely difficult to detect or stop
 Authorized to access the very systems they abuse
 Negligent insiders have potential to cause
damage
Ethics in Information Technology, Fourth Edition
Industrial Spies
 Use illegal means to obtain trade secrets from
competitors
 Trade secrets are protected by the Economic
Espionage Act of 1996
 Competitive intelligence
 Uses legal techniques
 Gathers information available to the public
 Industrial espionage
 Uses illegal means
 Obtains information not available to the public
Ethics in Information Technology, Fourth Edition
Cybercriminals
 Hack into corporate computers to steal
 Engage in all forms of computer fraud
 Chargebacks are disputed transactions
 Loss of customer trust has more impact than fraud
 To reduce potential for online credit card fraud:
 Use encryption technology
 Verify the address submitted online against the
issuing bank
 Request a card verification value (CVV)
 Use transaction-risk scoring software

Ethics in Information Technology, Fourth Edition


Hacktivists and Cyberterrorists
 Hacktivism
 Hacking to achieve a political or social goal
 Cyberterrorist
 Attacks computers or networks in an attempt to
intimidate or coerce a government in order to
advance certain political or social objectives
 Seeks to cause harm rather than gather
information
 Uses techniques that destroy or disrupt services

Ethics in Information Technology, Fourth Edition


Motives of Cyber Criminal
 Power assurance---to restore criminal’s self-
confidence or self-worth through low-aggression
means;---e.g. cyber stalking
 Power assertive---to restore criminal’s self-
confidence or self-worth through moderate- to
high-aggression means---not to harm the victim
but to get control of the victim;
 Anger (retaliatory)---rage towards a person, group,
institution, or a symbol---the offender may believe
that they are correcting some injustice
 Sadistic---derive gratification from the
pain/suffering of others
 Profit-oriented---material or personal gain
Types of Perpetrators (cont’d.)

Ethics in Information Technology


Risk = Threats x Vulnerabilities
Ref: http://simplicable.com/new/the-big-list-of-information-security-vulnerabilities
Types of Damage
 Interruption---destroyed/unavailable
services/resources
 Interception---unauthorized party
snooping or getting access to a resource
 Modification--- unauthorized party
modifying a resource
 Fabrication---unauthorized party inserts a
fake asset/resource
Components of a Threat
 Components
 Threat agents---criminals, terrorists, subversive or secret groups, state
sponsored, disgruntled employees,, hackers, pressure groups,
commercial groups
 Capability---software, technology, facilities, education and training,
methods, books and manuals
 Threat inhibitors---fear of capture, fear of failure, level of technical
difficulty, cost of participation, sensitivity to public perception, law
enforcement activity, target vulnerability, target profile, public
perception, peer perception
 Threat amplifiers---peer pressure, fame, access to information,
changing high technology, deskilling through scripting, skills and
education levels, law enforcement activity, target vulnerability,
target profile, public perception, peer perception
 Threat catalysts---events, technology changes, personal
circumstances
 Threat agent motivators---political, secular, personal gain, religion,
power, terrorism, curiosity
Threat Agents
 Types
 Natural---fire, floods, power failure, earth
quakes, etc.
 Unintentional---insider, outsider---primarily non-
hostile
 Intentional---Insider, outsider---hostile or non-
hostile (curious)
 Foreign agents, industrial espionage, terrorists,
organized crime, hackers and crackers, insiders,
political dissidents, vendors and suppliers
Vulnerabilities
 “Some weakness of a system that could allow
security to be allowed.”
 Types of vulnerabilities
 Physical vulnerabilities
 Natural vulnerabilities
 Hardware/software vulnerabilities
 Media vulnerabilities (e.g., stolen/damaged
disk/tapes)
 Emanation vulnerabilities---due to radiation
 Communication vulnerabilities
 Human vulnerabilities
Why Computer Incidents Are
So Prevalent
 Increasing complexity increases vulnerability
 Computing environment is enormously complex
 Continues to increase in complexity
 Number of entry points expands continuously
 Cloud computing and virtualization software

 Higher computer user expectations


 Computer help desks under intense pressure
 Forget to verify users’ IDs or check authorizations
 Computer users share login IDs and passwords
Ethics in Information Technology, Fourth Edition
Why Computer Incidents Are
So Prevalent (cont’d.)
 Expanding/changing systems equal new risks
 Network era
 Personal computers connect to networks with
millions of other computers
 All capable of sharing information
 Information technology
 Ubiquitous
 Necessary tool for organizations to achieve
goals
 Increasingly difficult to match pace of
technological change
Ethics in Information Technology,
Why Computer Incidents Are
So Prevalent (cont’d.)
 Increased reliance on commercial software
with known vulnerabilities
 Exploit
 Attack on information system
 Takes advantage of system vulnerability
 Due to poor system design or implementation
 Patch
 “Fix” to eliminate the problem
 Users are responsible for obtaining and installing
 Delays expose users to security breaches

Ethics in Information Technology, Fourth Edition


Types of Exploits/Threats
 Computers as well as smartphones can be
target
 Types of attacks
 Virus
 Worm
 Trojan horse
 Distributed denial of service
 Rootkit
 Spam
 Phishing (spear-phishing, smishing, and vishing)
Ethics in Information Technology,
Botnets
Botnets
 What they are:
A collection of software robots, or 'bots', that
creates an army of infected computers (known
as ‘zombies') that are remotely controlled by
the originator. Yours may be one of them and
you may not even know it.
 What they can do:
 Send spam emails with viruses attached.
 Spread all types of malware.
 Can use your computer as part of a denial of
service attack against other systems.
Ethics in Information Technology, Fourth Edition
Distributed denial-of-service
(DDoS) attack
 What it is:
 A distributed denial-of-service (DDoS) attack — or DDoS attack — is
when a malicious user gets a network of zombie computers to
sabotage a specific website or server. The attack happens when
the malicious user tells all the zombie computers to contact a
specific website or server over and over again. That increase in the
volume of traffic overloads the website or server causing it to be
slow for legitimate users, sometimes to the point that the website or
server shuts down completely.
 It could be possible for malicious users to use your computer in one
of these attacks. By taking advantage of security vulnerabilities or
weaknesses, an attacker could take control of your computer. He
or she could then force your computer to send huge amounts of
data to a website or send spam to particular email addresses. The
attacks are "distributed" because the attacker is using multiple
computers, including yours, to launch the denial-of-service attacks.

Ethics in Information Technology,


Hacking

 What it is:
The process by which cyber criminals gain
access to your computer.
Hacking is a term used to describe actions
taken by someone to gain unauthorized
access to a computer. The availability of
information online on the tools, techniques,
and malware makes it easier for even non-
technical people to undertake malicious
activities.
Ethics in Information Technology
Malware

Malware is one of the more common ways to infiltrate or damage your


computer.
 What it is:
Malicious software that infects your computer, such as computer viruses,
worms, Trojan horses, spyware, and adware.

 What it can do:


 Intimidate you with scareware, which is usually a pop-up message
that tells you your computer has a security problem or other false
information.
 Reformat the hard drive of your computer causing you to lose all your
information.
 Alter or delete files.
 Steal sensitive information.
 Send emails on your behalf.
 Take control of your computer and all the software running on it.

Ethics in Information Technology,


Pharming
Pharming is a common type of online fraud.

 What it is:
A means to point you to a malicious and illegitimate
website by redirecting the legitimate URL. Even if the
URL is entered correctly, it can still be redirected to a
fake website.
 What it can do:
Convince you that the site is real and legitimate by
spoofing or looking almost identical to the actual site
down to the smallest details. You may enter your
personal information and unknowingly give it to
someone with malicious intent.

Ethics in Information Technology


Phishing

Phishing is used most often by cyber criminals because it's easy to


execute and can produce the results they're looking for with very little
effort.
 What it is:
Fake emails, text messages and websites created to look like they're
from authentic companies. They're sent by criminals to steal personal
and financial information from you. This is also known as “spoofing”.

 What it does:
 Trick you into giving them information by asking you to update,
validate or confirm your account. It is often presented in a manner
than seems official and intimidating, to encourage you to take
action.
 Provides cyber criminals with your username and passwords so that
they can access your accounts (your online bank account,
shopping accounts, etc.) and steal your credit card numbers.

Ethics in Information Technology


Ransomware

 What it is:
Ransomware is a type of malware that restricts access to your computer or your
files and displays a message that demands payment in order for the restriction to
be removed. The two most common means of infection appear to be phishing
emails that contain malicious attachments and website pop-up advertisements.

 What it can do:


 Lockscreen ransomware: displays an image that prevents you from accessing
your computer
 Encryption ransomware: encrypts files on your system's hard drive and
sometimes on shared network drives, USB drives, external hard drives, and
even some cloud storage drives, preventing you from opening them

Ransomware will display a notification stating that your computer or data have
been locked and demanding a payment be made for you to regain
access. Sometimes the notification states that authorities have detected illegal
activity on your computer, and that the payment is a fine to avoid prosecution.

Ethics in Information Technology,


Spam
Spam is one of the more common methods of both sending
information out and collecting it from unsuspecting people

 What it is:
The mass distribution of unsolicited messages, advertising or
pornography to addresses which can be easily found on the
Internet through things like social networking sites, company
websites and personal blogs.
 What it can do:
 Annoy you with unwanted junk mail.
 Create a burden for communications service providers and
businesses to filter electronic messages.
 Phish for your information by tricking you into following links
or entering details with too-good-to-be-true offers and
promotions.
 Provide a vehicle for malware, scams, fraud and threats to
your privacy.

Ethics in Information Technology,


Spoofing
This technique is often used in conjunction with phishing
in an attempt to steal your information

 What it is:
A website or email address that is created to look like it
comes from a legitimate source. An email address may
even include your own name, or the name of someone
you know, making it difficult to discern whether or not
the sender is real.
 What it does:
 Spends spam using your email address, or a variation
of your email address, to your contact list.
 Recreates websites that closely resemble the
authentic site. This could be a financial institution or
other site that requires login or other personal
information.

Ethics in Information Technology,


Spyware & Adware
Spyware and adware are often used by third
parties to infiltrate your computer

 What it is:
Software that collects personal information about you without you
knowing. They often come in the form of a ‘free' download and are
installed automatically with or without your consent. These are difficult
to remove and can infect your computer with viruses.

 What it can do:


 Collect information about you without you knowing about it and
give it to third parties.
 Send your usernames, passwords, surfing habits, list of applications
you've downloaded, settings, and even the version of your
operating system to third parties.
 Change the way your computer runs without your knowledge.
 Take you to unwanted sites or inundate you with uncontrollable
pop-up ads.

Ethics in Information Technology


Trojan Horses

 What it is:
A malicious program that is disguised as, or embedded
within, legitimate software. It is an executable file that
will install itself and run automatically once it's
downloaded.
 What it can do:
 Delete your files.
 Use your computer to hack other computers.
 Watch you through your web cam.
 Log your keystrokes (such as a credit card number
you entered in an online purchase).
 Record usernames, passwords and other personal
information.
Ethics in Information Technology,
Viruses

 What they are:


Malicious computer programs that are often sent as an email
attachment or a download with the intent of infecting your computer,
as well as the computers of everyone in your contact list. Just visiting a
site can start an automatic download of a virus.

 What they can do:


 Send spam.
 Provide criminals with access to your computer and contact lists.
 Scan and find personal information like passwords on your
computer.
 Hijack your web browser.
 Disable your security settings.
 Display unwanted ads.

Ethics in Information Technology


Wi-Fi Eavesdropping

WiFi eavesdropping is another method used by


cyber criminals to capture personal information

 What it is:
Virtual “listening in” on information that's shared over
an unsecure (not encrypted) WiFi network.

 What it can do:


 Potentially access your computer with the right
equipment.
 Steal your personal information including logins
and passwords.
Ethics in Information Technology
Worms
 Harmful programs
 Reside in active memory of a computer
 Duplicate themselves
 Can propagate without human
intervention
 Negative impact of worm attack
 Lost data and programs
 Lost productivity
 Additional effort for IT workers
Ethics in Information Technology,
Rootkits
 Set of programs that enables its user to gain
administrator-level access to a computer
without the end user’s consent or knowledge
 Attacker can gain full control of the system
and even obscure the presence of the rootkit
 Fundamental problem in detecting a rootkit is
that the operating system currently running
cannot be trusted to provide valid test results

Ethics in Information Technology, Fourth Edition


Summary
 Ethical
decisions in determining which
information systems and data most need
protection

Ethics in Information Technology,

You might also like