Module 3 Week 5 - IT Security and Incidents
Module 3 Week 5 - IT Security and Incidents
Module 3 – Week 5
IT Security and Incidents
Overview
This module discusses what are the ethical issues regarding data and information system that
are vulnerable to be attack or hacked. Included here the discussion of security attacks and
crime that may happen to anyone.
Objectives
IT Security Incidents
Almost as soon as computers began to be used commercially, people began to exploit them for
illicit purposes. As the use of computer has spread, so too has computer crime. Computers
linked to the internet and other telecommunications networks or online systems are especially
vulnerable because they offer a multitude of access points. As PCs and Internet access
proliferate and more people become familiar with them, the potential population of abusers also
grows.
DCIT 65 SOCIAL AND PROFESSIONAL ISSUES - BSCS/BSIT P. MAGNO -SECOND SEMESTER AY 2020-2021
Confidential business data and private customer and employee information must be
safeguarded, and systems must be protected against malicious acts of theft or disruption.
Although the necessity of security is obvious, it must often be balanced against other business
needs and issues. Business managers, IT professionals, and IT users all face several ethical
decisions regarding IT security.
DCIT 65 SOCIAL AND PROFESSIONAL ISSUES - BSCS/BSIT P. MAGNO -SECOND SEMESTER AY 2020-2021
Why Computer Incidents are so Prevalent?
Types of Exploits
DCIT 65 SOCIAL AND PROFESSIONAL ISSUES - BSCS/BSIT P. MAGNO -SECOND SEMESTER AY 2020-2021
Type of Computer Attacks
1. Viruses: A virus is a piece of programming code, usually disguised as something
else, that causes a computer to behave unexpectedly and often undesirably.
2. Worms: A worm is a harmful program that resides in the active memory of the
computer and duplicates itself without human intervention.
3. Trojan Horses: A Trojan horse is a program in which malicious code is hidden
inside a seemingly harmless program.
4. Botnets: A botnet is a large group of computers controlled from one or more
remote locations by hackers, without the knowledge or consent of their owners.
5. Distributed Denial-of-Service (DDos) Attacks: ADDoS happens when a
malicious hacker takes over computers on the Internet and cause them to flood a
target site with demand for data and other small tasks.
6. Rootkits: A rootkit is a set of programs that enables its user to gain
administrator-level access to a computer without the end user’s consent or
knowledge.
7. Spam: E-mail spam is the abuse of e-mail systems to send unsolicited e-mail to
large numbers of people.
8. Phishing: Phishing is the act of using e-mail fraudulently to try to get the
recipient to reveal personal data.
Types of Perpetrators
A person who carries out a harmful, illegal, or immoral act, is called perpetrators.
1. Hackers: They test the limitations of information systems out of intellectual
curiosity to see whether they can gain access and how far they can go.
2. Crackers: They break into other people’s networks and systems to cause harm
such as defacing Web pages, crashing computers, spreading harmful programs
or hateful messages, and writing scripts and automated programs that let other
people do the same things.
3. Malicious Insiders: They are extremely difficult to detect or stop because they
are often authorized to access the very systems they abuse.
4. Industrial Spies: They use illegal means to obtain trade secrets from
competitors of their sponsor.
DCIT 65 SOCIAL AND PROFESSIONAL ISSUES - BSCS/BSIT P. MAGNO -SECOND SEMESTER AY 2020-2021
5. Cybercriminals: They are engaged in all forms of computer fraud: stealing and
reselling credit card numbers, personal identities, and cellphone IDs.
6. Hacktivists and Cyberterrorists: Hacktivism is a combination of the words
“hacking” and “activism.” This is done to achieve political or social goal.
Trustworthy computing is a method of computing that delivers secure, private, and reliable
computing experiences based on sound business practices. The security of any system or
network is a combination of technology, policy, and people. It requires a wide range of activities
to be effective.
Risk Assessment
DCIT 65 SOCIAL AND PROFESSIONAL ISSUES - BSCS/BSIT P. MAGNO -SECOND SEMESTER AY 2020-2021
Use of automated system
Use of e-mail attachments
The use of wireless devices to access corporate e-mail, store confidential data,
and run critical applications.
They must be educated about the importance of security so that they will be motivated to
understand and follow the security policies. Users must understand that they are a key part of
the security system and that they have certain responsibilities like:
Guarding their passwords to protect against unauthorized access to their accounts
Prohibiting others from using their passwords
Applying strict access controls (file and directory permissions) to protect data from
disclosure or destruction
Reporting all unusual activity to the organization’s IT security group.
Prevention
DCIT 65 SOCIAL AND PROFESSIONAL ISSUES - BSCS/BSIT P. MAGNO -SECOND SEMESTER AY 2020-2021
key responsibilities properly so that a single person is not responsible for
accomplishing a task that has high security.
Addressing the most critical internet security threats – The actions required
to address these issues include installing a known patch to the software and
keeping applications and operating systems up to date. Those responsible for
computer security must make it a priority to prevent attacks using these
vulnerabilities.
Conducting periodic IT security audits – Security audit is a prevention tool
that evaluates whether an organization has a well-considered security policy in
place and if it is being followed (e.g., password policy, system access, and level
of authority).
Detection
An intrusion detection system is a software and/or hardware that monitors system and
network resources and activities. It also notifies network security personnel when it
identifies possible intrusions from outside the organization or misuse from within the
organization.
Response
A response plan should be developed well in advance of any incident and be approved
by both the organization’s legal department and senior management.
DCIT 65 SOCIAL AND PROFESSIONAL ISSUES - BSCS/BSIT P. MAGNO -SECOND SEMESTER AY 2020-2021
Computer Forensics
Computer forensics is a branch of forensic science which deals with the application of
investigative analysis techniques on computers in order to retrieve and preserve
evidence in a way that is legally admissible. This means that a major aspect of the
science of computer forensics lies in the ability of the forensics expert to present findings
in a way that is acceptable and usable by a court of law.
Commercial organizations have used computer forensics to help with all kinds of cases,
including:
Activity 4
e-Journal 2 - Preventing Crimes in Internet
1. In the table of valuable information attacked by criminals, why do you think is the customer
information has the highest percentage and ranks number 1?
2. You always use computer in almost every day how do you protect yourself from computer and
internet crimes?
3. Do you believe that there will be more crimes to come in the future? What will it be? Be
realistic with your answer.
References
DCIT 65 SOCIAL AND PROFESSIONAL ISSUES - BSCS/BSIT P. MAGNO -SECOND SEMESTER AY 2020-2021
https://www.ey.com/Publication/vwLUAssets/ey-global-information-security-survey-2018-
19/$FILE/ey-global-information-security-survey-2018-19.pdf
https://www.ey.com/Publication/vwLUAssets/ey-global-information-security-survey-2018-
19/$FILE/ey-global-information-security-survey-2018-19.pdf
https://www.ey.com/Publication/vwLUAssets/ey-global-information-security-survey-2018-
19/$FILE/ey-global-information-security-survey-2018-19.pdf
DCIT 65 SOCIAL AND PROFESSIONAL ISSUES - BSCS/BSIT P. MAGNO -SECOND SEMESTER AY 2020-2021