0% found this document useful (0 votes)
293 views6 pages

Computer and Internet Crimes: Rank Valuable Information

1) Customer information, financial information, and strategic plans are the top three most valuable types of information organizations want to protect. Phishing and malware are the most common starting points for successful cybercrimes like disruption attacks and theft. 2) Computer crimes threaten individuals, organizations, groups, and nations by damaging reputations. Reasons for prevalent computer incidents include increasing network complexity and vulnerabilities, high user expectations, new technological risks, reliance on software with known flaws, and delays in software updates. 3) Common computer attacks include viruses, worms, botnets, distributed denial-of-service (DDoS) attacks, and rootkits. Viruses and worms spread through infected files and sites and can damage

Uploaded by

Cenina Nestor
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
293 views6 pages

Computer and Internet Crimes: Rank Valuable Information

1) Customer information, financial information, and strategic plans are the top three most valuable types of information organizations want to protect. Phishing and malware are the most common starting points for successful cybercrimes like disruption attacks and theft. 2) Computer crimes threaten individuals, organizations, groups, and nations by damaging reputations. Reasons for prevalent computer incidents include increasing network complexity and vulnerabilities, high user expectations, new technological risks, reliance on software with known flaws, and delays in software updates. 3) Common computer attacks include viruses, worms, botnets, distributed denial-of-service (DDoS) attacks, and rootkits. Viruses and worms spread through infected files and sites and can damage

Uploaded by

Cenina Nestor
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

IT1720

COMPUTER AND INTERNET CRIMES make up the top three (3) most valuable information that
organizations would like to protect as shown in Table 1.
• Confidential business data and private customer and employee • In the same conducted survey, Table 2 shows that the most
information must be safeguarded, and systems must be protected successful cybercrimes contain phishing and malware as starting
against malicious acts of theft or disruption. points. Attacks focused on disruption and stealing money rank
• Although the necessity of security is obvious, it must often be third and fourth.
balanced against other business needs and issues. • Computer crime is a crime that is executed using computers or
• Business managers, IT professionals, and IT users all face networks of computers. It is done to damage people’s or
several ethical decisions regarding IT security. organizations’ reputation. Some of the ways computer crimes
p pose threats are as follows:
Rank Valuable Information − Threat to an individual
1 Customer information (17%) − Threat to an organization
2 Financial information (12%) − Threat to groups
3 Strategic plans (12%)
− Threat to a nation
4 Board member information (11%)
5 Customer password (11%)
6 Research and development (R&D) information (9%)
Why Computer Incidents are Prevalent
7 Mergers and acquisition (M & A) information (8%) • Increasing Complexity Increases Vulnerability
8 Intellectual property (6%) - The number of possible entry points to a network expands
9 Non-patented (5%) continually as more devices are added, increasing the
10 Supplier information (5%) possibility of security breaches.
Table 1. Top 10 most valuable information to criminals (2018–2019 Global survey) • Higher Computer User Expectations
Source: https://www.ey.com/Publication/vwLUAssets/ey-global-information-security-survey- - Time means money. The earlier the active computer
2018-19/$FILE/ey-global-information-security-survey-2018-19.pdf
users can resolve a problem, the more productive they
can be. As a result, computer support desks are under
Rank Cyber threats extreme pressure to counter very instantly to user’s
1 Phishing (22%) questions.
2 Malware (20%) • Technological Advancement Introduce New Risks
3 Cyberattacks (to disrupt) (13%) - With expanded business needs, globalization,
4 Cyberattacks (to steal money) (12%)
collaborative working, and new technological
5 Fraud (10%)
breakthroughs today, information is being shared on
6 Cyberattacks (to steal IP) (8%)
7 Spam (6%) networks with millions of other computers.
8 Internal attacks (5%) • Increase Reliance on Commercial Software with Known
9 Natural disaster (2%) Vulnerabilities
10 Espionage (2%) - Many companies are increasingly relying on commercial
Table 2. Top 10 biggest cyber threats to organizations software with known vulnerabilities. Even when
Source: https://www.ey.com/Publication/vwLUAssets/ey-global-information-security-survey- vulnerabilities are exposed, many corporate IT
2018-19/$FILE/ey-global-information-security-survey-2018-19.pdf organizations prefer to use already installed software “as
• According to EY Global Information Security Survey 2018–2019, is” rather than implement security fixes that will either
customer information, financial information, and strategic plans make the software harder to use or eliminate “nice-to-

06 Handout 1 *Property of STI


[email protected] Page 1 of 6
IT1720

have” features suggested by current users or potential - The program’s harmful payload can enable the
customers, which will help sell the software. hacker to destroy hard drives, corrupt files, control the
• Bringing your own device (BYOD) policy computer remotely, launch attacks against other
- Employees access company data by using their devices computers, steal passwords or social security
such as mobiles, tablets, and personal laptops to have all- numbers, and spy on users by recording keystrokes
time availability and connection with the work, which and transmitting them to a server operated by a third
generates a security threat. party.
• Delay in software updates 4. Botnets
- Most organizations do not understand the upcoming risks - A botnet is a large group of computers controlled from
and delay software updates for multiple reasons such as one or more remote locations by hackers, without the
time shortage, extra cost involved, or just negligence, knowledge or consent of their owners.
making the organization’s computer vulnerable to attack. - This is frequently used to distribute spam and
malicious code.
Types of Exploits 5. Distributed Denial-of-Service (DDoS) Attacks
In computing, an exploit is an attack on an information system that - A DDoS happens when a malicious hacker takes over
takes advantage of a particular system vulnerability due to poor computers on the Internet and cause them to flood a
system design or implementation. target site with demand for data and other small tasks.
- A DDoS attack does not involve infiltration of the
Types of Computer Attacks targeted system. Instead, it keeps the target so busy
1. Viruses responding to a stream of automated requests that
- A virus is a piece of programming code, usually legitimate users cannot get in – the Internet
disguised as something else, that causes a computer equivalent of dialing a telephone number repeatedly
to behave unexpectedly and often undesirably. so that all other callers hear a busy signal.
- It is spread to other machines when a computer user 6. Rootkits
opens an infected file or visits infected Web sites. - A rootkit is a set of programs that enables its user to
2. Worms gain administrator-level access to a computer without
- A worm is a harmful program that resides in the active the end user’s consent or knowledge.
memory of the computer and duplicates itself without - Attackers can use the rootkit to execute files, access
human intervention. logs, monitor user activity, and change the
- The negative impact of a worm attack on an computer’s configuration.
organization’s computer can be considerable – lost 7. Spam
data and programs, lost productivity due to workers - E-mail spam is the abuse of e-mail systems to send
being unable to use their computers, additional lost unsolicited e-mail to large numbers of people.
productivity as workers attempt to recover data - Most of the spam are a form of low-cost commercial
programs, and lots of effort for IT workers to clean up advertising, sometimes for questionable products
the mess and restore everything to as close to normal such as pornography, phony get-rich-quick schemes,
as possible. and worthless stock.
3. Trojan Horses 8. Phishing
- A Trojan horse is a program in which malicious code - Phishing is the act of using e-mail fraudulently to try
is hidden inside a seemingly harmless program. to get the recipient to reveal personal data.

06 Handout 1 *Property of STI


[email protected] Page 2 of 6
IT1720

- In a phishing scam, a fraud person sends legitimate- • Malicious Insiders


looking e-mails, urging the recipient to take action to - They are extremely difficult to detect or stop because
avoid negative consequences or to receive a reward. they are often authorized to access the very systems
- Spear-phishing is a variation of phishing in which the they abuse.
phisher sends fraudulent e-mails to a certain
organization’s employees. - They know individual systems, which often include
the procedures, to gain access to login IDs and
passwords.
Types of Perpetrators
• Industrial Spies
A perpetrator is a person who carries out a harmful, illegal, or immoral - They use illegal means to obtain trade secrets from
act. competitors of their sponsor.
Types of Perpetrator Typical Motives
Hacker Test limits of the system and/or gain publicity - Trade secrets are most often stolen by insiders, such
Cracker Cause problems, steal data, and corrupt systems as disgruntled employees and ex-employees.
Malicious insider Gain financially and/or disrupt a company’s - Competitive intelligence uses legal techniques to
information systems and business operations gather information that is available to the public.
Industrial spy Capture trade secrets and gain competitive Participants gather and analyze information from
advantage financial reports, trade journals, public filings, and
Cybercriminal Gain financially
printed interviews with company officials.
Hacktivist Promote political ideology
Cyberterrorist Destroy infrastructure components of financial - Industrial espionage can involve the theft of new
institutions, utilities, and emergency response product designs, production data, marketing
units information, or new software source code.
Table 3. Classification of perpetrators of computer crime • Cybercriminals
• Hackers - Cybercriminals are motivated by potential crime for
- They test the limitations of information systems out of monetary gain. They hack into corporate computers
intellectual curiosity to see whether they can gain to steal – often by transferring money from one
access and how far they can go. account to another – leaving a hopelessly
- They have at least a basic understanding of complicated trail for law enforcers to follow.
information systems and security features, and much - They are engaged in all forms of computer fraud:
of their motivations come from a desire to learn even stealing and reselling credit card numbers, personal
more. identities, and cellphone IDs.
• Crackers • Hacktivists and Cyberterrorists
- They break into other people’s networks and systems - Hacktivism is a combination of the words “hacking”
to cause harm such as defacing Web pages, crashing and “activism.” This is done to achieve political or
computers, spreading harmful programs or hateful social goal.
messages, and writing scripts and automated
programs that let other people do the same things. - A cyberterrorist launches a computer-based attack
against other computers or networks in an attempt to

06 Handout 1 *Property of STI


[email protected] Page 3 of 6
IT1720

intimidate or coerce a government in order to


advance certain political or social objectives. Pillar Actions taken by Microsoft to support trustworthy
computing
- Cyberterrorists seek to cause harm rather than gather Security - Invest in the expertise and technology required to create a
information, and they use techniques that destroy or trustworthy environment.
disrupt services. Extremely dangerous, they consider - Work with law enforcement agencies, industry experts,
themselves to be at war, have a very high acceptance academe, and private sectors to create and enforce secure
of risk, and seek maximum impact. computing.
- Develop trust by educating consumers on secure
Implementing Trustworthy Computing computing.
Privacy - Make privacy a priority in the design, development, and
testing of products.
• Trustworthy computing is a method of computing that - Contribute to standards and policies created by industries,
delivers secure, private, and reliable computing experiences organizations, and government.
based on sound business practices. - Provide users with a sense of control over their personal
• The security of any system or network is a combination of information.
technology, policy, and people. It requires a wide range of Reliability Build a system so that:
activities to be effective. - they continue to provide service in the face of internal or
• A strong security program begins by assessing threats to the external disruptions
organization’s computers and network, identifying actions that - in the event of a disruption, they can be easily restored to
a previously known state with no data loss
address the most serious vulnerabilities, and educating end - they provide accurate and timely service whenever needed
users about the risk involved and the actions they must take - required changes and upgrades do not disrupt them
to prevent a security incident. - on release, they contain minimal software bugs
• Microsoft has pledged to deliver on a trustworthy computing - they work as expected or promised.
initiative designs to improve trust in its software products, as Business Be responsive – take responsibility for problems and take
summarized in Figure 1 and Table 3. Integrity action to correct them.
Be transparent – be open in dealings with customers, keep
motives clear, keep promises, and make sure customers know
where they stand in dealing with the company.
Table 4. Actions taken by Microsoft to support trustworthy computing

Activities for Implementing Trustworthy Computing


Risk Assessment
• This is the process of assessing security-related risks to an
organization’s computers and networks from both internal and
external threats.
• Its goal is to identify which investments of time and resources
will best protect the organization from its most likely and
serious threats.
Figure 1. Microsoft’s Four Pillars of Trustworthy Computing • In the context of IT risk assessment, an asset isany hardware,
software, information system, network, or database that is

06 Handout 1 *Property of STI


[email protected] Page 4 of 6
IT1720

used by the organization to achieve its business obejctives.


Figure 2 illustrates a general security risk assessment
process.
Step 1. Identify the set of IT assets about which the organization is
most concerned. Priority is typically given to assets that
support the organization’s mission and the meetings of its
primary goals.
Step 2. Identify the loss events or the risks/threats that could occur,
such as a DDoS attack or insider fraud.
Step 3. Assess the frequency of events or the likelihood of each
potential threat; some threats, such as insider fraud, are more
likely to occur than others.
Step 4. Determine the impact of each threat occurring.
Step 5. Determine how each threat can be mitigated so that it
becomes much less likely to occur or, if it does occur, has less
of an impact on the organization.
Step 6. Assess the feasibility of implementing the mitigation options.
Step 7. Perform a cost-benefit analysis to ensure that one’s efforts will
be cost-effective.
Figure 2. General Security Risk Assessment
Step 8. Decide whether or not to implement a particular counter-
measure. Educating Employees, Contractors, and Part-Time Workers
• They must be educated about the importance of security so
Establishing a Security Policy that they will be motivated to understand and follow the
• A security policy defines an organization’s security security policies.
requirements, as well as the controls and sanctions needed
• Users must understand that they are a key part of the security
to meet requirements.
system and that they have certain responsibilities like:
• Organizations should have written policies on the following: - Guarding their passwords to protect against
- The use of automated system (password guidelines) unauthorized access to their accounts
- The use of e-mail attachments - Prohibiting others from using their passwords
- The use of wireless devices to access corporate e- - Applying strict access controls (file and directory
mail, store confidential data, and run critical permissions) to protect data from disclosure or
applications. destruction
- Reporting all unusual activity to the organization’s IT
security group.
Prevention
• Implementing layered-security solution will give difficulty to an
attacker to break-in into a computer until giving-up eventually.
• These are the layers of protective measures:

06 Handout 1 *Property of STI


[email protected] Page 5 of 6
IT1720

- Installing a corporate firewall – A firewall stands as possible intrusions from outside the organization or misuse
guard between an organization’s internal network and from within the organization.
the Internet. It also limits network access based on
the organization’s access policy. Response
- Intrusion prevention systems (IPSs) – These work to • A response plan should be developed well in advance of any
prevent an attack by blocking viruses, malformed incident and be approved by both the organization’s legal
packets, and other threats from getting into the department and senior management.
protected network. • Sample response plan:
- Installing Antivirus Software on Personal Computers - Incident notification – It defines who to notify and who
– Antivirus software scans for a specific sequence of not to notify
bytes, known as a virus signature, that indicates the - Protection of evidence and activity logs – It
presence of specific viruses. If it finds a virus, the documents all details of a security incident as it works
antivirus software informs the user, and it may clean, to resolve the incident
delete, or quarantine any files, directories, or disks - Incident containment – It acts quickly to contain an
affected by the malicious codes. attack and to keep a bad situation from becoming
- Implementing safeguards against attacks by even worse
malicious insiders – Organizations need to define - Eradication – Before the IT security begins the
employee roles carefully and separate key eradication effort, it must collect and log all possible
responsibilities properly so that a single person is not criminal evidence from the system. Then it must verify
responsible for accomplishing a task that has high that all necessary backups are current, complete, and
security. free of any virus.
- Addressing the most critical internet security threats - Incident follow-up – An essential part of follow-up is
– The actions required to address these issues to determine how the organization’s security was
include installing a known patch to the software and compromised so that it does not happen again.
keeping applications and operating systems up to
REFERENCES:
date. Those responsible for computer security must Bott, F. (2005). Professional issues in information technology. UK: British
make it a priority to prevent attacks using these Computer Society, Ltd.
vulnerabilities. Kessel, P. (2019). Is cybersecurity about more than protection? EY Global
- Conducting periodic IT security audits – Security Information Security Survey 2018-19. Retrieved from
audit is a prevention tool that evaluates whether an https://www.ey.com/Publication/vwLUAssets/ey-global-information-
organization has a well-considered security policy in security-survey-2018-19/$FILE/ey-global-information-security-survey-
2018-19.pdf
place and if it is being followed (e.g., password policy,
Quinn, M. (2014). Ethics for information Age (6th Ed.). USA: Pearson.
system access, and level of authority). Reynolds, G. (2010). Ethics in information technology (3rd Ed.). Boston, USA:
Cengage Learning.
Detection
• An intrusion detection system is a software and/or hardware
that monitors system and network resources and activities. It
also notifies network security personnel when it identifies

06 Handout 1 *Property of STI


[email protected] Page 6 of 6

You might also like