Lecture 3, Hacking, Cracking and Computer Security
Lecture 3, Hacking, Cracking and Computer Security
A sniffer is a software or hardware tool that allows the user to “sniff” or monitor your
internet traffic in real time, capturing all the data flowing to and from your computer.
Internet Abuses in the Workplace
General email abuses
Unauthorized usage and access
Copyright infringement (is the use of works
protected by copyright law without permission for a
usage)
Transmission of confidential data
Hacking
Non-work-related download/upload
Leisure use of the Internet
Moonlighting (refers to the practice of working a
second job outside normal business hours).
Software Piracy
Software Piracy
Unauthorized copying of computer programs
Licensing
Purchasing software is really a payment
for a license for fair use
Site license allows a certain number of copies
Individuality
Dehumanizes and depersonalizes activities
because computers eliminate human
relationships (use of robots)
Health Issues
Cumulative Trauma Disorders (CTDs)
Disorders suffered by people who sit at a
PC or terminal and do fast-paced repetitive
keystroke jobs
Carpal Tunnel Syndrome
Painful, crippling ailment of the hand
and wrist
Typically requires surgery to cure
Ergonomics Ergonomics Factors
Designing healthy work
environments
Safe, comfortable,
and pleasant for
people to work in
Increases employee
morale and
productivity
Also called human
factors engineering
Societal Solutions
Using information technologies to solve human
and social problems
Medical diagnosis
Computer-assisted instruction
Governmental program planning
Job placement
The detrimental effects of IT
Often caused by individuals or organizations
not accepting ethical responsibility for their
actions
Security Management of IT
Business managers and professionals
are responsible for the security, quality, and
performance of business information systems
Hardware, software, networks, and data
resources must be protected by a variety
of security measures
Security Management
The goal of security
management is the
accuracy, integrity,
and safety of all
information system
processes and
resources
Internetworked Security Defenses
Email Monitoring
Use of content monitoring software that scans
for troublesome words that might compromise
corporate security
Virus Defenses
Centralize the updating and distribution of
antivirus software
Use a security suite that integrates virus
protection with firewalls, Web security,
and content blocking features
Other Security Measures
Security Codes
Multilevel password system
Encrypted passwords
Smart cards with microprocessors
Backup Files
Duplicate files of data or programs
Security Monitors
Monitor the use of computers and networks
Protects them from unauthorized use, fraud,
and destruction
Biometrics
Computer devices measure physical traits that make each
individual unique
Voice recognition, fingerprints, retina scan
Computer Failure Controls
Prevents computer failures or minimizes its effects
Preventive maintenance
Arrange backups with a disaster recovery organization
Other Security Measures
In A disaster recovery plan contains formalized
procedures to follow in the event of a disaster
Which employees will participate
What their duties will be
What hardware, software, and facilities will be
used
Priority of applications that will be processed
Use of alternative facilities
Offsite storage of databases
Information System Controls
Methods and
devices that
attempt to ensure
the accuracy,
validity, and
propriety of
information
system activities
Auditing IT Security
IT Security Audits
Performed by internal or external auditors
Review and evaluation of security measures
and management policies
Goal is to ensure that that proper and
adequate measures and policies are in place