Chapter 6 Computer Ethics and Security
Chapter 6 Computer Ethics and Security
SECURITY
Computer Security Risks and Threats
• Information Theft
• Hardware Theft
• Malicious Code
• Unauthorized access and use
• Software Theft
• Systems Failure
• Etc…..
What is a Security Threat?
Physical Threats
Physical Threats
A physical threat is a potential cause of an incident that may result in loss or physical damage to the computer systems.
The physical threats can be classified into 3:
1) Internal
2) External
3) Human
Internal Threats
A physical threat is a potential cause of an incident that may result in loss or physical damage to the computer systems.
External Threats
These threats include Lightning, floods, earthquakes, etc.
Human Threats
These threats include theft, vandalism of the infrastructure and/or hardware, disruption, accidental or intentional errors.
Logical Threats
Logical Computer Threats / Non Physical
Malware
Malware
Virus
Virus
Trojan
Trojan
• Trojan blocks computer security systems and opening doors for other
malwares.
• This type of malware disguises itself as a legitimate software.
• A Trojan can be hidden in legitimate software that was tempered with.
• Trojans can be employed by cyber-thieves and hackers trying to gain
access to users' systems.
• Trojan act discreetly and create backdoors in the computer system to
let other types of malware in.
• A Trojan is not capable of replicating itself like a virus does.
Warms
Worms
Spyware
• A malicious attack that observes user’s activities and report it to the third party
• is unwanted software that infiltrates your computing device, stealing your
internet usage data and sensitive information. Spyware is classified as a type of
malware — malicious software designed to gain access to or damage your
computer, often without your knowledge.
• Adware
• Presents ads in pop up and pop under window.
• The term adware is frequently used to describe a form of malware (malicious
software) which presents unwanted advertisements to the user of a computer.
The advertisements produced by adware are sometimes in the form of a pop-up
or sometimes in an "unclosable window".
Spam
Spam
Phishing
Phishing
• “Phishing is the simplest kind of cyberattack and, at the same time, the most dangerous
and effective. That is because it attacks the most vulnerable and powerful computer on
the planet: the human mind,” Adam Kujawa, Director of Malwarebytes Labs .
• Phishing emails trick users into giving up sensitive information such as website login
credentials ,credit card information by way of social engineering and email spoofing.
• Spoofed emails mimic an email from a legitimate sender demanding some sort of
action.
• Common phishing ploys include:
• A request for payment of an outstanding invoice.
• A request to reset your password or verify your account.
• Verification of purchases you never made.
• A request for updated billing information.
• By tricking us into giving up valuable information, cybercriminals are able to hack the
online services we use.
Other Threats
Other Threats
• Some system administrators set up alerts to let them know when there is an
unauthorized access attempt, so that they may investigate the reason. These
alerts can help stop hackers from gaining access to a secure or confidential
system. Many secure systems may also lock an account that has had too many
failed login attempts.
Security Measures
Security Measures
• Firewalls
• Anti Virus
• Anti Spyware
• User Identification and Authentication
• Data Backup
• Human Aspects (Awareness)
• Electrical Protection
• Intrusion Detection Systems (IDS)
Control Measures
Control Measures
• Secure buy-in from Senior leadership. Balance security budget vs. amount of
risk your company executives are willing to assume.
• Monitor network traffic for suspicious activity – can you “see” in & outbound
encrypted messages?
• Upgrade and patch software immediately and promptly. This must be done
frequently as patches are released by the software vendor.
• Upgrade Authentication inside and out – including mobility & IoT policies.
• Harden external facing web applications.
• Know where sensitive data resides, then develop data protection
strategy to include encryption monitoring.
• Develop and implement real-time monitoring strategy and analysis of log
files and wire data.
• Implement rigorous application development testing and code reviews.
• Perform annual penetration assessments and vulnerability assessments.
• Prepare for the worst-case scenario. Develop emergency incident
response (IR) plans or Disaster recovery plans .
To protect against viruses, Trojans, worms, etc. an organization can use anti-virus software. In additional to
the anti-virus software, an organization can also have control measures on the usage of external storage
devices and visiting the website that is most likely to download unauthorized programs onto the user’s
computer.
Unauthorized access to computer system resources can be prevented by the use of authentication methods.
The authentication methods can be, in the form of user ids and strong passwords, smart cards or biometric,
etc.
Security Risk
Intrusion-detection/prevention Recommended
systems can be used to protect Security
against denial measure/
of service step
attacks.There are
other measures too that can be put in place to avoid denial of service attacks.
Malicious code (Virus , Worm, Trojan) Antivirus , Anti Spyware , Firewall, Human aspect
awareness
Unauthorized access and use Physical access control, human Aspect awareness
• Computer are the moral guide lines that govern the use of
computers and information systems
Areas to cover on Computer Ethics
Information Accuracy
Green Computing
Codes of Conduct
Information Privacy
Intellectual property
Unethical Activities involving Computers and
internet
• An IT code of conduct is a written guideline that helps determine whether a specific computer action is
ethical or unethical.
IT Code Of Conduct
1) Computers may not be used to harm other people
2) Employees may not interfere with others’ computer work .
3) Employees may not meddle in others’ computer files
4) Computers may not be used to steal
5) Computers may not be used to bear false witness.
6) Employees may not copy or use software illegally
7) Employees may not use others’ computer resources without authorization
8) Employees may not use others intellectual property as their own
9) Employees shall consider the social impact of programs and systems they design
10) Employees always should use the computers in a way that demonstrates consideration and respect
for fellow humans
Information Accuracy
• Information Accuracy is concerned with assuring the authenticity and fidelity of information,
identifying those responsible for the informational errors that harm people .
• Accuracy is to be ensuring that the information is correct and without any mistake.
Information accuracy is important because may the life of people depend in it like the
medical information at the hospitals, so the information must be accurate.
• If someone gave inaccurate information, it is difficult to find who made the mistake. There
are many reasons for inaccurate information. The most common case is when the user enter
wrong value. Also inaccurate information may accrue by typographical mistake. To avoid this
mistakes the organization must find who has experience and skills for data entry and it must
use the programs which discover the typographical mistake..
Information Privacy
• Information privacy refers to the right of the individuals and companies to deny or restrict the
collection and use of information about them .
• Huge databases store data online
• It is important to safeguard your information .
Information privacy relates to different data types, including:
• Internet privacy (online privacy): All personal data shared over the Internet is subject to privacy
issues. Most websites publish a privacy policy that details the website's intended use of collected online
and/or offline collected data.
• Financial privacy: Financial information is particularly sensitive, as it may easily used to commit
online and/or offline fraud.
• Medical privacy: All medical records are subject to stringent laws that address user access privileges.
By law, security and authentication systems are often required for individuals that process and store
medical records.
•
Intellectual Property
The Importance of IP
• to protect the original creation from individuals .
• To preserve features and process that make thing work (inventor will
therefore benefits –get a profit from their work).
Type Of Intellectual Property
• Green Computing involves reducing the electricity and environmental waste while using a computer.
• It is the Designing , Manufacturing and disposing of computers, servers with no impact on the environment
Green Computing Suggestions
1) Use computers and devices that comply with the energy Star programme
2) Do not leave the computer running overnight
3) Turn of the monitor, printer, and other devices when not in use
4) Use LCD monitors instead of CRT monitors
5) Use paperless methods to communicate
6) Recycle paper
7) Buy recycled paper
8) Recycle toner cartridges
9) Recycle old computers , printers and other devices
10) Use video conference and VoIP for meetings