INF1505 - Module 5 - Study notes
INF1505 - Module 5 - Study notes
Learning Objectives
After studying this module, you should be able to:
1. Explain cybercrime and its impact on the global economy.
2. Describe information technologies that could be used in computer crimes.
3. Describe basic safeguards in computer, network, and cyber security.
4. Identify the ten most common intentional security threats.
5. Describe the nine security measures and enforcement that a comprehensive security system
should include.
6. Summarize the guidelines for a comprehensive security system, including business continuity
planning.
Key Terms
Term Definition
Asymmetric Encryption Uses public and private keys for encryption and decryption.
Case Studies
Case Study 5-1: Vulnerabilities of Medical Devices
• Key Points:
• Connected medical devices (IoMT) are becoming targets for malware.
• Risks include altered medical records, exposure of sensitive patient data, and potential
harm to patients.
• Manufacturers must improve security features and coordinate with healthcare providers.
Case Study 5-2: Security Breach at Equifax
• Key Points:
• Hackers exploited a vulnerability in Apache Struts CVE-2017-5638.
• The breach impacted over 148 million people.
• Equifax failed to modernize its security system and address known vulnerabilities.
• Steps Taken: Hired a new chief information security officer and invested $200 million in
data security infrastructure.
Module Summary
1. Cybercrime Impact: Cybercrime will cost the global economy $10.5 trillion annually by 2025.
2. Information Technologies in Crimes: Examples include spyware, adware, phishing, pharming,
etc.
3. Basic Safeguards: Confidentiality, integrity, and availability (CIA triangle).
4. Common Security Threats: Viruses, worms, Trojan programs, logic bombs, backdoors, blended
threats, rootkits, DoS attacks, social engineering, cryptojacking.
5. Security Measures: Biometric, nonbiometric, physical security measures, access controls,
VPNs, data encryption, e-commerce transaction security, CERT, zero trust security.
6. Comprehensive Security Guidelines: Employee training, risk analysis, disaster recovery
planning.
Review Questions
1. What are six examples of information technologies that could be used in computer crimes?
• Spyware, adware, phishing, pharming, keystroke loggers, baiting.
2. What is the CIA triangle?
• Confidentiality, Integrity, Availability.
3. What are the three most common security threats?
• Viruses, worms, Trojan programs.
4. What are the three most common security measures?
• Firewalls, antivirus software, encryption.
5. What are 10 guidelines that should be included in a comprehensive security system?
• Develop clear security policies, post policies visibly, raise awareness, use strong
passwords, install updates, revoke terminated employees' access, keep sensitive data
secure, exit programs promptly, limit access, compare communication logs.
6. Explain business continuity planning.
• Outlines procedures to keep an organization operational after a disaster or network attack.
7. What are five examples of biometric security measures?
• Facial recognition, fingerprints, hand geometry, iris analysis, palm prints.
8. Define zero trust security. What are three of its principles?
• Zero trust security requires verification for every access attempt.
• Principles: Verify before access, least-privilege access, microsegmentation.
Projects
1. Create a one-page document for students to increase their security awareness.
2. Write a paper on three high-profile companies affected by security breaches.
3. Outline recommendations for dealing with Denial-of-Service (DoS) attacks.
4. Identify companies using biometric security measures and discuss their
advantages/disadvantages.
5. Offer recommendations for improving online transaction security.
Central Topic:
Protecting Information Resources
Main Branches:
1. Cybercrime and Its Impact
• Costs to Global Economy
• $10.5 trillion annually by 2025
• Loss of revenue (identity theft, intellectual property)
• Damage to reputations
• Job losses due to stolen trade secrets
• Examples of Cybercrime
• Spyware, Adware, Phishing, Pharming, Baiting, Quid Pro Quo
• Ransomware, Cryptojacking
2. Security Threats
• Intentional Threats
• Viruses, Worms, Trojan Programs
• Logic Bombs, Backdoors, Blended Threats
• Rootkits, Denial-of-Service (DoS) Attacks
• Social Engineering, Cryptojacking
• Unintentional Threats
• Natural Disasters, Accidental Data Deletion
• Structural Failures
3. Basic Safeguards
• CIA Triangle
• Confidentiality: Prevent unauthorized access
• Integrity: Ensure data accuracy
• Availability: Ensure system accessibility
• Three Levels of Security
• Level 1: Front-end servers (e.g., email, web servers)
• Level 2: Back-end systems (e.g., internal databases)
• Level 3: Corporate network protection
4. Security Measures
• Biometric Security Measures
• Facial Recognition, Fingerprints, Hand Geometry
• Iris Analysis, Palm Prints, Retinal Scanning
• Signature Analysis, Vein Analysis, Voice Recognition
• Nonbiometric Security Measures
• Callback Modems, Firewalls, Intrusion Detection Systems (IDS)
• Physical Security Measures
• Cable Shielding, Corner Bolts, Electronic Trackers
• ID Badges, Proximity Release Door Openers, Room Shielding
• Access Controls
• Strong Passwords, Terminal Resource Security
• Virtual Private Networks (VPNs)
• Secure "tunnels" through the Internet
• Data Encryption
• Symmetric vs. Asymmetric Encryption
• E-commerce Transaction Security
• Authentication, Confirmation, Nonrepudiation
• Computer Emergency Response Team (CERT)
• Handles network intrusions and attacks
• Zero Trust Security
• Verify before access, Least-privilege access, Microsegmentation
5. Guidelines for Comprehensive Security
• Employee Training
• Awareness programs, Certifications
• Risk Analysis
• Identify critical resources, Financial techniques (ROI)
• Disaster Recovery Plan (DRP)
• Backup files, Test recovery plans, Set up alternative sites
• Business Continuity Planning
• Procedures to keep operations running during disasters
6. Key Concepts
• Confidentiality
• Protect sensitive information
• Integrity
• Ensure data accuracy and prevent tampering
• Availability
• Ensure systems are operational and accessible
• Fault-Tolerant Systems
• UPS, RAID, Mirror Disks
• McCumber Cube
• Evaluates information security across states (Transmission, Storage, Processing)
7. Real-World Applications
• Case Study: Vulnerabilities of Medical Devices
• IoMT devices at risk (e.g., pacemakers, X-ray machines)
• Risks: Malware, Unauthorized access, Altered medical records
• Recommendations: Regular updates, Block Internet access
• Case Study: Security Breach at Equifax
• Exploited Apache Struts CVE-2017-5638 vulnerability
• Lessons: Modernize security systems, Segment databases
8. Future Trends
• Replacing Passwords
• Biometrics, Zero Login, Brain Passwords, DNA Identification
• Emerging Technologies
• Authentication Tokens, Implanted Microchips
Module 4 – INF1505
What are three examples of unintentional security Examples include accidental data deletion,
threats? structural failures, and natural disasters like
floods or earthquakes.