Computer & Internet Crime: KT44103 Ethics and Law in ICT Sem 1: 2021/2020
Computer & Internet Crime: KT44103 Ethics and Law in ICT Sem 1: 2021/2020
KT44103
Ethics and Law in ICT
Sem 1: 2021/2020
1 November 2021
Contents
Virus
Worm
Trojan horse
Distributed denial of service
Rootkit
Spam
Phishing & pharming
Viruses
Harmful programs
Reside in active memory of a computer
Duplicate themselves
Can propagate without human intervention
Negative impact of worm attack
Lost data and programs
Lost productivity
Additional effort for IT workers
Trojan Horses
Phishing
Act of using email fraudulently to try to get the recipient to
reveal personal data
Legitimate looking emails lead users to counterfeit Web sites
Spear-phishing (Fraudulent emails to an organization’s employees)
Smishing (via text messages)
Vishing (via voice mail messages)
Pharming – attack intended to redirect a website’s traffic to
another, fake site by installing a malicious program on
computer
Types of Perpetrators
Perpetrators include:
Thrill seekers wanting a challenge
Common criminals looking for financial gain
Industrial spies trying to gain an advantage
Terrorists seeking to cause destruction
Different objectives and access to varying resources
Willing to take different levels of risk to accomplish an
objective
Types of Perpetrators
Hackers & Crackers
Hackers
Test limitations of systems out of intellectual curiosity
Some smart and talented
Others inept; termed “lamers” or “script kiddies”
Crackers
Cracking is a form of hacking
Clearly criminal activity
Malicious Insiders
Hacktivism
Hacking to achieve a political or social goal
Cyberterrorist
Attacks computers or networks in an attempt to
intimidate or coerce a government in order to advance
certain political or social objectives
Seeks to cause harm rather than gather information
Uses techniques that destroy or disrupt services
Implementing Trustworthy Computing
Trustworthy computing
Delivers secure, private, and reliable computing
Based on sound business practices
Plan and Prevention
Risk Assessment
Process of assessing security-related risks
Identify investments that best protect from most likely and serious
threats
Focus security efforts on areas of highest payoff
Establishing a Security Policy – defines organization’s security
requirements, and controls & sanctions needed to meet
requirements
Delineates responsible & expected behavior
Outlines what needs to be done
Written policies
Plan and Prevention
Prevention
Implement a layered security solution
Make computer break ins harder
Installing a corporate firewall
Limits network access
Intrusion prevention systems
Block viruses, malformed packets, and other threats
Installing antivirus software
Scans for sequence of bytes or virus signature
Plan and Prevention
Detection
Detection systems
Catch intruders in the act
Instruction detection system
Monitors system/networks resource and activities
Notifies the proper authority when identifies:
Possible instructions
Misues from within organization
Knowledge and behavior –based approach
Plan and Prevention
Response
Response plan (in advance –approved by legal and management)
Primary goal : Regain control and limit damage
Incident notification (who to notify and not to notify)
Document all details of a security incident
Act quality to contain attack
Eradication effort (collect, verify necessary backups and create new backups)
Follow-up
Review
Weight carefully the amount of effort required to capture the perpetrator
Consider the potential for negative publicity
Legal precedent
Computer Forensics