Lecture 2
Lecture 2
■ Ethics
■ Code of Ethics
Fundamental Tenets of
Ethics
■ Responsibility
■ Accountability
■ Liability
Unethical vs.
Illegal
Ethics scenarios
The Four Categories of Ethical
Issues
■ Privacy Issues
■ Accuracy Issues
■ Property Issues
■ Accessibility Issues
Privacy Issues
WiGLE.ne t
Low
1980 2005
Wi-Fi at Starbucks
Key Information Security
Terms
■ Threat
■ Exposure
■ Vulnerability
■ Risk
■ Information system controls
Security Threats (Figure
3.1)
Categories of Threats to Information
Systems
■ Unintentional acts
■ Natural disasters
■ Technical failures
■ Management failures
■ Deliberate acts
(from Whitman and Mattord, 2003)
■ Human errors
■ Deviations in quality of service by service providers
(e.g., utilities)
■ Environmental hazards (e.g., dirt, dust, humidity)
Human
Errors
■ Tailgating
■ Shoulder surfing
■ Carelessness with laptops and portable
computing devices
■ Opening questionable e-mails
■ Careless Internet surfing
■ Poor password selection and use
■ And more
Anti-Tailgating
Door
Shoulder
Surfing
Most Dangerous
Employees
Human resources and MIS
View Source
Deliberate Acts
(continued)
■ Alien Software
■ Spyware (see video)
■ Spamware
■ Cookies
■ Cookie demo
Keystroke Logger
Plugs in
between
monitor and
computer
Example of
CAPTCHA
Deliberate Acts
(continued)
■ Supervisory control and data acquisition
(SCADA) attacks
Wireless sensor
What if a SCADA attack were
successful?
Northeastern
U.S. power
outage in 2003
Results of the power outage in
NYC
More results of power outage in
NYC
(Experiment
al) SCADA
Attack
Video of an experimental SCADA attack
that was successful
Example of Cyber
Warfare
There is
always
risk!
And then there is real
risk!
Risk
Management
■ Risk
■ Risk management
■ Risk analysis
■ Risk mitigation
Risk Mitigation
Strategies
■ Risk Acceptance
■ Risk limitation
■ Risk transference
Risk
Optimization
Control
s
■ Physical controls
■ Access controls
■ Communications (network) controls
■ Application controls
Where Defense
Mechanisms
(Controls) Are Located
Access
Controls
■ Authentication
■ Something the user is (biometrics powerpoints)
■ Video on biometrics
■ The latest biometric: gait recognition
■ The Raytheon Personal Identification Device
■ Something the user has
■ Something the user does
■ Something the user knows
■ passwords
■ passphrases
Access Controls
(continued)
■ Authorization
■ Privilege
■ Least privilege
Communication or Network
Controls
■ Firewalls
■ Anti-malware systems
■ Hot Site
■ Warm Site
■ Cold Site
Information Systems
Auditing