Intro To Info Security
Intro To Info Security
• Information accuracy
– Deals with authentication and fidelity of information
• Information property
– Deals with who owns information about individuals
and how information can be sold and exchanged
Information Systems Ethics
• Information accessibility
– Deals with what information a person has the right to
obtain about others and how the information can be used
• Issues in information accessibility
– Carnivore: software application designed to be connected
to Internet Service Providers’ computers and eavesdrops
on all communications.
– Electronic Communications Privacy Act (ECPA): it offered
stronger support for voice mail than it did for e-mail. No
other laws at federal or state levels protect e-mail privacy
– Monitoring e-mail
Information Systems Ethics
• The need for a code of ethical conduct
– Business ethics
– Plagiarism
– Cybersquatting: registering a domain name and
then trying to sell the name for big bucks to a
person, company. Domain names are a scarce
resource – one of the few scarce resources in
cyberspace
Computer Crime
• Definition: the act of using a computer to
commit an illegal act
– Authorized and unauthorized computer access
– Examples
• Stealing time on company computers
• Breaking into government Web sites
• Stealing credit card information
Crime
• Computers make crimes
– easier to commit
– more devastating
– harder to detect
– doable from long distances
The Extent of Cybercrime
• Not all cybercrime is committed for
financial gain
– Criminal mischief
• creating/transmitting malicious forms of
programming code
• Nonmalicious Hacking
• No harm is done
• Service - exposes security weaknesses
• Help create need for tougher security
• Information wants to be free
• Some companies are ripping us off
Fraud Holiday Fraud
Identity Theft Dating Fraud
Phishing Scams Bullying
Viruses Pension Fraud
Revenge Porn
Hacking
Online Hate Crime
Online Extremism
Grooming
Stalking Child Sexual
Exploitation
• Hactivism
– …is the use of hacking expertise to promote a
political cause.
• This kind of hacking can range from mild to destructive
activities.
• Some consider hactivism as modern-age civil
disobedience.
• Others believe hactivism denies others their freedom of
speech and violates property rights.
Q: What computer forensics tools or agencies have been in the news lately?
Hacking
• Security can be improved by:
• Ongoing education and training to recognize the
risks.
• Better system design.
• Use of security tools and systems.
• Challenging “others” to find flaws in systems.
• Writing and enforcing laws that don’t stymie
research and advancement.