SlideShare a Scribd company logo
1 of 21
COMPUTER AND NETWORK
SECURITY
7.1 INTRODUCTION
• COMPUTERS GETTING FASTER AND LESS EXPENSIVE
• UTILITY OF NETWORKED COMPUTERS INCREASING
• SHOPPING AND BANKING
• MANAGING PERSONAL INFORMATION
• CONTROLLING INDUSTRIAL PROCESSES
• INCREASING USE OF COMPUTERS  GROWING IMPORTANCE OF COMPUTER
SECURITY
HACKERS AND ATTACKERS
• ORIGINAL MEANING OF HACKER: EXPLORER, RISK TAKER, SYSTEM
INNOVATOR
• MIT’S TECH MODEL RAILROAD CLUB IN 1950S
• MODERN MEANING OF HACKER ATTACKER: SOMEONE WHO GAINS
UNAUTHORIZED ACCESS TO COMPUTERS AND COMPUTER NETWORKS
TYPES OF ATTACKS
MALWARE
• MALICIOUS SOFTWARE
• PROGRAMS OR SCRIPTS USED TO:
• INTERCEPT DATA
• STEAL INFORMATION
• LAUNCH OTHER ATTACKS
• DAMAGE A COMPUTER
• MALWARE ATTACKS OCCUR AT AN ORGANIZATION
ONCE EVERY 3 MINUTES
SOCIAL ENGINEERING
• PSYCHOLOGICAL ATTACKING
• NON-TECHNICAL METHOD OF INTRUSION THAT
RELIES ON:
• HUMAN INTERACTION
• TRICKERY
• MANIPULATION
• EXPLOITING THE WEAKEST LINK IN THE CHAIN
SOCIAL ENGINEERING
AWARENESS
COMPUTER FRAUD AND ABUSE ACT
• CRIMINALIZES WIDE VARIETY OF HACKER-RELATED ACTIVITIES
• TRANSMITTING CODE THAT DAMAGES A COMPUTER
• ACCESSING ANY INTERNET-CONNECTED COMPUTER WITHOUT AUTHORIZATION
• TRANSMITTING CLASSIFIED GOVERNMENT INFORMATION
• TRAFFICKING IN COMPUTER PASSWORDS
• COMPUTER FRAUD
• COMPUTER EXTORTION
• MAXIMUM PENALTY: 20 YEARS IN PRISON AND $250,000 FINE
CASE STUDY: FIRESHEEP
• OCTOBER 2010: ERIC BUTLER RELEASED FIRESHEEP EXTENSION TO FIREFOX
BROWSER
• FIRESHEEP MADE IT POSSIBLE FOR ORDINARY COMPUTER USERS TO EASILY
SIDEJACK WEB SESSIONS
• MORE THAN 500,000 DOWNLOADS IN FIRST WEEK
• ATTRACTED GREAT DEAL OF MEDIA ATTENTION
• EARLY 2011: FACEBOOK AND TWITTER ANNOUNCED OPTIONS TO USE THEIR
SITES SECURELY
1-8
ACT UTILITARIAN ANALYSIS
• RELEASE OF FIRESHEEP LED MEDIA TO FOCUS ON SECURITY PROBLEM
• BENEFITS WERE HIGH: A FEW MONTHS LATER FACEBOOK AND TWITTER
MADE THEIR SITES MORE SECURE
• HARMS WERE MINIMAL: NO EVIDENCE THAT RELEASE OF FIRESHEEP CAUSED
BIG INCREASE IN IDENTITY THEFT OR MALICIOUS PRANKS
• CONCLUSION: RELEASE OF FIRESHEEP WAS GOOD
VIRTUE ETHICS ANALYSIS
• BY RELEASING FIRESHEEP, BUTLER HELPED PUBLIC UNDERSTAND
LACK OF SECURITY ON UNENCRYPTED WIRELESS NETWORKS
• BUTLER’S STATEMENTS CHARACTERISTIC OF SOMEONE INTERESTED
IN PROTECTING PRIVACY
• BUTLER DEMONSTRATED COURAGE BY TAKING RESPONSIBILITY FOR
THE PROGRAM
• BUTLER DEMONSTRATED BENEVOLENCE BY MAKING PROGRAM
FREELY AVAILABLE
• HIS ACTIONS AND STATEMENTS WERE CHARACTERISTIC OF
SOMEONE INTERESTED IN THE PUBLIC GOOD
KANTIAN ANALYSIS
• ACCESSING SOMEONE ELSE’S USER ACCOUNT IS AN INVASION OF
THEIR PRIVACY AND IS WRONG
• BUTLER PROVIDED A TOOL THAT MADE IT MUCH SIMPLER FOR
PEOPLE TO DO SOMETHING THAT IS WRONG, SO HE HAS SOME
MORAL ACCOUNTABILITY FOR THEIR MISDEEDS
• BUTLER WAS WILLING TO TOLERATE SHORT-TERM INCREASE IN
PRIVACY VIOLATIONS IN HOPE THAT MEDIA PRESSURE WOULD
FORCE WEB RETAILERS TO ADD SECURITY
• HE TREATED VICTIMS OF FIRESHEEP AS A MEANS TO HIS END
• IT WAS WRONG FOR BUTLER TO RELEASE FIRESHEEP
MALWARE
• THERE IS NO STANDARDIZED CLASSIFICATION OF MALWARE BUT ONE WAY IS BY PRIMARY TRAITS.
• HOW IT CIRCULATES TO OTHER NETWORKS
• EMAIL, STORAGE PERIPHERALS, PHYSICAL CONNECTIONS
• HOW IT INFECTS FILES/MACHINES
• MEMORY, AUTO RUN SCRIPTS, EXE, PARASITE VS. SYMBIOTE
• HOW IT CONCEALS ITSELF
• MUTATE(DISCUSS MORE LATER)
• THE CAPABILITIES OF ITS PAYLOAD
• WHAT DOES IT DO? & WHY DOES IT DO IT?
• THIS IS ENDLESS – STEAL PASSWORDS, DELETE FILES, CORRUPT DATA, ETC.
TYPES OF MALWARE
Question Virus Worm Trojan
What is it? Malicious computer code
that replicates without
human intervention
Malicious program that
uses a computer network to
replicate
Program that masquerades
as a benign activity that
delivers something
malicious
How does it circulate? Files Network Files
User action to circulate? Transmit infected file to a
secondary party
None Transmit infected file to a
secondary party
How does it infect? When app is executed it
replicates in a new file and
delivers payload.
Vulnerability in application When app is executed it
delivers payload.
THE INTERNET WORM
• ROBERT TAPPAN MORRIS, JR.
• GRADUATE STUDENT AT CORNELL
• RELEASED WORM ONTO INTERNET FROM MIT COMPUTER
• EFFECT OF WORM
• SPREAD TO SIGNIFICANT NUMBERS OF UNIX COMPUTERS
• INFECTED COMPUTERS KEPT CRASHING OR BECAME UNRESPONSIVE
• TOOK A DAY FOR FIXES TO BE PUBLISHED
• IMPACT ON MORRIS
• SUSPENDED FROM CORNELL
• 3 YEARS’ PROBATION + 400 HOURS COMMUNITY SERVICE
• $150,000 IN LEGAL FEES AND FINES
ETHICAL EVALUATION
• KANTIAN EVALUATION
• MORRIS USED OTHERS BY GAINING ACCESS TO THEIR COMPUTERS WITHOUT
PERMISSION
• SOCIAL CONTRACT THEORY EVALUATION
• MORRIS VIOLATED PROPERTY RIGHTS OF ORGANIZATIONS
• UTILITARIAN EVALUATION
• BENEFITS: ORGANIZATIONS LEARNED OF SECURITY FLAWS
• HARMS: TIME SPENT BY THOSE FIGHTING WORM, UNAVAILABLE COMPUTERS,
DISRUPTED NETWORK TRAFFIC, MORRIS’S PUNISHMENTS
• VIRTUE ETHICS EVALUATION
• MORRIS SELFISHLY USED INTERNET AS EXPERIMENTAL LAB
• HE DECEITFULLY RELEASED WORM FROM MIT INSTEAD OF CORNELL
• HE AVOIDED TAKING RESPONSIBILITY FOR HIS ACTIONS
• MORRIS WAS WRONG TO HAVE RELEASED THE INTERNET WORM
ANTIVIRUS SOFTWARE PACKAGES
• ALLOW COMPUTER USERS TO DETECT AND DESTROY VIRUSES
• MUST BE KEPT UP-TO-DATE TO BE MOST EFFECTIVE
• MANY PEOPLE DO NOT KEEP THEIR ANTIVIRUS SOFTWARE PACKAGES UP-TO-DATE
• CONSUMERS NEED TO BEWARE OF FAKE ANTIVIRUS APPLICATIONS
DEFENSIVE MEASURES
• SECURITY PATCHES: CODE UPDATES TO REMOVE SECURITY
VULNERABILITIES
• ANTI-MALWARE TOOLS: SOFTWARE TO SCAN HARD DRIVES, DETECT
FILES THAT CONTAIN VIRUSES OR SPYWARE, AND DELETE THESE FILES
• FIREWALL: A SOFTWARE APPLICATION INSTALLED ON A SINGLE
COMPUTER THAT CAN SELECTIVELY BLOCK NETWORK TRAFFIC TO AND
FROM THAT COMPUTER
TYPES OF ATTACKERS
• CYBER TERRORISTS
• CYBERTERRORISM- PREMEDITATED, POLITICALLY MOTIVATED ATTACKS
• DESIGNED TO:
• CAUSE PANIC
• PROVOKE VIOLENCE
• RESULT IN FINANCIAL CATASTROPHE
• CYBER CRIMINALS
• INDIVIDUALS WHO LAUNCH ATTACKS AGAINST OTHER USERS AND THEIR COMPUTERS
• A LOOSE NETWORK OF ATTACKERS, IDENTITY THIEVES, AND FINANCIAL FRAUDSTERS WHO ARE HIGHLY MOTIVATED,
LESS RISK-AVERSE, WELL-FUNDED, AND TENACIOUS
• INSTEAD OF ATTACKING A COMPUTER TO SHOW OFF THEIR TECHNOLOGY SKILLS (FAME), CYBERCRIMINALS HAVE A
MORE FOCUSED GOAL OF FINANCIAL GAIN (FORTUNE): CYBERCRIMINALS STEAL INFORMATION OR LAUNCH ATTACKS
TO GENERATE INCOME
• ATTACKERS
• A PERSON WHO USES ADVANCED COMPUTER SKILLS TO ATTACK COMPUTERS
STUXNET WORM (2009)
• ATTACKED SCADA SYSTEMS RUNNING SIEMENS SOFTWARE
• TARGETED FIVE INDUSTRIAL FACILITIES IN IRAN THAT WERE USING CENTRIFUGES TO ENRICH
URANIUM
• CAUSED TEMPORARY SHUTDOWN OF IRAN’S NUCLEAR PROGRAM
• WORM MAY HAVE BEEN CREATED BY ISRAELI DEFENSE FORCES
CYBER ESPIONAGE ATTRIBUTED TO PEOPLE’S
LIBERATION ARMY
• HUNDREDS OF COMPUTER SECURITY BREACHES IN MORE THAN A DOZEN
COUNTRIES INVESTIGATED BY MANDIANT
• HUNDREDS OF TERABYTES OF DATA STOLEN
• MANDIANT BLAMED UNIT 61398 OF THE PEOPLE’S LIBERATION ARMY
• CHINA’S FOREIGN MINISTRY STATED THAT ACCUSATION WAS GROUNDLESS
AND IRRESPONSIBLE
ANONYMOUS
• ANONYMOUS: LOOSELY ORGANIZED INTERNATIONAL MOVEMENT
OF HACKTIVISTS (HACKERS WITH A SOCIAL OR POLITICAL CAUSE)
• VARIOUS DDOS ATTACKS ATTRIBUTED TO ANONYMOUS MEMBERS
Year Victim Reason
2008 Church of Scientology Attempted suppression of Tom Cruise
interview
2009 RIAA, MPAA RIAA, MPAA’s attempt to take down the
Pirate Bay
2009 PayPal, VISA,
MasterCard
Financial organizations freezing funds
flowing to Julian Assange of WikiLeaks
2012 U.S. Dept. of Justice,
RIAA, MPAA
U.S. Dept. of Justice action against
Megaupload

More Related Content

What's hot

TYPES OF HACKING
TYPES OF HACKINGTYPES OF HACKING
TYPES OF HACKINGSHERALI445
 
Plc and scada project ppt
Plc and scada project pptPlc and scada project ppt
Plc and scada project pptPriya Hada
 
Data Logging
Data LoggingData Logging
Data Loggingdjastall
 
register file structure of PIC controller
register file structure of PIC controllerregister file structure of PIC controller
register file structure of PIC controllerNirbhay Singh
 
Presentation on cyber crime
Presentation on cyber crimePresentation on cyber crime
Presentation on cyber crimePsychoticBanda
 
programmable logic controller presentation
programmable logic controller presentationprogrammable logic controller presentation
programmable logic controller presentationAshutosh Verma
 
Plc presentation
Plc presentationPlc presentation
Plc presentationAkshay Modi
 
Programmable Logic Controller
Programmable Logic ControllerProgrammable Logic Controller
Programmable Logic ControllerHimshekhar Das
 
Automated Traffic Light control using 8051 microcontroller
Automated Traffic Light control using 8051 microcontrollerAutomated Traffic Light control using 8051 microcontroller
Automated Traffic Light control using 8051 microcontrollerVijayMaheshwari12
 
Cybercrime Awareness
Cybercrime AwarenessCybercrime Awareness
Cybercrime AwarenessSibesh Singh
 
Analysis of-credit-card-fault-detection
Analysis of-credit-card-fault-detectionAnalysis of-credit-card-fault-detection
Analysis of-credit-card-fault-detectionJustluk Luk
 
INTRODUCTION TO MICROCONTROLLER
INTRODUCTION TO MICROCONTROLLERINTRODUCTION TO MICROCONTROLLER
INTRODUCTION TO MICROCONTROLLERAnkita Jaiswal
 
Data Flow Diagram - Level 0.pdf
Data Flow Diagram - Level 0.pdfData Flow Diagram - Level 0.pdf
Data Flow Diagram - Level 0.pdfAbhasAbhirup
 
"Automatic Intelligent Plant Irrigation System using Arduino and GSM board"
"Automatic Intelligent Plant Irrigation System using Arduino and GSM board""Automatic Intelligent Plant Irrigation System using Arduino and GSM board"
"Automatic Intelligent Plant Irrigation System using Arduino and GSM board"Disha Modi
 
CNE Microproject Report.pdf
CNE Microproject Report.pdfCNE Microproject Report.pdf
CNE Microproject Report.pdfNehaam3
 
AUTOMATIC IRRIGATION SYSTEM
AUTOMATIC IRRIGATION SYSTEMAUTOMATIC IRRIGATION SYSTEM
AUTOMATIC IRRIGATION SYSTEMAJAL A J
 

What's hot (20)

TYPES OF HACKING
TYPES OF HACKINGTYPES OF HACKING
TYPES OF HACKING
 
Plc and scada project ppt
Plc and scada project pptPlc and scada project ppt
Plc and scada project ppt
 
Data Logging
Data LoggingData Logging
Data Logging
 
register file structure of PIC controller
register file structure of PIC controllerregister file structure of PIC controller
register file structure of PIC controller
 
Ccp
CcpCcp
Ccp
 
Presentation on cyber crime
Presentation on cyber crimePresentation on cyber crime
Presentation on cyber crime
 
programmable logic controller presentation
programmable logic controller presentationprogrammable logic controller presentation
programmable logic controller presentation
 
Embedded System
Embedded System Embedded System
Embedded System
 
Plc presentation
Plc presentationPlc presentation
Plc presentation
 
Programmable Logic Controller
Programmable Logic ControllerProgrammable Logic Controller
Programmable Logic Controller
 
Industrial Automation
Industrial AutomationIndustrial Automation
Industrial Automation
 
Cybercrime ppt competition
Cybercrime ppt competitionCybercrime ppt competition
Cybercrime ppt competition
 
Automated Traffic Light control using 8051 microcontroller
Automated Traffic Light control using 8051 microcontrollerAutomated Traffic Light control using 8051 microcontroller
Automated Traffic Light control using 8051 microcontroller
 
Cybercrime Awareness
Cybercrime AwarenessCybercrime Awareness
Cybercrime Awareness
 
Analysis of-credit-card-fault-detection
Analysis of-credit-card-fault-detectionAnalysis of-credit-card-fault-detection
Analysis of-credit-card-fault-detection
 
INTRODUCTION TO MICROCONTROLLER
INTRODUCTION TO MICROCONTROLLERINTRODUCTION TO MICROCONTROLLER
INTRODUCTION TO MICROCONTROLLER
 
Data Flow Diagram - Level 0.pdf
Data Flow Diagram - Level 0.pdfData Flow Diagram - Level 0.pdf
Data Flow Diagram - Level 0.pdf
 
"Automatic Intelligent Plant Irrigation System using Arduino and GSM board"
"Automatic Intelligent Plant Irrigation System using Arduino and GSM board""Automatic Intelligent Plant Irrigation System using Arduino and GSM board"
"Automatic Intelligent Plant Irrigation System using Arduino and GSM board"
 
CNE Microproject Report.pdf
CNE Microproject Report.pdfCNE Microproject Report.pdf
CNE Microproject Report.pdf
 
AUTOMATIC IRRIGATION SYSTEM
AUTOMATIC IRRIGATION SYSTEMAUTOMATIC IRRIGATION SYSTEM
AUTOMATIC IRRIGATION SYSTEM
 

Viewers also liked

Key management and distribution
Key management and distributionKey management and distribution
Key management and distributionRiya Choudhary
 
Anton Chuvakin on Honeypots
Anton Chuvakin on HoneypotsAnton Chuvakin on Honeypots
Anton Chuvakin on HoneypotsAnton Chuvakin
 
Intrusion Detection System
Intrusion Detection SystemIntrusion Detection System
Intrusion Detection SystemDevil's Cafe
 
Essential Guide to Protect Your Data [Key Management Techniques]
Essential Guide to Protect Your Data [Key Management Techniques]Essential Guide to Protect Your Data [Key Management Techniques]
Essential Guide to Protect Your Data [Key Management Techniques]SISA Information Security Pvt.Ltd
 
Industrial Training - Network Intrusion Detection System Using Snort
Industrial Training - Network Intrusion Detection System Using SnortIndustrial Training - Network Intrusion Detection System Using Snort
Industrial Training - Network Intrusion Detection System Using SnortDisha Bedi
 
Improving intrusion detection system by honeypot
Improving intrusion detection system by honeypotImproving intrusion detection system by honeypot
Improving intrusion detection system by honeypotmmubashirkhan
 
Futurex Secure Key Injection Solution
Futurex Secure Key Injection SolutionFuturex Secure Key Injection Solution
Futurex Secure Key Injection SolutionGreg Stone
 
Network Intrusion Detection System Using Snort
Network Intrusion Detection System Using SnortNetwork Intrusion Detection System Using Snort
Network Intrusion Detection System Using SnortDisha Bedi
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detectionUmesh Dhital
 
Intrusion Detection System(IDS)
Intrusion Detection System(IDS)Intrusion Detection System(IDS)
Intrusion Detection System(IDS)shraddha_b
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection systemAparna Bhadran
 

Viewers also liked (20)

Snort ppt
Snort pptSnort ppt
Snort ppt
 
Key management and distribution
Key management and distributionKey management and distribution
Key management and distribution
 
Anton Chuvakin on Honeypots
Anton Chuvakin on HoneypotsAnton Chuvakin on Honeypots
Anton Chuvakin on Honeypots
 
Hcl
HclHcl
Hcl
 
Intrusion Detection System
Intrusion Detection SystemIntrusion Detection System
Intrusion Detection System
 
Essential Guide to Protect Your Data [Key Management Techniques]
Essential Guide to Protect Your Data [Key Management Techniques]Essential Guide to Protect Your Data [Key Management Techniques]
Essential Guide to Protect Your Data [Key Management Techniques]
 
Wireshark Basics
Wireshark BasicsWireshark Basics
Wireshark Basics
 
Industrial Training - Network Intrusion Detection System Using Snort
Industrial Training - Network Intrusion Detection System Using SnortIndustrial Training - Network Intrusion Detection System Using Snort
Industrial Training - Network Intrusion Detection System Using Snort
 
Snort
SnortSnort
Snort
 
Snort IDS/IPS Basics
Snort IDS/IPS BasicsSnort IDS/IPS Basics
Snort IDS/IPS Basics
 
Key management
Key managementKey management
Key management
 
Database Firewall with Snort
Database Firewall with SnortDatabase Firewall with Snort
Database Firewall with Snort
 
Improving intrusion detection system by honeypot
Improving intrusion detection system by honeypotImproving intrusion detection system by honeypot
Improving intrusion detection system by honeypot
 
Intrusion Prevention System
Intrusion Prevention SystemIntrusion Prevention System
Intrusion Prevention System
 
Futurex Secure Key Injection Solution
Futurex Secure Key Injection SolutionFuturex Secure Key Injection Solution
Futurex Secure Key Injection Solution
 
Network Intrusion Detection System Using Snort
Network Intrusion Detection System Using SnortNetwork Intrusion Detection System Using Snort
Network Intrusion Detection System Using Snort
 
Wireshark
WiresharkWireshark
Wireshark
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
 
Intrusion Detection System(IDS)
Intrusion Detection System(IDS)Intrusion Detection System(IDS)
Intrusion Detection System(IDS)
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
 

Similar to Computer and Network Security

2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer CrimesRaffa Learning Community
 
2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer CrimesRaffa Learning Community
 
Cyber security review paper
Cyber security review paperCyber security review paper
Cyber security review paperMaheshSwami19
 
7 mike-steenberg-carlos-lopera-us-bank
7 mike-steenberg-carlos-lopera-us-bank7 mike-steenberg-carlos-lopera-us-bank
7 mike-steenberg-carlos-lopera-us-bankshreemala1
 
G0321 lecture 4 the digital age and social media
G0321 lecture 4 the digital age and social mediaG0321 lecture 4 the digital age and social media
G0321 lecture 4 the digital age and social mediaKelvin Ooi
 
Introduction to ethics
Introduction to ethicsIntroduction to ethics
Introduction to ethicsSaqib Raza
 
Cybercrime
CybercrimeCybercrime
CybercrimeSERCOD
 
Cyber security by Gaurav Singh
Cyber security by Gaurav SinghCyber security by Gaurav Singh
Cyber security by Gaurav SinghGaurav Singh
 
Insurance Cyber Risks Presentation
Insurance  Cyber Risks PresentationInsurance  Cyber Risks Presentation
Insurance Cyber Risks PresentationNeville Cartwright
 
Echo p.410 422 ch 10, irina
Echo p.410 422 ch 10, irinaEcho p.410 422 ch 10, irina
Echo p.410 422 ch 10, irinamisecho
 
Chapter 10, part 2
Chapter 10, part 2Chapter 10, part 2
Chapter 10, part 2misecho
 
Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...Chuck Brooks
 

Similar to Computer and Network Security (20)

CYBERSECURITY.pptx
CYBERSECURITY.pptxCYBERSECURITY.pptx
CYBERSECURITY.pptx
 
CYBERSECURITY
CYBERSECURITYCYBERSECURITY
CYBERSECURITY
 
2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes
 
2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes
 
Cyber security review paper
Cyber security review paperCyber security review paper
Cyber security review paper
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
7 mike-steenberg-carlos-lopera-us-bank
7 mike-steenberg-carlos-lopera-us-bank7 mike-steenberg-carlos-lopera-us-bank
7 mike-steenberg-carlos-lopera-us-bank
 
Hacking
HackingHacking
Hacking
 
Cyber Threats to Human Rights
Cyber Threats to Human RightsCyber Threats to Human Rights
Cyber Threats to Human Rights
 
G0321 lecture 4 the digital age and social media
G0321 lecture 4 the digital age and social mediaG0321 lecture 4 the digital age and social media
G0321 lecture 4 the digital age and social media
 
Introduction to ethics
Introduction to ethicsIntroduction to ethics
Introduction to ethics
 
Social engineering
Social engineering Social engineering
Social engineering
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber security by Gaurav Singh
Cyber security by Gaurav SinghCyber security by Gaurav Singh
Cyber security by Gaurav Singh
 
Insurance Cyber Risks Presentation
Insurance  Cyber Risks PresentationInsurance  Cyber Risks Presentation
Insurance Cyber Risks Presentation
 
Echo p.410 422 ch 10, irina
Echo p.410 422 ch 10, irinaEcho p.410 422 ch 10, irina
Echo p.410 422 ch 10, irina
 
Chapter 10, part 2
Chapter 10, part 2Chapter 10, part 2
Chapter 10, part 2
 
Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...
 

More from primeteacher32

More from primeteacher32 (20)

Software Development Life Cycle
Software Development Life CycleSoftware Development Life Cycle
Software Development Life Cycle
 
Variable Scope
Variable ScopeVariable Scope
Variable Scope
 
Returning Data
Returning DataReturning Data
Returning Data
 
Intro to Functions
Intro to FunctionsIntro to Functions
Intro to Functions
 
Introduction to GUIs with guizero
Introduction to GUIs with guizeroIntroduction to GUIs with guizero
Introduction to GUIs with guizero
 
Function Parameters
Function ParametersFunction Parameters
Function Parameters
 
Nested Loops
Nested LoopsNested Loops
Nested Loops
 
Conditional Loops
Conditional LoopsConditional Loops
Conditional Loops
 
Introduction to Repetition Structures
Introduction to Repetition StructuresIntroduction to Repetition Structures
Introduction to Repetition Structures
 
Input Validation
Input ValidationInput Validation
Input Validation
 
Windows File Systems
Windows File SystemsWindows File Systems
Windows File Systems
 
Nesting Conditionals
Nesting ConditionalsNesting Conditionals
Nesting Conditionals
 
Conditionals
ConditionalsConditionals
Conditionals
 
Intro to Python with GPIO
Intro to Python with GPIOIntro to Python with GPIO
Intro to Python with GPIO
 
Variables and Statements
Variables and StatementsVariables and Statements
Variables and Statements
 
Variables and User Input
Variables and User InputVariables and User Input
Variables and User Input
 
Intro to Python
Intro to PythonIntro to Python
Intro to Python
 
Raspberry Pi
Raspberry PiRaspberry Pi
Raspberry Pi
 
Hardware vs. Software Presentations
Hardware vs. Software PresentationsHardware vs. Software Presentations
Hardware vs. Software Presentations
 
Block chain security
Block chain securityBlock chain security
Block chain security
 

Recently uploaded

Gray Gold Clean CV Resume2024tod (1).pdf
Gray Gold Clean CV Resume2024tod (1).pdfGray Gold Clean CV Resume2024tod (1).pdf
Gray Gold Clean CV Resume2024tod (1).pdfpadillaangelina0023
 
定制(Waikato毕业证书)新西兰怀卡托大学毕业证成绩单原版一比一
定制(Waikato毕业证书)新西兰怀卡托大学毕业证成绩单原版一比一定制(Waikato毕业证书)新西兰怀卡托大学毕业证成绩单原版一比一
定制(Waikato毕业证书)新西兰怀卡托大学毕业证成绩单原版一比一Fs
 
如何办理(UCI毕业证)加州大学欧文分校毕业证毕业证成绩单原版一比一
如何办理(UCI毕业证)加州大学欧文分校毕业证毕业证成绩单原版一比一如何办理(UCI毕业证)加州大学欧文分校毕业证毕业证成绩单原版一比一
如何办理(UCI毕业证)加州大学欧文分校毕业证毕业证成绩单原版一比一ypfy7p5ld
 
Outsmarting the Attackers A Deep Dive into Threat Intelligence.docx
Outsmarting the Attackers A Deep Dive into Threat Intelligence.docxOutsmarting the Attackers A Deep Dive into Threat Intelligence.docx
Outsmarting the Attackers A Deep Dive into Threat Intelligence.docxmanas23pgdm157
 
Ioannis Tzachristas Self-Presentation for MBA.pdf
Ioannis Tzachristas Self-Presentation for MBA.pdfIoannis Tzachristas Self-Presentation for MBA.pdf
Ioannis Tzachristas Self-Presentation for MBA.pdfjtzach
 
8377877756 Full Enjoy @24/7 Call Girls in Pitampura Delhi NCR
8377877756 Full Enjoy @24/7 Call Girls in Pitampura Delhi NCR8377877756 Full Enjoy @24/7 Call Girls in Pitampura Delhi NCR
8377877756 Full Enjoy @24/7 Call Girls in Pitampura Delhi NCRdollysharma2066
 
Escorts Service Near Surya International Hotel, New Delhi |9873777170| Find H...
Escorts Service Near Surya International Hotel, New Delhi |9873777170| Find H...Escorts Service Near Surya International Hotel, New Delhi |9873777170| Find H...
Escorts Service Near Surya International Hotel, New Delhi |9873777170| Find H...nitagrag2
 
Drawing animals and props.pptxDrawing animals and props.pptxDrawing animals a...
Drawing animals and props.pptxDrawing animals and props.pptxDrawing animals a...Drawing animals and props.pptxDrawing animals and props.pptxDrawing animals a...
Drawing animals and props.pptxDrawing animals and props.pptxDrawing animals a...RegineManuel2
 
定制(UOIT学位证)加拿大安大略理工大学毕业证成绩单原版一比一
 定制(UOIT学位证)加拿大安大略理工大学毕业证成绩单原版一比一 定制(UOIT学位证)加拿大安大略理工大学毕业证成绩单原版一比一
定制(UOIT学位证)加拿大安大略理工大学毕业证成绩单原版一比一Fs sss
 
VIP Call Girls Service Saharanpur Aishwarya 8250192130 Independent Escort Ser...
VIP Call Girls Service Saharanpur Aishwarya 8250192130 Independent Escort Ser...VIP Call Girls Service Saharanpur Aishwarya 8250192130 Independent Escort Ser...
VIP Call Girls Service Saharanpur Aishwarya 8250192130 Independent Escort Ser...Suhani Kapoor
 
格里菲斯大学毕业证(Griffith毕业证)#文凭成绩单#真实留信学历认证永久存档
格里菲斯大学毕业证(Griffith毕业证)#文凭成绩单#真实留信学历认证永久存档格里菲斯大学毕业证(Griffith毕业证)#文凭成绩单#真实留信学历认证永久存档
格里菲斯大学毕业证(Griffith毕业证)#文凭成绩单#真实留信学历认证永久存档208367051
 
Issues in the Philippines (Unemployment and Underemployment).pptx
Issues in the Philippines (Unemployment and Underemployment).pptxIssues in the Philippines (Unemployment and Underemployment).pptx
Issues in the Philippines (Unemployment and Underemployment).pptxJenniferPeraro1
 
定制英国克兰菲尔德大学毕业证成绩单原版一比一
定制英国克兰菲尔德大学毕业证成绩单原版一比一定制英国克兰菲尔德大学毕业证成绩单原版一比一
定制英国克兰菲尔德大学毕业证成绩单原版一比一z zzz
 
定制(NYIT毕业证书)美国纽约理工学院毕业证成绩单原版一比一
定制(NYIT毕业证书)美国纽约理工学院毕业证成绩单原版一比一定制(NYIT毕业证书)美国纽约理工学院毕业证成绩单原版一比一
定制(NYIT毕业证书)美国纽约理工学院毕业证成绩单原版一比一2s3dgmej
 
定制(SCU毕业证书)南十字星大学毕业证成绩单原版一比一
定制(SCU毕业证书)南十字星大学毕业证成绩单原版一比一定制(SCU毕业证书)南十字星大学毕业证成绩单原版一比一
定制(SCU毕业证书)南十字星大学毕业证成绩单原版一比一z xss
 
Final Completion Certificate of Marketing Management Internship
Final Completion Certificate of Marketing Management InternshipFinal Completion Certificate of Marketing Management Internship
Final Completion Certificate of Marketing Management InternshipSoham Mondal
 
Digital Marketing Training Institute in Mohali, India
Digital Marketing Training Institute in Mohali, IndiaDigital Marketing Training Institute in Mohali, India
Digital Marketing Training Institute in Mohali, IndiaDigital Discovery Institute
 
原版定制卡尔加里大学毕业证(UC毕业证)留信学历认证
原版定制卡尔加里大学毕业证(UC毕业证)留信学历认证原版定制卡尔加里大学毕业证(UC毕业证)留信学历认证
原版定制卡尔加里大学毕业证(UC毕业证)留信学历认证diploma001
 
办理学位证(UoM证书)北安普顿大学毕业证成绩单原版一比一
办理学位证(UoM证书)北安普顿大学毕业证成绩单原版一比一办理学位证(UoM证书)北安普顿大学毕业证成绩单原版一比一
办理学位证(UoM证书)北安普顿大学毕业证成绩单原版一比一A SSS
 

Recently uploaded (20)

Gray Gold Clean CV Resume2024tod (1).pdf
Gray Gold Clean CV Resume2024tod (1).pdfGray Gold Clean CV Resume2024tod (1).pdf
Gray Gold Clean CV Resume2024tod (1).pdf
 
定制(Waikato毕业证书)新西兰怀卡托大学毕业证成绩单原版一比一
定制(Waikato毕业证书)新西兰怀卡托大学毕业证成绩单原版一比一定制(Waikato毕业证书)新西兰怀卡托大学毕业证成绩单原版一比一
定制(Waikato毕业证书)新西兰怀卡托大学毕业证成绩单原版一比一
 
如何办理(UCI毕业证)加州大学欧文分校毕业证毕业证成绩单原版一比一
如何办理(UCI毕业证)加州大学欧文分校毕业证毕业证成绩单原版一比一如何办理(UCI毕业证)加州大学欧文分校毕业证毕业证成绩单原版一比一
如何办理(UCI毕业证)加州大学欧文分校毕业证毕业证成绩单原版一比一
 
Outsmarting the Attackers A Deep Dive into Threat Intelligence.docx
Outsmarting the Attackers A Deep Dive into Threat Intelligence.docxOutsmarting the Attackers A Deep Dive into Threat Intelligence.docx
Outsmarting the Attackers A Deep Dive into Threat Intelligence.docx
 
Ioannis Tzachristas Self-Presentation for MBA.pdf
Ioannis Tzachristas Self-Presentation for MBA.pdfIoannis Tzachristas Self-Presentation for MBA.pdf
Ioannis Tzachristas Self-Presentation for MBA.pdf
 
8377877756 Full Enjoy @24/7 Call Girls in Pitampura Delhi NCR
8377877756 Full Enjoy @24/7 Call Girls in Pitampura Delhi NCR8377877756 Full Enjoy @24/7 Call Girls in Pitampura Delhi NCR
8377877756 Full Enjoy @24/7 Call Girls in Pitampura Delhi NCR
 
Escorts Service Near Surya International Hotel, New Delhi |9873777170| Find H...
Escorts Service Near Surya International Hotel, New Delhi |9873777170| Find H...Escorts Service Near Surya International Hotel, New Delhi |9873777170| Find H...
Escorts Service Near Surya International Hotel, New Delhi |9873777170| Find H...
 
Drawing animals and props.pptxDrawing animals and props.pptxDrawing animals a...
Drawing animals and props.pptxDrawing animals and props.pptxDrawing animals a...Drawing animals and props.pptxDrawing animals and props.pptxDrawing animals a...
Drawing animals and props.pptxDrawing animals and props.pptxDrawing animals a...
 
Young Call~Girl in Pragati Maidan New Delhi 8448380779 Full Enjoy Escort Service
Young Call~Girl in Pragati Maidan New Delhi 8448380779 Full Enjoy Escort ServiceYoung Call~Girl in Pragati Maidan New Delhi 8448380779 Full Enjoy Escort Service
Young Call~Girl in Pragati Maidan New Delhi 8448380779 Full Enjoy Escort Service
 
定制(UOIT学位证)加拿大安大略理工大学毕业证成绩单原版一比一
 定制(UOIT学位证)加拿大安大略理工大学毕业证成绩单原版一比一 定制(UOIT学位证)加拿大安大略理工大学毕业证成绩单原版一比一
定制(UOIT学位证)加拿大安大略理工大学毕业证成绩单原版一比一
 
VIP Call Girls Service Saharanpur Aishwarya 8250192130 Independent Escort Ser...
VIP Call Girls Service Saharanpur Aishwarya 8250192130 Independent Escort Ser...VIP Call Girls Service Saharanpur Aishwarya 8250192130 Independent Escort Ser...
VIP Call Girls Service Saharanpur Aishwarya 8250192130 Independent Escort Ser...
 
格里菲斯大学毕业证(Griffith毕业证)#文凭成绩单#真实留信学历认证永久存档
格里菲斯大学毕业证(Griffith毕业证)#文凭成绩单#真实留信学历认证永久存档格里菲斯大学毕业证(Griffith毕业证)#文凭成绩单#真实留信学历认证永久存档
格里菲斯大学毕业证(Griffith毕业证)#文凭成绩单#真实留信学历认证永久存档
 
Issues in the Philippines (Unemployment and Underemployment).pptx
Issues in the Philippines (Unemployment and Underemployment).pptxIssues in the Philippines (Unemployment and Underemployment).pptx
Issues in the Philippines (Unemployment and Underemployment).pptx
 
定制英国克兰菲尔德大学毕业证成绩单原版一比一
定制英国克兰菲尔德大学毕业证成绩单原版一比一定制英国克兰菲尔德大学毕业证成绩单原版一比一
定制英国克兰菲尔德大学毕业证成绩单原版一比一
 
定制(NYIT毕业证书)美国纽约理工学院毕业证成绩单原版一比一
定制(NYIT毕业证书)美国纽约理工学院毕业证成绩单原版一比一定制(NYIT毕业证书)美国纽约理工学院毕业证成绩单原版一比一
定制(NYIT毕业证书)美国纽约理工学院毕业证成绩单原版一比一
 
定制(SCU毕业证书)南十字星大学毕业证成绩单原版一比一
定制(SCU毕业证书)南十字星大学毕业证成绩单原版一比一定制(SCU毕业证书)南十字星大学毕业证成绩单原版一比一
定制(SCU毕业证书)南十字星大学毕业证成绩单原版一比一
 
Final Completion Certificate of Marketing Management Internship
Final Completion Certificate of Marketing Management InternshipFinal Completion Certificate of Marketing Management Internship
Final Completion Certificate of Marketing Management Internship
 
Digital Marketing Training Institute in Mohali, India
Digital Marketing Training Institute in Mohali, IndiaDigital Marketing Training Institute in Mohali, India
Digital Marketing Training Institute in Mohali, India
 
原版定制卡尔加里大学毕业证(UC毕业证)留信学历认证
原版定制卡尔加里大学毕业证(UC毕业证)留信学历认证原版定制卡尔加里大学毕业证(UC毕业证)留信学历认证
原版定制卡尔加里大学毕业证(UC毕业证)留信学历认证
 
办理学位证(UoM证书)北安普顿大学毕业证成绩单原版一比一
办理学位证(UoM证书)北安普顿大学毕业证成绩单原版一比一办理学位证(UoM证书)北安普顿大学毕业证成绩单原版一比一
办理学位证(UoM证书)北安普顿大学毕业证成绩单原版一比一
 

Computer and Network Security

  • 2. 7.1 INTRODUCTION • COMPUTERS GETTING FASTER AND LESS EXPENSIVE • UTILITY OF NETWORKED COMPUTERS INCREASING • SHOPPING AND BANKING • MANAGING PERSONAL INFORMATION • CONTROLLING INDUSTRIAL PROCESSES • INCREASING USE OF COMPUTERS  GROWING IMPORTANCE OF COMPUTER SECURITY
  • 3. HACKERS AND ATTACKERS • ORIGINAL MEANING OF HACKER: EXPLORER, RISK TAKER, SYSTEM INNOVATOR • MIT’S TECH MODEL RAILROAD CLUB IN 1950S • MODERN MEANING OF HACKER ATTACKER: SOMEONE WHO GAINS UNAUTHORIZED ACCESS TO COMPUTERS AND COMPUTER NETWORKS
  • 4. TYPES OF ATTACKS MALWARE • MALICIOUS SOFTWARE • PROGRAMS OR SCRIPTS USED TO: • INTERCEPT DATA • STEAL INFORMATION • LAUNCH OTHER ATTACKS • DAMAGE A COMPUTER • MALWARE ATTACKS OCCUR AT AN ORGANIZATION ONCE EVERY 3 MINUTES SOCIAL ENGINEERING • PSYCHOLOGICAL ATTACKING • NON-TECHNICAL METHOD OF INTRUSION THAT RELIES ON: • HUMAN INTERACTION • TRICKERY • MANIPULATION • EXPLOITING THE WEAKEST LINK IN THE CHAIN
  • 7. COMPUTER FRAUD AND ABUSE ACT • CRIMINALIZES WIDE VARIETY OF HACKER-RELATED ACTIVITIES • TRANSMITTING CODE THAT DAMAGES A COMPUTER • ACCESSING ANY INTERNET-CONNECTED COMPUTER WITHOUT AUTHORIZATION • TRANSMITTING CLASSIFIED GOVERNMENT INFORMATION • TRAFFICKING IN COMPUTER PASSWORDS • COMPUTER FRAUD • COMPUTER EXTORTION • MAXIMUM PENALTY: 20 YEARS IN PRISON AND $250,000 FINE
  • 8. CASE STUDY: FIRESHEEP • OCTOBER 2010: ERIC BUTLER RELEASED FIRESHEEP EXTENSION TO FIREFOX BROWSER • FIRESHEEP MADE IT POSSIBLE FOR ORDINARY COMPUTER USERS TO EASILY SIDEJACK WEB SESSIONS • MORE THAN 500,000 DOWNLOADS IN FIRST WEEK • ATTRACTED GREAT DEAL OF MEDIA ATTENTION • EARLY 2011: FACEBOOK AND TWITTER ANNOUNCED OPTIONS TO USE THEIR SITES SECURELY 1-8
  • 9. ACT UTILITARIAN ANALYSIS • RELEASE OF FIRESHEEP LED MEDIA TO FOCUS ON SECURITY PROBLEM • BENEFITS WERE HIGH: A FEW MONTHS LATER FACEBOOK AND TWITTER MADE THEIR SITES MORE SECURE • HARMS WERE MINIMAL: NO EVIDENCE THAT RELEASE OF FIRESHEEP CAUSED BIG INCREASE IN IDENTITY THEFT OR MALICIOUS PRANKS • CONCLUSION: RELEASE OF FIRESHEEP WAS GOOD
  • 10. VIRTUE ETHICS ANALYSIS • BY RELEASING FIRESHEEP, BUTLER HELPED PUBLIC UNDERSTAND LACK OF SECURITY ON UNENCRYPTED WIRELESS NETWORKS • BUTLER’S STATEMENTS CHARACTERISTIC OF SOMEONE INTERESTED IN PROTECTING PRIVACY • BUTLER DEMONSTRATED COURAGE BY TAKING RESPONSIBILITY FOR THE PROGRAM • BUTLER DEMONSTRATED BENEVOLENCE BY MAKING PROGRAM FREELY AVAILABLE • HIS ACTIONS AND STATEMENTS WERE CHARACTERISTIC OF SOMEONE INTERESTED IN THE PUBLIC GOOD
  • 11. KANTIAN ANALYSIS • ACCESSING SOMEONE ELSE’S USER ACCOUNT IS AN INVASION OF THEIR PRIVACY AND IS WRONG • BUTLER PROVIDED A TOOL THAT MADE IT MUCH SIMPLER FOR PEOPLE TO DO SOMETHING THAT IS WRONG, SO HE HAS SOME MORAL ACCOUNTABILITY FOR THEIR MISDEEDS • BUTLER WAS WILLING TO TOLERATE SHORT-TERM INCREASE IN PRIVACY VIOLATIONS IN HOPE THAT MEDIA PRESSURE WOULD FORCE WEB RETAILERS TO ADD SECURITY • HE TREATED VICTIMS OF FIRESHEEP AS A MEANS TO HIS END • IT WAS WRONG FOR BUTLER TO RELEASE FIRESHEEP
  • 12. MALWARE • THERE IS NO STANDARDIZED CLASSIFICATION OF MALWARE BUT ONE WAY IS BY PRIMARY TRAITS. • HOW IT CIRCULATES TO OTHER NETWORKS • EMAIL, STORAGE PERIPHERALS, PHYSICAL CONNECTIONS • HOW IT INFECTS FILES/MACHINES • MEMORY, AUTO RUN SCRIPTS, EXE, PARASITE VS. SYMBIOTE • HOW IT CONCEALS ITSELF • MUTATE(DISCUSS MORE LATER) • THE CAPABILITIES OF ITS PAYLOAD • WHAT DOES IT DO? & WHY DOES IT DO IT? • THIS IS ENDLESS – STEAL PASSWORDS, DELETE FILES, CORRUPT DATA, ETC.
  • 13. TYPES OF MALWARE Question Virus Worm Trojan What is it? Malicious computer code that replicates without human intervention Malicious program that uses a computer network to replicate Program that masquerades as a benign activity that delivers something malicious How does it circulate? Files Network Files User action to circulate? Transmit infected file to a secondary party None Transmit infected file to a secondary party How does it infect? When app is executed it replicates in a new file and delivers payload. Vulnerability in application When app is executed it delivers payload.
  • 14. THE INTERNET WORM • ROBERT TAPPAN MORRIS, JR. • GRADUATE STUDENT AT CORNELL • RELEASED WORM ONTO INTERNET FROM MIT COMPUTER • EFFECT OF WORM • SPREAD TO SIGNIFICANT NUMBERS OF UNIX COMPUTERS • INFECTED COMPUTERS KEPT CRASHING OR BECAME UNRESPONSIVE • TOOK A DAY FOR FIXES TO BE PUBLISHED • IMPACT ON MORRIS • SUSPENDED FROM CORNELL • 3 YEARS’ PROBATION + 400 HOURS COMMUNITY SERVICE • $150,000 IN LEGAL FEES AND FINES
  • 15. ETHICAL EVALUATION • KANTIAN EVALUATION • MORRIS USED OTHERS BY GAINING ACCESS TO THEIR COMPUTERS WITHOUT PERMISSION • SOCIAL CONTRACT THEORY EVALUATION • MORRIS VIOLATED PROPERTY RIGHTS OF ORGANIZATIONS • UTILITARIAN EVALUATION • BENEFITS: ORGANIZATIONS LEARNED OF SECURITY FLAWS • HARMS: TIME SPENT BY THOSE FIGHTING WORM, UNAVAILABLE COMPUTERS, DISRUPTED NETWORK TRAFFIC, MORRIS’S PUNISHMENTS • VIRTUE ETHICS EVALUATION • MORRIS SELFISHLY USED INTERNET AS EXPERIMENTAL LAB • HE DECEITFULLY RELEASED WORM FROM MIT INSTEAD OF CORNELL • HE AVOIDED TAKING RESPONSIBILITY FOR HIS ACTIONS • MORRIS WAS WRONG TO HAVE RELEASED THE INTERNET WORM
  • 16. ANTIVIRUS SOFTWARE PACKAGES • ALLOW COMPUTER USERS TO DETECT AND DESTROY VIRUSES • MUST BE KEPT UP-TO-DATE TO BE MOST EFFECTIVE • MANY PEOPLE DO NOT KEEP THEIR ANTIVIRUS SOFTWARE PACKAGES UP-TO-DATE • CONSUMERS NEED TO BEWARE OF FAKE ANTIVIRUS APPLICATIONS
  • 17. DEFENSIVE MEASURES • SECURITY PATCHES: CODE UPDATES TO REMOVE SECURITY VULNERABILITIES • ANTI-MALWARE TOOLS: SOFTWARE TO SCAN HARD DRIVES, DETECT FILES THAT CONTAIN VIRUSES OR SPYWARE, AND DELETE THESE FILES • FIREWALL: A SOFTWARE APPLICATION INSTALLED ON A SINGLE COMPUTER THAT CAN SELECTIVELY BLOCK NETWORK TRAFFIC TO AND FROM THAT COMPUTER
  • 18. TYPES OF ATTACKERS • CYBER TERRORISTS • CYBERTERRORISM- PREMEDITATED, POLITICALLY MOTIVATED ATTACKS • DESIGNED TO: • CAUSE PANIC • PROVOKE VIOLENCE • RESULT IN FINANCIAL CATASTROPHE • CYBER CRIMINALS • INDIVIDUALS WHO LAUNCH ATTACKS AGAINST OTHER USERS AND THEIR COMPUTERS • A LOOSE NETWORK OF ATTACKERS, IDENTITY THIEVES, AND FINANCIAL FRAUDSTERS WHO ARE HIGHLY MOTIVATED, LESS RISK-AVERSE, WELL-FUNDED, AND TENACIOUS • INSTEAD OF ATTACKING A COMPUTER TO SHOW OFF THEIR TECHNOLOGY SKILLS (FAME), CYBERCRIMINALS HAVE A MORE FOCUSED GOAL OF FINANCIAL GAIN (FORTUNE): CYBERCRIMINALS STEAL INFORMATION OR LAUNCH ATTACKS TO GENERATE INCOME • ATTACKERS • A PERSON WHO USES ADVANCED COMPUTER SKILLS TO ATTACK COMPUTERS
  • 19. STUXNET WORM (2009) • ATTACKED SCADA SYSTEMS RUNNING SIEMENS SOFTWARE • TARGETED FIVE INDUSTRIAL FACILITIES IN IRAN THAT WERE USING CENTRIFUGES TO ENRICH URANIUM • CAUSED TEMPORARY SHUTDOWN OF IRAN’S NUCLEAR PROGRAM • WORM MAY HAVE BEEN CREATED BY ISRAELI DEFENSE FORCES
  • 20. CYBER ESPIONAGE ATTRIBUTED TO PEOPLE’S LIBERATION ARMY • HUNDREDS OF COMPUTER SECURITY BREACHES IN MORE THAN A DOZEN COUNTRIES INVESTIGATED BY MANDIANT • HUNDREDS OF TERABYTES OF DATA STOLEN • MANDIANT BLAMED UNIT 61398 OF THE PEOPLE’S LIBERATION ARMY • CHINA’S FOREIGN MINISTRY STATED THAT ACCUSATION WAS GROUNDLESS AND IRRESPONSIBLE
  • 21. ANONYMOUS • ANONYMOUS: LOOSELY ORGANIZED INTERNATIONAL MOVEMENT OF HACKTIVISTS (HACKERS WITH A SOCIAL OR POLITICAL CAUSE) • VARIOUS DDOS ATTACKS ATTRIBUTED TO ANONYMOUS MEMBERS Year Victim Reason 2008 Church of Scientology Attempted suppression of Tom Cruise interview 2009 RIAA, MPAA RIAA, MPAA’s attempt to take down the Pirate Bay 2009 PayPal, VISA, MasterCard Financial organizations freezing funds flowing to Julian Assange of WikiLeaks 2012 U.S. Dept. of Justice, RIAA, MPAA U.S. Dept. of Justice action against Megaupload

Editor's Notes

  1. An approach of exploiting and exposing peoples insecurities through a manner of psychological attacks or warfare: Displaying Confidence – the key attribute in any socially engineering tactic Act like you own it and people will believe Authority – Impersonating an authority figure or citing one “Do you know who I am…!” Intimidation – To frighten and coerce by threatening “What’s your name, I am going to contact your manager” Consensus – Influenced by what others do or wanting to satisfy a request “I talked with someone before and then were very accommodating with handling this situation” Urgency/Scarcity – Immediate action required “I am leaving to go to the company headquarters and need to get that file” Familiarity – Victim is well-known or well received (flattery, compliments) “I remember how helpful you were a couple of weeks ago” Impersonation Pretending to be someone you are not Never give information out Dumpster Diving Digging through trash to obtain information Tailgating and Shoulder Surfing Waiting for an action to take place and then capitalizes on the result Security door Use of a credit card Phishing False information in a digital format in order to solicit information from a user. Spam Nonsense emails that circumvent filters to try and deliver payloads Hoaxes Email impersonations to convince individuals to undermine the security of the system URL hijacking (Typo Squatting) Scams that take advantage on common misspellings Watering Hole Attack Setting malware on sites where specific groups of individuals congregate Reverse Social Engineering Attacker gets victim to contact them
  2. Social Engineering Phone calls from you instead of to you Asked questions that seem harmless
  3. Sidejacking: hijacking of an open Web session by capturing a user’s cookie Sidejacking possible on unencrypted wireless networks because many sites send cookies “in the clear” Internet security community complained about sidejacking vulnerability for years, but ecommerce sites did not change practices