The document discusses various topics relating to internet privacy, security, and netiquette. It covers computer security and the importance of protecting systems from harm. Examples are given of different systems that are at risk of attacks, including financial systems, utilities, aviation, consumer devices, large corporations, and automobiles. Specific security issues and past attacks are described for each one.
Top 10 Cybersecurity Trends to Watch Out For in 2022ManviShukla4
With the Digital revolution around all businesses, small or large, corporates, organizations and even governments are relying on computerized systems to manage their day-to-day activities and thus making cybersecurity a primary goal to safeguard data from various online attacks or any unauthorized access. Continuous change in technologies also implies a parallel shift in cybersecurity trends as news of data breach, ransomware and hacks become the norms. Here are the top cybersecurity trends for 2022.
12 IoT Cyber Security Threats to Avoid - CyberHive.pdfonline Marketing
As IoT (Internet of Things) devices weave into the fabric of our daily lives, from smart thermostats to connected cars, the need for robust IoT cyber security measures has never been more pressing. Let’s dive into 12 IoT cyber security threats that pose significant risks and offer guidance on navigating these digital waters safely. please visit: https://www.cyberhive.com/insights/12-iot-cyber-security-threats-to-avoid/
IoT security presented in Ada's List ConferenceCigdem Sengul
This talk is on IoT security and will use the UK Code of Practice for Consumer IoT Security to underpin the discussion.I describe various vulnerabilities and attacks that made the news headlines, which are the underlying reason why we need these rules now. In October 2018, the UK Government published the Code of Practice for Consumer IoT Security to support all parties involved in the development, manufacturing and retail of consumer IoT. The talk will open the floor to question whether regulation can be a fix to make us all more secure.
Top 10 Cybersecurity Trends to Watch Out For in 2022ManviShukla4
With the Digital revolution around all businesses, small or large, corporates, organizations and even governments are relying on computerized systems to manage their day-to-day activities and thus making cybersecurity a primary goal to safeguard data from various online attacks or any unauthorized access. Continuous change in technologies also implies a parallel shift in cybersecurity trends as news of data breach, ransomware and hacks become the norms. Here are the top cybersecurity trends for 2022.
12 IoT Cyber Security Threats to Avoid - CyberHive.pdfonline Marketing
As IoT (Internet of Things) devices weave into the fabric of our daily lives, from smart thermostats to connected cars, the need for robust IoT cyber security measures has never been more pressing. Let’s dive into 12 IoT cyber security threats that pose significant risks and offer guidance on navigating these digital waters safely. please visit: https://www.cyberhive.com/insights/12-iot-cyber-security-threats-to-avoid/
IoT security presented in Ada's List ConferenceCigdem Sengul
This talk is on IoT security and will use the UK Code of Practice for Consumer IoT Security to underpin the discussion.I describe various vulnerabilities and attacks that made the news headlines, which are the underlying reason why we need these rules now. In October 2018, the UK Government published the Code of Practice for Consumer IoT Security to support all parties involved in the development, manufacturing and retail of consumer IoT. The talk will open the floor to question whether regulation can be a fix to make us all more secure.
The Internet of Things (IoT) is thriving network of smart objects where one physical object can exchange information with another physical object. In today’s Internet of Things (IoT) the interest is the concealment and security of data in a network. The obtrusion into Internet of Things (IoT) exposes the extent with which the internet of things is vulnerable to attacks and how such attack can be detected to prevent extreme damage. It emphasises on threats, vulnerability, attacks and possible methods of detecting intruders to stop the system from further destruction, this paper proposes a way out of the impending security situation of Internet of things using IPV6 Low -power wireless personal Area Network.
A Survey Report on : Security & Challenges in Internet of Thingsijsrd.com
In the era of computing technology, Internet of Things (IoT) devices are now popular in each and every domains like e-governance, e-Health, e-Home, e-Commerce, and e-Trafficking etc. Iot is spreading from small to large applications in all fields like Smart Cities, Smart Grids, Smart Transportation. As on one side IoT provide facilities and services for the society. On the other hand, IoT security is also a crucial issues.IoT security is an area which totally concerned for giving security to connected devices and networks in the IoT .As, IoT is vast area with usability, performance, security, and reliability as a major challenges in it. The growth of the IoT is exponentially increases as driven by market pressures, which proportionally increases the security threats involved in IoT The relationship between the security and billions of devices connecting to the Internet cannot be described with existing mathematical methods. In this paper, we explore the opportunities possible in the IoT with security threats and challenges associated with it.
Cybersecurity stands as the bedrock of our digital world, safeguarding systems, networks, and data from a rising tide of cyber threats. In the era of the Internet of Things (IoT), wherean ever-expanding array of devices and objects are seamlessly interconnected, the importance of cybersecurity has escalated to unprecedented levels.
Rasefiberry: Secure and efficient Raspberry-Pi based gateway for smarthome Io...journalBEEI
Internet-of-Things or IoT technology becomes essential in everyday lives. The risk of security and privacy towards IoT devices, especially smarthomes IoT gateway device, becoming apparent as IoT technology progressed. The need for affordable, secure smarthome gateway device or router that smarthome user prefer. The problem of low-performance smarthome gateways was running security programs on top of smarthome gateway programs. This problem motivates the researcher designing a secure and efficient smarthome gateway using Raspberry Pi hardware as an affordable smarthome gateway device and able to run both smarthome gateways and security programs. In this research, researchers implemented snort as intrusion detection system (IDS), openHab as IoT gateway applications, and well-known encryption algorithms for file encryption in Raspberry PI 3B+ model. The researcher evaluated Snort capability on network attacks and compared each of the well-known encryption algorithm efficiency. From the result, we found Rasefiberry customized snort configuration for Raspberry pi 60 percent of the simulated network attacks. Twofish encryption algorithms were found to have best encryption time, throughput, and power consumption compared to other encryption algorithms in the research. Rasefiberry architecture successfully processes both lightweight security programs and Openhab smarthome gateway programs with a lowperformance computing device such as Raspberry Pi.
IBM X-Force Threat Intelligence Quarterly,
4Q 2014
Get a closer look at today’s security risks—from new threats arising from within the
Internet of Things, to the sources of malware and botnet infections.
Internet of things are exploding. This whitepaper would help product developers to understand the Security and Privacy issues, their impact and a recommendation for embedding the best practices during PDLC.
IoT References:
https://www.techrepublic.com/article/how-to-secure-your-iot-devices-from-botnets-and-other-threats/
https://www.peerbits.com/blog/biggest-iot-security-challenges.html
https://www.bankinfosecurity.asia/securing-iot-devices-challenges-a-11138
https://www.sumologic.com/blog/iot-security/
https://news.ihsmarkit.com/press-release/number-connected-iot-devices-will-surge-125-billion-2030-ihs-markit-says
https://cdn.ihs.com/www/pdf/IoT_ebook.pdf
https://go.armis.com/hubfs/Buyers%E2%80%99%20Guide%20to%20IoT%20Security%20-Final.pdf
https://www.techrepublic.com/article/smart-farming-how-iot-robotics-and-ai-are-tackling-one-of-the-biggest-problems-of-the-century/
Video Resources:What is the Internet of Things (IoT) and how can we secure it?
https://www.youtube.com/watch?v=H_X6IP1-NDc
What is the problem with IoT security? - Gary explains
https://www.youtube.com/watch?v=D3yrk4TaIQQ
Final Research Project - Securing IoT Devices: What are the Challenges?
Internet security, in general, is a challenge that we have been dealing with for decades. It is a regular topic of discussion and concern, but a relatively new segment of internet security is getting most attention—internet of things (IoT). So why is internet of things security so important?
The high growth rate of IoT should get the attention of cybersecurity professionals. The rate at which new technology goes to market is inversely proportional to the amount of security that gets designed into the product. According to IHS Markit, “The number of connected IoT devices worldwide will jump 12 percent on average annually, from nearly 27 billion in 2017 to 125 billion in 2030.”
IoT devices are quite a bit different from other internet-connected devices such as laptops and servers. They are designed with a single purpose in mind, usually running minimal software with minimal resources to serve that purpose. Adding the capability to run and update security software is often not taken into consideration.
Due to the lack of security integrated into IoT devices, they present significant risks that must be addressed. IoT security is the practice of understanding and mitigating these risks. Let’s consider the challenges of IoT security and how we can address them.
Some security practitioners suggest that key IoT security steps include:
1. Make people aware that there is a threat to security;
2. Design a technical solution to reduce security vulnerabilities;
3. Align the legal and regulatory frameworks; and
4. Develop a workforce with the skills to handle IoT security.
Final Assignment - Project Plan (Deliverables):
1) Address each of the FOURIoT security steps listed above in terms of IoT devices.
2) Explain in detail, in a step-by-step guide, how to make people more aware of the problems associated with the use of IoT devices.
Bottom of Form
Top of Form
Bottom of Form
Personal data breaches and securing IoT devices
· By Damon Culbert (2019)
The Internet of Things (IoT) is taking the world b.
Since the official commercial launch of 5G in 2019, from a global perspective, 5G network coverage is increasing. The deployment of 5G will also accelerate significantly in 2020. According to the latest research report of "The Status of 5G Deployment" released by VIAVI, as of January 2020, commercial 378G networks have been deployed in 378 cities in 34 countries.
Since the official commercial launch of 5G in 2019, from a global perspective, 5G network coverage is increasing. The deployment of 5G will also accelerate significantly in 2020. According to the latest research report of "The Status of 5G Deployment" released by VIAVI, as of January 2020, commercial 378G networks have been deployed in 378 cities in 34 countries.
The wireless industry has baked security into our networks since the beginning, and works diligently to continually update and build on our security capabilities with every generation of wireless. Today’s 4G LTE networks have the most advanced security features to date, and 5G will further improve upon them.
Cyber Security is a crucial and rising part of concern in the present age with a rapid increase in the graph of digitization. And with an increase in the activities in cyberspace, there is also an increase in the cyber-crimes. Handling the huge volumes of data with security has become an inevitable need of the hour. Antivirus software, Firewalls, and other technological solutions help to secure this data but are not sufficient enough to prevent the cybercrooks from destructing the network and stealing confidential information. This paper mainly focuses on the issues and challenges faced by cybersecurity. It also discusses the risks, cybersecurity techniques to curb cyber-crime, cyber ethics, and cyber trends.
Face expressions, facial features, kinect sensor, face tracking SDK, neural n...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
The Internet of Things (IoT) is thriving network of smart objects where one physical object can exchange information with another physical object. In today’s Internet of Things (IoT) the interest is the concealment and security of data in a network. The obtrusion into Internet of Things (IoT) exposes the extent with which the internet of things is vulnerable to attacks and how such attack can be detected to prevent extreme damage. It emphasises on threats, vulnerability, attacks and possible methods of detecting intruders to stop the system from further destruction, this paper proposes a way out of the impending security situation of Internet of things using IPV6 Low -power wireless personal Area Network.
A Survey Report on : Security & Challenges in Internet of Thingsijsrd.com
In the era of computing technology, Internet of Things (IoT) devices are now popular in each and every domains like e-governance, e-Health, e-Home, e-Commerce, and e-Trafficking etc. Iot is spreading from small to large applications in all fields like Smart Cities, Smart Grids, Smart Transportation. As on one side IoT provide facilities and services for the society. On the other hand, IoT security is also a crucial issues.IoT security is an area which totally concerned for giving security to connected devices and networks in the IoT .As, IoT is vast area with usability, performance, security, and reliability as a major challenges in it. The growth of the IoT is exponentially increases as driven by market pressures, which proportionally increases the security threats involved in IoT The relationship between the security and billions of devices connecting to the Internet cannot be described with existing mathematical methods. In this paper, we explore the opportunities possible in the IoT with security threats and challenges associated with it.
Cybersecurity stands as the bedrock of our digital world, safeguarding systems, networks, and data from a rising tide of cyber threats. In the era of the Internet of Things (IoT), wherean ever-expanding array of devices and objects are seamlessly interconnected, the importance of cybersecurity has escalated to unprecedented levels.
Rasefiberry: Secure and efficient Raspberry-Pi based gateway for smarthome Io...journalBEEI
Internet-of-Things or IoT technology becomes essential in everyday lives. The risk of security and privacy towards IoT devices, especially smarthomes IoT gateway device, becoming apparent as IoT technology progressed. The need for affordable, secure smarthome gateway device or router that smarthome user prefer. The problem of low-performance smarthome gateways was running security programs on top of smarthome gateway programs. This problem motivates the researcher designing a secure and efficient smarthome gateway using Raspberry Pi hardware as an affordable smarthome gateway device and able to run both smarthome gateways and security programs. In this research, researchers implemented snort as intrusion detection system (IDS), openHab as IoT gateway applications, and well-known encryption algorithms for file encryption in Raspberry PI 3B+ model. The researcher evaluated Snort capability on network attacks and compared each of the well-known encryption algorithm efficiency. From the result, we found Rasefiberry customized snort configuration for Raspberry pi 60 percent of the simulated network attacks. Twofish encryption algorithms were found to have best encryption time, throughput, and power consumption compared to other encryption algorithms in the research. Rasefiberry architecture successfully processes both lightweight security programs and Openhab smarthome gateway programs with a lowperformance computing device such as Raspberry Pi.
IBM X-Force Threat Intelligence Quarterly,
4Q 2014
Get a closer look at today’s security risks—from new threats arising from within the
Internet of Things, to the sources of malware and botnet infections.
Internet of things are exploding. This whitepaper would help product developers to understand the Security and Privacy issues, their impact and a recommendation for embedding the best practices during PDLC.
IoT References:
https://www.techrepublic.com/article/how-to-secure-your-iot-devices-from-botnets-and-other-threats/
https://www.peerbits.com/blog/biggest-iot-security-challenges.html
https://www.bankinfosecurity.asia/securing-iot-devices-challenges-a-11138
https://www.sumologic.com/blog/iot-security/
https://news.ihsmarkit.com/press-release/number-connected-iot-devices-will-surge-125-billion-2030-ihs-markit-says
https://cdn.ihs.com/www/pdf/IoT_ebook.pdf
https://go.armis.com/hubfs/Buyers%E2%80%99%20Guide%20to%20IoT%20Security%20-Final.pdf
https://www.techrepublic.com/article/smart-farming-how-iot-robotics-and-ai-are-tackling-one-of-the-biggest-problems-of-the-century/
Video Resources:What is the Internet of Things (IoT) and how can we secure it?
https://www.youtube.com/watch?v=H_X6IP1-NDc
What is the problem with IoT security? - Gary explains
https://www.youtube.com/watch?v=D3yrk4TaIQQ
Final Research Project - Securing IoT Devices: What are the Challenges?
Internet security, in general, is a challenge that we have been dealing with for decades. It is a regular topic of discussion and concern, but a relatively new segment of internet security is getting most attention—internet of things (IoT). So why is internet of things security so important?
The high growth rate of IoT should get the attention of cybersecurity professionals. The rate at which new technology goes to market is inversely proportional to the amount of security that gets designed into the product. According to IHS Markit, “The number of connected IoT devices worldwide will jump 12 percent on average annually, from nearly 27 billion in 2017 to 125 billion in 2030.”
IoT devices are quite a bit different from other internet-connected devices such as laptops and servers. They are designed with a single purpose in mind, usually running minimal software with minimal resources to serve that purpose. Adding the capability to run and update security software is often not taken into consideration.
Due to the lack of security integrated into IoT devices, they present significant risks that must be addressed. IoT security is the practice of understanding and mitigating these risks. Let’s consider the challenges of IoT security and how we can address them.
Some security practitioners suggest that key IoT security steps include:
1. Make people aware that there is a threat to security;
2. Design a technical solution to reduce security vulnerabilities;
3. Align the legal and regulatory frameworks; and
4. Develop a workforce with the skills to handle IoT security.
Final Assignment - Project Plan (Deliverables):
1) Address each of the FOURIoT security steps listed above in terms of IoT devices.
2) Explain in detail, in a step-by-step guide, how to make people more aware of the problems associated with the use of IoT devices.
Bottom of Form
Top of Form
Bottom of Form
Personal data breaches and securing IoT devices
· By Damon Culbert (2019)
The Internet of Things (IoT) is taking the world b.
Since the official commercial launch of 5G in 2019, from a global perspective, 5G network coverage is increasing. The deployment of 5G will also accelerate significantly in 2020. According to the latest research report of "The Status of 5G Deployment" released by VIAVI, as of January 2020, commercial 378G networks have been deployed in 378 cities in 34 countries.
Since the official commercial launch of 5G in 2019, from a global perspective, 5G network coverage is increasing. The deployment of 5G will also accelerate significantly in 2020. According to the latest research report of "The Status of 5G Deployment" released by VIAVI, as of January 2020, commercial 378G networks have been deployed in 378 cities in 34 countries.
The wireless industry has baked security into our networks since the beginning, and works diligently to continually update and build on our security capabilities with every generation of wireless. Today’s 4G LTE networks have the most advanced security features to date, and 5G will further improve upon them.
Cyber Security is a crucial and rising part of concern in the present age with a rapid increase in the graph of digitization. And with an increase in the activities in cyberspace, there is also an increase in the cyber-crimes. Handling the huge volumes of data with security has become an inevitable need of the hour. Antivirus software, Firewalls, and other technological solutions help to secure this data but are not sufficient enough to prevent the cybercrooks from destructing the network and stealing confidential information. This paper mainly focuses on the issues and challenges faced by cybersecurity. It also discusses the risks, cybersecurity techniques to curb cyber-crime, cyber ethics, and cyber trends.
Face expressions, facial features, kinect sensor, face tracking SDK, neural n...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Ethnobotany and Ethnopharmacology:
Ethnobotany in herbal drug evaluation,
Impact of Ethnobotany in traditional medicine,
New development in herbals,
Bio-prospecting tools for drug discovery,
Role of Ethnopharmacology in drug evaluation,
Reverse Pharmacology.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
How to Split Bills in the Odoo 17 POS ModuleCeline George
Bills have a main role in point of sale procedure. It will help to track sales, handling payments and giving receipts to customers. Bill splitting also has an important role in POS. For example, If some friends come together for dinner and if they want to divide the bill then it is possible by POS bill splitting. This slide will show how to split bills in odoo 17 POS.
The Art Pastor's Guide to Sabbath | Steve ThomasonSteve Thomason
What is the purpose of the Sabbath Law in the Torah. It is interesting to compare how the context of the law shifts from Exodus to Deuteronomy. Who gets to rest, and why?
The Indian economy is classified into different sectors to simplify the analysis and understanding of economic activities. For Class 10, it's essential to grasp the sectors of the Indian economy, understand their characteristics, and recognize their importance. This guide will provide detailed notes on the Sectors of the Indian Economy Class 10, using specific long-tail keywords to enhance comprehension.
For more information, visit-www.vavaclasses.com
Sectors of the Indian Economy - Class 10 Study Notes pdf
INT 1010 10-2.pdf
1. Introduction to Information Technology
10.2. Internet Privacy, Internet Security, and Netiquette
Introduction to Information Technology
INT-1010
Prof C
Luis R Castellanos
1
10
Internet Privacy, Internet Security, and
Netiquette
2. Introduction to Information Technology
10.2. Internet Privacy, Internet Security, and Netiquette
2
Internet Privacy Internet Security Netiquette
3. Introduction to Information Technology
10.2. Internet Privacy, Internet Security, and Netiquette
Introduction to Information Technology
INT-1010
Prof C
Luis R Castellanos
2022
3
10.2
Internet Privacy, Internet Security,
and Netiquette:
Internet Security
5. Introduction to Information Technology
10.2. Internet Privacy, Internet Security, and Netiquette
5
Computer Security
Computer security, also known as
cyber security or IT security, is the
protection of information systems from
theft or damage to the hardware, the
software, and to the information on
them, as well as from disruption or
misdirection of the services they
provide.
6. Introduction to Information Technology
10.2. Internet Privacy, Internet Security, and Netiquette
6
It includes controlling physical
access to the hardware, as well as
protecting against harm that
may come via network access,
data and code injection, and due
to malpractice by operators,
whether intentional, accidental,
or due to them being tricked into
deviating from secure
procedures.
7. Introduction to Information Technology
10.2. Internet Privacy, Internet Security, and Netiquette
7
The field is of growing importance
due to the increasing reliance on
computer systems and the Internet
in most societies, wireless networks
such as Bluetooth and Wi-Fi – and
the growth of “smart” devices,
including smartphones, televisions
and tiny devices as part of the
Internet of Things.
8. Introduction to Information Technology
10.2. Internet Privacy, Internet Security, and Netiquette
8
Systems at Risk
Computer security is critical in almost any industry which
uses computers.
Currently, most electronic devices such as computers,
laptops and cellphones come with built in firewall security
software, but despite this, computers are not 100 percent
accurate and dependable to protect our data.
There are many different ways of hacking into computers.
It can be done through a network system, clicking into
unknown links, connecting to unfamiliar Wi-Fi,
downloading software and files from unsafe sites, power
consumption, electromagnetic radiation waves, and many
more.
9. Introduction to Information Technology
10.2. Internet Privacy, Internet Security, and Netiquette
9
However, computers can be
protected through well built
software and hardware.
By having strong internal
interactions of properties,
software complexity can prevent
software crash and security failure.
10. Introduction to Information Technology
10.2. Internet Privacy, Internet Security, and Netiquette
10
Financial Systems
Web sites and apps that accept or store
credit card numbers, brokerage
accounts, and bank account information
are prominent hacking targets, because
of the potential for immediate financial
gain from transferring money, making
purchases, or selling the information on
the black market.
In-store payment systems and ATMs
have also been tampered with in order
to gather customer account data and
PINs.
11. Introduction to Information Technology
10.2. Internet Privacy, Internet Security, and Netiquette
11
Utilities and Industrial
Equipment
Computers control functions at many
utilities, including coordination of
telecommunications, the power grid,
nuclear power plants, and valve
opening and closing in water and gas
networks.
12. Introduction to Information Technology
10.2. Internet Privacy, Internet Security, and Netiquette
12
The Internet is a potential attack vector
for such machines if connected, but the
Stuxnet worm demonstrated that even
equipment controlled by computers
not connected to the Internet can be
vulnerable to physical damage caused
by malicious commands sent to
industrial equipment (in that case
uranium enrichment centrifuges)
which are infected via removable
media.
13. Introduction to Information Technology
10.2. Internet Privacy, Internet Security, and Netiquette
13
Stuxnet is a malicious computer worm first uncovered in 2010 and thought to
have been in development since at least 2005. Stuxnet targets supervisory
control and data acquisition (SCADA) systems and is believed to be responsible
for causing substantial damage to the nuclear program of Iran.
https://en.wikipedia.org/wiki/Stuxnet
14. Introduction to Information Technology
10.2. Internet Privacy, Internet Security, and Netiquette
14
In 2014, the Computer Emergency
Readiness Team, a division of the
Department of Homeland Security,
investigated 79 hacking incidents at
energy companies.
Vulnerabilities in smart meters (many
of which used local radio or cellular
communications) caused some
problems with billing fraud.
15. Introduction to Information Technology
10.2. Internet Privacy, Internet Security, and Netiquette
15
Aviation
The aviation industry is very reliant on a
series of complex system which could be
attacked.
A simple power outage at one airport can
cause repercussions worldwide, much of
the system relies on radio transmissions
which could be disrupted, and controlling
aircraft over oceans is especially
dangerous because radar surveillance
only extends 175 to 225 miles offshore.
There is also potential for attack from
within an aircraft.
16. Introduction to Information Technology
10.2. Internet Privacy, Internet Security, and Netiquette
16
The consequences of a successful attack
range from loss of confidentiality to loss
of system integrity, which may lead to
more serious concerns such as
exfiltration of data, network and air
traffic control outages, which in turn can
lead to airport closures, loss of aircraft,
loss of passenger life, damages on the
ground and to transportation
infrastructure.
A successful attack on a military aviation
system that controls munitions could
have even more serious consequences.
18. Introduction to Information Technology
10.2. Internet Privacy, Internet Security, and Netiquette
18
Europe has started to move towards
centralized aviation network PENS
(Pan-European Network Service)
which do provide a common IP-based
network service across the European
region covering voice and data
communication and later on even more
with NewPENS, similar USA has in
NextGen program.
19. Introduction to Information Technology
10.2. Internet Privacy, Internet Security, and Netiquette
19
Consumer Devices
Desktop computers and laptops are commonly
infected with malware either to gather
passwords or financial account information, or
to construct a botnet to attack another target.
Smart phones, tablet computers, smart watches,
and other mobile devices such as Quantified Self
devices like activity trackers have also become
targets and many of these have sensors such as
cameras, microphones, GPS receivers,
compasses, and accelerometers which could be
exploited, and may collect personal information,
including sensitive health information.
20. Introduction to Information Technology
10.2. Internet Privacy, Internet Security, and Netiquette
20
Wifi, Bluetooth, and cell phone
networks on any of these devices could
be used as attack vectors, and sensors
might be remotely activated after a
successful breach.
Home automation devices such as the
Nest thermostat are also potential
targets.
21. Introduction to Information Technology
10.2. Internet Privacy, Internet Security, and Netiquette
21
Large Corporations
Large corporations are common targets.
In many cases this is aimed at financial
gain through identity theft and involves
data breaches such as the loss of
millions of clients’ credit card details by
Home Depot, Staples, and Target
Corporation.
Medical records have been targeted for
use in general identify theft, health
insurance fraud, and impersonating
patients to obtain prescription drugs for
recreational purposes or resale.
22. Introduction to Information Technology
10.2. Internet Privacy, Internet Security, and Netiquette
22
Not all attacks are financially
motivated however; for example
security firm HB Gary Federal suffered
a serious series of attacks in 2011 from
hacktivist group Anonymous in
retaliation for the firm’s CEO claiming
to have infiltrated their group, and
Sony Pictures was attacked in 2014
where the motive appears to have been
to embarrass with data leaks, and
cripple the company by wiping
workstations and servers.
23. Introduction to Information Technology
10.2. Internet Privacy, Internet Security, and Netiquette
23
Automobiles
If access is gained to a car’s internal
controller area network, it is possible
to disable the brakes and turn the
steering wheel.
Computerized engine timing, cruise
control, anti-lock brakes, seat belt
tensioners, door locks, airbags and
advanced driver assistance systems
make these disruptions possible, and
self-driving cars go even further.
24. Introduction to Information Technology
10.2. Internet Privacy, Internet Security, and Netiquette
24
Connected cars may use Wifi and Bluetooth to
communicate with onboard consumer devices,
and the cell phone network to contact
concierge and emergency assistance services
or get navigational or entertainment
information; each of these networks is a
potential entry point for malware or an
attacker.
Researchers were even able to use a malicious
compact disc in a car’s stereo system as a
successful attack vector, and cars with built-in
voice recognition or remote assistance
features have onboard microphones which
could be used for eavesdropping.
25. Introduction to Information Technology
10.2. Internet Privacy, Internet Security, and Netiquette
25
A 2015 report by U.S. Senator
Edward Markey criticized
manufacturers’ security measures as
inadequate, and also highlighted
privacy concerns about driving,
location, and diagnostic data being
collected, which is vulnerable to
abuse by both manufacturers and
hackers.
26. Introduction to Information Technology
10.2. Internet Privacy, Internet Security, and Netiquette
26
Government
Government and military computer
systems are commonly attacked by
activists and foreign powers.
Local and regional government
infrastructure such as traffic light
controls, police and intelligence agency
communications, personnel records,
student records, and financial systems
are also potential targets as they are
now all largely computerized.
Passports and government ID cards
that control access to facilities which
use RFID can be vulnerable to cloning.
27. Introduction to Information Technology
10.2. Internet Privacy, Internet Security, and Netiquette
27
Radio-frequency identification (RFID) uses electromagnetic fields to
automatically identify and track tags attached to objects.
https://en.wikipedia.org/wiki/Radio-frequency_identification
28. Introduction to Information Technology
10.2. Internet Privacy, Internet Security, and Netiquette
28
Internet of Things and physical
vulnerabilities
The Internet of Things (IoT) is the
network of physical objects such as
devices, vehicles, and buildings that are
embedded with electronics, software,
sensors, and network connectivity that
enables them to collect and exchange
data – and concerns have been raised
that this is being developed without
appropriate consideration of the
security challenges involved.
29. Introduction to Information Technology
10.2. Internet Privacy, Internet Security, and Netiquette
29
While the IoT creates opportunities for
more direct integration of the physical
world into computer-based systems, it
also provides opportunities for misuse.
In particular, as the Internet of Things
spreads widely, cyber attacks are likely
to become an increasingly physical
(rather than simply virtual) threat.
If a front door’s lock is connected to the
Internet, and can be locked/unlocked
from a phone, then a criminal could
enter the home at the press of a button
from a stolen or hacked phone.
30. Introduction to Information Technology
10.2. Internet Privacy, Internet Security, and Netiquette
30
People could stand to lose much more
than their credit card numbers in a
world controlled by IoT-enabled
devices.
Thieves have also used electronic
means to circumvent non-Internet-
connected hotel door locks.
Medical devices have either been
successfully attacked or had potentially
deadly vulnerabilities demonstrated,
including both in-hospital diagnostic
equipment and implanted devices
including pacemakers and insulin
pumps.
32. Introduction to Information Technology
10.2. Internet Privacy, Internet Security, and Netiquette
32
Impact of security breaches
Serious financial damage has been
caused by security breaches, but
because there is no standard model for
estimating the cost of an incident, the
only data available is that which is
made public by the organizations
involved.
“Several computer security consulting
firms produce estimates of total
worldwide losses attributable to virus
and worm attacks and to hostile digital
acts in general”.
33. Introduction to Information Technology
10.2. Internet Privacy, Internet Security, and Netiquette
33
“The 2003 loss estimates by these
firms range from $13 billion (worms
and viruses only) to $226 billion (for
all forms of covert attacks).
The reliability of these estimates is
often challenged; the underlying
methodology is basically anecdotal.”
However, reasonable estimates of the
financial cost of security breaches can
actually help organizations make
rational investment decisions.
34. Introduction to Information Technology
10.2. Internet Privacy, Internet Security, and Netiquette
34
According to the classic Gordon-
Loeb Model analyzing the optimal
investment level in information
security, one can conclude that the
amount a firm spends to protect
information should generally be only a
small fraction of the expected loss (i.e.,
the expected value of the loss resulting
from a cyber/information security
breach).
35. Introduction to Information Technology
10.2. Internet Privacy, Internet Security, and Netiquette
35
The Gordon–Loeb model is a
mathematical economic model
analyzing the optimal investment
level in information security.
To draft this model, the company
must possess knowledge of three
parameters:
✓ how much the data is worth;
✓ how much the data is at risk;
✓ the probability an attack on the data is
going to be successful, or
vulnerability.
https://en.wikipedia.org/wiki/Gordon%
E2%80%93Loeb_model
36. Introduction to Information Technology
10.2. Internet Privacy, Internet Security, and Netiquette
36
Attacker motivation
As with physical security, the
motivations for breaches of computer
security vary between attackers.
Some are thrill-seekers or vandals,
others are activists or criminals looking
for financial gain.
State-sponsored attackers are now
common and well resourced, but
started with amateurs such as Markus
Hess who hacked for the KGB, as
recounted by Clifford Stoll, in The
Cuckoo’s Egg.
37. Introduction to Information Technology
10.2. Internet Privacy, Internet Security, and Netiquette
37
A standard part of threat modelling for
any particular system is to identify
what might motivate an attack on that
system, and who might be motivated to
breach it.
The level and detail of precautions will
vary depending on the system to be
secured.
A home personal computer, bank, and
classified military network face very
different threats, even when the
underlying technologies in use are
similar.
38. Introduction to Information Technology
10.2. Internet Privacy, Internet Security, and Netiquette
38
Which motives are behind any cyber-attacks your organization
experienced?
https://www.helpnetsecurity.com/2017/01/11/ransom-motivation-behind-cyber-attacks/
40. Introduction to Information Technology
10.2. Internet Privacy, Internet Security, and Netiquette
40
Computer Security, also
known as cyber security or IT
security, is the protection of
information systems from theft
or damage to the hardware, the
software, and to the information
on them, as well as from
disruption or misdirection of the
services they provide.
41. Introduction to Information Technology
10.2. Internet Privacy, Internet Security, and Netiquette
41
Web sites and apps that accept or
store credit card numbers,
brokerage accounts, and bank
account information are
prominent hacking targets,
because of the potential for
immediate financial gain from
transferring money, making
purchases, or selling the
information on the black market.
42. Introduction to Information Technology
10.2. Internet Privacy, Internet Security, and Netiquette
42
Desktop computers and laptops are
commonly infected with malware either
to gather passwords or financial account
information, or to construct a botnet to
attack another target.
Smart phones, tablet computers, smart
watches, and other mobile devices have
sensors such as cameras, microphones,
GPS receivers, compasses, and
accelerometers which could be exploited,
and may collect personal information.
43. Introduction to Information Technology
10.2. Internet Privacy, Internet Security, and Netiquette
43
If access is gained to a car’s
internal controller area network,
it is possible to disable the brakes
and turn the steering wheel.
44. Introduction to Information Technology
10.2. Internet Privacy, Internet Security, and Netiquette
44
While the IoT creates
opportunities for more direct
integration of the physical world
into computer-based systems, it
also provides opportunities for
misuse.
In particular, as the Internet of
Things spreads widely, cyber
attacks are likely to become an
increasingly physical (rather than
simply virtual) threat.
45. Introduction to Information Technology
10.2. Internet Privacy, Internet Security, and Netiquette
45
Serious financial damage has
been caused by security breaches,
but because there is no standard
model for estimating the cost of
an incident, the only data
available is that which is made
public by the organizations
involved.
46. Introduction to Information Technology
10.2. Internet Privacy, Internet Security, and Netiquette
46
A standard part of threat
modelling for any particular
system is to identify what might
motivate an attack on that
system, and who might be
motivated to breach it.
The level and detail of
precautions will vary depending
on the system to be secured.
49. Introduction to Information Technology
10.2. Internet Privacy, Internet Security, and Netiquette
Textbook
49
https://eng.libretexts.org/Courses/Prince_
Georges_Community_College/INT_1010%
3A_Concepts_in_Computing
Purchase of a book is not
required.
50. Introduction to Information Technology
10.2. Internet Privacy, Internet Security, and Netiquette
Professor C
50
castellr@pgcc.edu
eLearning Expert
BS & MS in Systems Engineering
BS & MS in Military Science and Arts
HC Dr in Education
IT Professor | Spanish Instructor
LCINT1010.wordpress.com
Presentation created in 01/2022.
Slides last updated on 06/2023
51. Introduction to Information Technology
10.2. Internet Privacy, Internet Security, and Netiquette
Introduction to Information Technology
INT-1010
Prof C
Luis R Castellanos
51
10.2
Internet Privacy, Internet Security,
and Netiquette:
Internet Security