SlideShare a Scribd company logo
Introduction to Information Technology
10.2. Internet Privacy, Internet Security, and Netiquette
Introduction to Information Technology
INT-1010
Prof C
Luis R Castellanos
1
10
Internet Privacy, Internet Security, and
Netiquette
Introduction to Information Technology
10.2. Internet Privacy, Internet Security, and Netiquette
2
Internet Privacy Internet Security Netiquette
Introduction to Information Technology
10.2. Internet Privacy, Internet Security, and Netiquette
Introduction to Information Technology
INT-1010
Prof C
Luis R Castellanos
2022
3
10.2
Internet Privacy, Internet Security,
and Netiquette:
Internet Security
Introduction to Information Technology
10.2. Internet Privacy, Internet Security, and Netiquette
4
Introduction to Information Technology
10.2. Internet Privacy, Internet Security, and Netiquette
5
Computer Security
Computer security, also known as
cyber security or IT security, is the
protection of information systems from
theft or damage to the hardware, the
software, and to the information on
them, as well as from disruption or
misdirection of the services they
provide.
Introduction to Information Technology
10.2. Internet Privacy, Internet Security, and Netiquette
6
It includes controlling physical
access to the hardware, as well as
protecting against harm that
may come via network access,
data and code injection, and due
to malpractice by operators,
whether intentional, accidental,
or due to them being tricked into
deviating from secure
procedures.
Introduction to Information Technology
10.2. Internet Privacy, Internet Security, and Netiquette
7
The field is of growing importance
due to the increasing reliance on
computer systems and the Internet
in most societies, wireless networks
such as Bluetooth and Wi-Fi – and
the growth of “smart” devices,
including smartphones, televisions
and tiny devices as part of the
Internet of Things.
Introduction to Information Technology
10.2. Internet Privacy, Internet Security, and Netiquette
8
Systems at Risk
Computer security is critical in almost any industry which
uses computers.
Currently, most electronic devices such as computers,
laptops and cellphones come with built in firewall security
software, but despite this, computers are not 100 percent
accurate and dependable to protect our data.
There are many different ways of hacking into computers.
It can be done through a network system, clicking into
unknown links, connecting to unfamiliar Wi-Fi,
downloading software and files from unsafe sites, power
consumption, electromagnetic radiation waves, and many
more.
Introduction to Information Technology
10.2. Internet Privacy, Internet Security, and Netiquette
9
However, computers can be
protected through well built
software and hardware.
By having strong internal
interactions of properties,
software complexity can prevent
software crash and security failure.
Introduction to Information Technology
10.2. Internet Privacy, Internet Security, and Netiquette
10
Financial Systems
Web sites and apps that accept or store
credit card numbers, brokerage
accounts, and bank account information
are prominent hacking targets, because
of the potential for immediate financial
gain from transferring money, making
purchases, or selling the information on
the black market.
In-store payment systems and ATMs
have also been tampered with in order
to gather customer account data and
PINs.
Introduction to Information Technology
10.2. Internet Privacy, Internet Security, and Netiquette
11
Utilities and Industrial
Equipment
Computers control functions at many
utilities, including coordination of
telecommunications, the power grid,
nuclear power plants, and valve
opening and closing in water and gas
networks.
Introduction to Information Technology
10.2. Internet Privacy, Internet Security, and Netiquette
12
The Internet is a potential attack vector
for such machines if connected, but the
Stuxnet worm demonstrated that even
equipment controlled by computers
not connected to the Internet can be
vulnerable to physical damage caused
by malicious commands sent to
industrial equipment (in that case
uranium enrichment centrifuges)
which are infected via removable
media.
Introduction to Information Technology
10.2. Internet Privacy, Internet Security, and Netiquette
13
Stuxnet is a malicious computer worm first uncovered in 2010 and thought to
have been in development since at least 2005. Stuxnet targets supervisory
control and data acquisition (SCADA) systems and is believed to be responsible
for causing substantial damage to the nuclear program of Iran.
https://en.wikipedia.org/wiki/Stuxnet
Introduction to Information Technology
10.2. Internet Privacy, Internet Security, and Netiquette
14
In 2014, the Computer Emergency
Readiness Team, a division of the
Department of Homeland Security,
investigated 79 hacking incidents at
energy companies.
Vulnerabilities in smart meters (many
of which used local radio or cellular
communications) caused some
problems with billing fraud.
Introduction to Information Technology
10.2. Internet Privacy, Internet Security, and Netiquette
15
Aviation
The aviation industry is very reliant on a
series of complex system which could be
attacked.
A simple power outage at one airport can
cause repercussions worldwide, much of
the system relies on radio transmissions
which could be disrupted, and controlling
aircraft over oceans is especially
dangerous because radar surveillance
only extends 175 to 225 miles offshore.
There is also potential for attack from
within an aircraft.
Introduction to Information Technology
10.2. Internet Privacy, Internet Security, and Netiquette
16
The consequences of a successful attack
range from loss of confidentiality to loss
of system integrity, which may lead to
more serious concerns such as
exfiltration of data, network and air
traffic control outages, which in turn can
lead to airport closures, loss of aircraft,
loss of passenger life, damages on the
ground and to transportation
infrastructure.
A successful attack on a military aviation
system that controls munitions could
have even more serious consequences.
Introduction to Information Technology
10.2. Internet Privacy, Internet Security, and Netiquette
17
Introduction to Information Technology
10.2. Internet Privacy, Internet Security, and Netiquette
18
Europe has started to move towards
centralized aviation network PENS
(Pan-European Network Service)
which do provide a common IP-based
network service across the European
region covering voice and data
communication and later on even more
with NewPENS, similar USA has in
NextGen program.
Introduction to Information Technology
10.2. Internet Privacy, Internet Security, and Netiquette
19
Consumer Devices
Desktop computers and laptops are commonly
infected with malware either to gather
passwords or financial account information, or
to construct a botnet to attack another target.
Smart phones, tablet computers, smart watches,
and other mobile devices such as Quantified Self
devices like activity trackers have also become
targets and many of these have sensors such as
cameras, microphones, GPS receivers,
compasses, and accelerometers which could be
exploited, and may collect personal information,
including sensitive health information.
Introduction to Information Technology
10.2. Internet Privacy, Internet Security, and Netiquette
20
Wifi, Bluetooth, and cell phone
networks on any of these devices could
be used as attack vectors, and sensors
might be remotely activated after a
successful breach.
Home automation devices such as the
Nest thermostat are also potential
targets.
Introduction to Information Technology
10.2. Internet Privacy, Internet Security, and Netiquette
21
Large Corporations
Large corporations are common targets.
In many cases this is aimed at financial
gain through identity theft and involves
data breaches such as the loss of
millions of clients’ credit card details by
Home Depot, Staples, and Target
Corporation.
Medical records have been targeted for
use in general identify theft, health
insurance fraud, and impersonating
patients to obtain prescription drugs for
recreational purposes or resale.
Introduction to Information Technology
10.2. Internet Privacy, Internet Security, and Netiquette
22
Not all attacks are financially
motivated however; for example
security firm HB Gary Federal suffered
a serious series of attacks in 2011 from
hacktivist group Anonymous in
retaliation for the firm’s CEO claiming
to have infiltrated their group, and
Sony Pictures was attacked in 2014
where the motive appears to have been
to embarrass with data leaks, and
cripple the company by wiping
workstations and servers.
Introduction to Information Technology
10.2. Internet Privacy, Internet Security, and Netiquette
23
Automobiles
If access is gained to a car’s internal
controller area network, it is possible
to disable the brakes and turn the
steering wheel.
Computerized engine timing, cruise
control, anti-lock brakes, seat belt
tensioners, door locks, airbags and
advanced driver assistance systems
make these disruptions possible, and
self-driving cars go even further.
Introduction to Information Technology
10.2. Internet Privacy, Internet Security, and Netiquette
24
Connected cars may use Wifi and Bluetooth to
communicate with onboard consumer devices,
and the cell phone network to contact
concierge and emergency assistance services
or get navigational or entertainment
information; each of these networks is a
potential entry point for malware or an
attacker.
Researchers were even able to use a malicious
compact disc in a car’s stereo system as a
successful attack vector, and cars with built-in
voice recognition or remote assistance
features have onboard microphones which
could be used for eavesdropping.
Introduction to Information Technology
10.2. Internet Privacy, Internet Security, and Netiquette
25
A 2015 report by U.S. Senator
Edward Markey criticized
manufacturers’ security measures as
inadequate, and also highlighted
privacy concerns about driving,
location, and diagnostic data being
collected, which is vulnerable to
abuse by both manufacturers and
hackers.
Introduction to Information Technology
10.2. Internet Privacy, Internet Security, and Netiquette
26
Government
Government and military computer
systems are commonly attacked by
activists and foreign powers.
Local and regional government
infrastructure such as traffic light
controls, police and intelligence agency
communications, personnel records,
student records, and financial systems
are also potential targets as they are
now all largely computerized.
Passports and government ID cards
that control access to facilities which
use RFID can be vulnerable to cloning.
Introduction to Information Technology
10.2. Internet Privacy, Internet Security, and Netiquette
27
Radio-frequency identification (RFID) uses electromagnetic fields to
automatically identify and track tags attached to objects.
https://en.wikipedia.org/wiki/Radio-frequency_identification
Introduction to Information Technology
10.2. Internet Privacy, Internet Security, and Netiquette
28
Internet of Things and physical
vulnerabilities
The Internet of Things (IoT) is the
network of physical objects such as
devices, vehicles, and buildings that are
embedded with electronics, software,
sensors, and network connectivity that
enables them to collect and exchange
data – and concerns have been raised
that this is being developed without
appropriate consideration of the
security challenges involved.
Introduction to Information Technology
10.2. Internet Privacy, Internet Security, and Netiquette
29
While the IoT creates opportunities for
more direct integration of the physical
world into computer-based systems, it
also provides opportunities for misuse.
In particular, as the Internet of Things
spreads widely, cyber attacks are likely
to become an increasingly physical
(rather than simply virtual) threat.
If a front door’s lock is connected to the
Internet, and can be locked/unlocked
from a phone, then a criminal could
enter the home at the press of a button
from a stolen or hacked phone.
Introduction to Information Technology
10.2. Internet Privacy, Internet Security, and Netiquette
30
People could stand to lose much more
than their credit card numbers in a
world controlled by IoT-enabled
devices.
Thieves have also used electronic
means to circumvent non-Internet-
connected hotel door locks.
Medical devices have either been
successfully attacked or had potentially
deadly vulnerabilities demonstrated,
including both in-hospital diagnostic
equipment and implanted devices
including pacemakers and insulin
pumps.
Introduction to Information Technology
10.2. Internet Privacy, Internet Security, and Netiquette
31
Introduction to Information Technology
10.2. Internet Privacy, Internet Security, and Netiquette
32
Impact of security breaches
Serious financial damage has been
caused by security breaches, but
because there is no standard model for
estimating the cost of an incident, the
only data available is that which is
made public by the organizations
involved.
“Several computer security consulting
firms produce estimates of total
worldwide losses attributable to virus
and worm attacks and to hostile digital
acts in general”.
Introduction to Information Technology
10.2. Internet Privacy, Internet Security, and Netiquette
33
“The 2003 loss estimates by these
firms range from $13 billion (worms
and viruses only) to $226 billion (for
all forms of covert attacks).
The reliability of these estimates is
often challenged; the underlying
methodology is basically anecdotal.”
However, reasonable estimates of the
financial cost of security breaches can
actually help organizations make
rational investment decisions.
Introduction to Information Technology
10.2. Internet Privacy, Internet Security, and Netiquette
34
According to the classic Gordon-
Loeb Model analyzing the optimal
investment level in information
security, one can conclude that the
amount a firm spends to protect
information should generally be only a
small fraction of the expected loss (i.e.,
the expected value of the loss resulting
from a cyber/information security
breach).
Introduction to Information Technology
10.2. Internet Privacy, Internet Security, and Netiquette
35
The Gordon–Loeb model is a
mathematical economic model
analyzing the optimal investment
level in information security.
To draft this model, the company
must possess knowledge of three
parameters:
✓ how much the data is worth;
✓ how much the data is at risk;
✓ the probability an attack on the data is
going to be successful, or
vulnerability.
https://en.wikipedia.org/wiki/Gordon%
E2%80%93Loeb_model
Introduction to Information Technology
10.2. Internet Privacy, Internet Security, and Netiquette
36
Attacker motivation
As with physical security, the
motivations for breaches of computer
security vary between attackers.
Some are thrill-seekers or vandals,
others are activists or criminals looking
for financial gain.
State-sponsored attackers are now
common and well resourced, but
started with amateurs such as Markus
Hess who hacked for the KGB, as
recounted by Clifford Stoll, in The
Cuckoo’s Egg.
Introduction to Information Technology
10.2. Internet Privacy, Internet Security, and Netiquette
37
A standard part of threat modelling for
any particular system is to identify
what might motivate an attack on that
system, and who might be motivated to
breach it.
The level and detail of precautions will
vary depending on the system to be
secured.
A home personal computer, bank, and
classified military network face very
different threats, even when the
underlying technologies in use are
similar.
Introduction to Information Technology
10.2. Internet Privacy, Internet Security, and Netiquette
38
Which motives are behind any cyber-attacks your organization
experienced?
https://www.helpnetsecurity.com/2017/01/11/ransom-motivation-behind-cyber-attacks/
Introduction to Information Technology
10.2. Internet Privacy, Internet Security, and Netiquette
39
Introduction to Information Technology
10.2. Internet Privacy, Internet Security, and Netiquette
40
Computer Security, also
known as cyber security or IT
security, is the protection of
information systems from theft
or damage to the hardware, the
software, and to the information
on them, as well as from
disruption or misdirection of the
services they provide.
Introduction to Information Technology
10.2. Internet Privacy, Internet Security, and Netiquette
41
Web sites and apps that accept or
store credit card numbers,
brokerage accounts, and bank
account information are
prominent hacking targets,
because of the potential for
immediate financial gain from
transferring money, making
purchases, or selling the
information on the black market.
Introduction to Information Technology
10.2. Internet Privacy, Internet Security, and Netiquette
42
Desktop computers and laptops are
commonly infected with malware either
to gather passwords or financial account
information, or to construct a botnet to
attack another target.
Smart phones, tablet computers, smart
watches, and other mobile devices have
sensors such as cameras, microphones,
GPS receivers, compasses, and
accelerometers which could be exploited,
and may collect personal information.
Introduction to Information Technology
10.2. Internet Privacy, Internet Security, and Netiquette
43
If access is gained to a car’s
internal controller area network,
it is possible to disable the brakes
and turn the steering wheel.
Introduction to Information Technology
10.2. Internet Privacy, Internet Security, and Netiquette
44
While the IoT creates
opportunities for more direct
integration of the physical world
into computer-based systems, it
also provides opportunities for
misuse.
In particular, as the Internet of
Things spreads widely, cyber
attacks are likely to become an
increasingly physical (rather than
simply virtual) threat.
Introduction to Information Technology
10.2. Internet Privacy, Internet Security, and Netiquette
45
Serious financial damage has
been caused by security breaches,
but because there is no standard
model for estimating the cost of
an incident, the only data
available is that which is made
public by the organizations
involved.
Introduction to Information Technology
10.2. Internet Privacy, Internet Security, and Netiquette
46
A standard part of threat
modelling for any particular
system is to identify what might
motivate an attack on that
system, and who might be
motivated to breach it.
The level and detail of
precautions will vary depending
on the system to be secured.
Introduction to Information Technology
10.2. Internet Privacy, Internet Security, and Netiquette
47
Introduction to Information Technology
10.2. Internet Privacy, Internet Security, and Netiquette
Introduction to Information Technology
10.2. Internet Privacy, Internet Security, and Netiquette
Textbook
49
https://eng.libretexts.org/Courses/Prince_
Georges_Community_College/INT_1010%
3A_Concepts_in_Computing
Purchase of a book is not
required.
Introduction to Information Technology
10.2. Internet Privacy, Internet Security, and Netiquette
Professor C
50
castellr@pgcc.edu
eLearning Expert
BS & MS in Systems Engineering
BS & MS in Military Science and Arts
HC Dr in Education
IT Professor | Spanish Instructor
LCINT1010.wordpress.com
Presentation created in 01/2022.
Slides last updated on 06/2023
Introduction to Information Technology
10.2. Internet Privacy, Internet Security, and Netiquette
Introduction to Information Technology
INT-1010
Prof C
Luis R Castellanos
51
10.2
Internet Privacy, Internet Security,
and Netiquette:
Internet Security

More Related Content

Similar to INT 1010 10-2.pdf

The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
IJCSIS Research Publications
 
Chapter 8 securing information systems MIS
Chapter 8 securing information systems MISChapter 8 securing information systems MIS
Chapter 8 securing information systems MIS
Amirul Shafiq Ahmad Zuperi
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Things
ijsrd.com
 
Cybersecurity in the Age of IoT - Skillmine
Cybersecurity in the Age of IoT - SkillmineCybersecurity in the Age of IoT - Skillmine
Cybersecurity in the Age of IoT - Skillmine
Skillmine Technology Consulting
 
Rasefiberry: Secure and efficient Raspberry-Pi based gateway for smarthome Io...
Rasefiberry: Secure and efficient Raspberry-Pi based gateway for smarthome Io...Rasefiberry: Secure and efficient Raspberry-Pi based gateway for smarthome Io...
Rasefiberry: Secure and efficient Raspberry-Pi based gateway for smarthome Io...
journalBEEI
 
IBM Xforce Q4 2014
IBM Xforce Q4 2014IBM Xforce Q4 2014
IBM Xforce Q4 2014
Patrick Bouillaud
 
Security and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of ThingsSecurity and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of Things
Somasundaram Jambunathan
 
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxIoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
mariuse18nolet
 
Securing mobile devices in the business environment
Securing mobile devices in the business environmentSecuring mobile devices in the business environment
Securing mobile devices in the business environmentIBM Software India
 
What are the 5G network security issues?
What are the 5G network security issues?What are the 5G network security issues?
What are the 5G network security issues?
Antenna Manufacturer Coco
 
What are the 5G network security issues?
What are the 5G network security issues?What are the 5G network security issues?
What are the 5G network security issues?
Antenna Manufacturer Coco
 
Protecting Americas Next Generation Networks
Protecting Americas Next Generation NetworksProtecting Americas Next Generation Networks
Protecting Americas Next Generation Networks
Digital Policy and Law Consulting
 
Cyber Security Education Materials.pptx
Cyber Security Education Materials.pptxCyber Security Education Materials.pptx
Cyber Security Education Materials.pptx
bentidiane21
 
188
188188
L017326972
L017326972L017326972
L017326972
IOSR Journals
 
Face expressions, facial features, kinect sensor, face tracking SDK, neural n...
Face expressions, facial features, kinect sensor, face tracking SDK, neural n...Face expressions, facial features, kinect sensor, face tracking SDK, neural n...
Face expressions, facial features, kinect sensor, face tracking SDK, neural n...
iosrjce
 
CS155 Computer And Network Security.docx
CS155 Computer And Network Security.docxCS155 Computer And Network Security.docx
CS155 Computer And Network Security.docx
write31
 
Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4Somasundaram Jambunathan
 
U S Embassy Event - Today’S Cyber Threats
U S  Embassy  Event - Today’S  Cyber  ThreatsU S  Embassy  Event - Today’S  Cyber  Threats
U S Embassy Event - Today’S Cyber Threats
Narinrit Prem-apiwathanokul
 

Similar to INT 1010 10-2.pdf (20)

The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
 
Chapter 8 securing information systems MIS
Chapter 8 securing information systems MISChapter 8 securing information systems MIS
Chapter 8 securing information systems MIS
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Things
 
Cybersecurity in the Age of IoT - Skillmine
Cybersecurity in the Age of IoT - SkillmineCybersecurity in the Age of IoT - Skillmine
Cybersecurity in the Age of IoT - Skillmine
 
Rasefiberry: Secure and efficient Raspberry-Pi based gateway for smarthome Io...
Rasefiberry: Secure and efficient Raspberry-Pi based gateway for smarthome Io...Rasefiberry: Secure and efficient Raspberry-Pi based gateway for smarthome Io...
Rasefiberry: Secure and efficient Raspberry-Pi based gateway for smarthome Io...
 
IBM Xforce Q4 2014
IBM Xforce Q4 2014IBM Xforce Q4 2014
IBM Xforce Q4 2014
 
Security and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of ThingsSecurity and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of Things
 
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxIoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
 
Securing mobile devices in the business environment
Securing mobile devices in the business environmentSecuring mobile devices in the business environment
Securing mobile devices in the business environment
 
What are the 5G network security issues?
What are the 5G network security issues?What are the 5G network security issues?
What are the 5G network security issues?
 
What are the 5G network security issues?
What are the 5G network security issues?What are the 5G network security issues?
What are the 5G network security issues?
 
Protecting Americas Next Generation Networks
Protecting Americas Next Generation NetworksProtecting Americas Next Generation Networks
Protecting Americas Next Generation Networks
 
Cyber Security Education Materials.pptx
Cyber Security Education Materials.pptxCyber Security Education Materials.pptx
Cyber Security Education Materials.pptx
 
chile-2015 (2)
chile-2015 (2)chile-2015 (2)
chile-2015 (2)
 
188
188188
188
 
L017326972
L017326972L017326972
L017326972
 
Face expressions, facial features, kinect sensor, face tracking SDK, neural n...
Face expressions, facial features, kinect sensor, face tracking SDK, neural n...Face expressions, facial features, kinect sensor, face tracking SDK, neural n...
Face expressions, facial features, kinect sensor, face tracking SDK, neural n...
 
CS155 Computer And Network Security.docx
CS155 Computer And Network Security.docxCS155 Computer And Network Security.docx
CS155 Computer And Network Security.docx
 
Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4
 
U S Embassy Event - Today’S Cyber Threats
U S  Embassy  Event - Today’S  Cyber  ThreatsU S  Embassy  Event - Today’S  Cyber  Threats
U S Embassy Event - Today’S Cyber Threats
 

More from Luis R Castellanos

INT 1010 08-4.pdf
INT 1010 08-4.pdfINT 1010 08-4.pdf
INT 1010 08-4.pdf
Luis R Castellanos
 
INT 1010 08-3.pdf
INT 1010 08-3.pdfINT 1010 08-3.pdf
INT 1010 08-3.pdf
Luis R Castellanos
 
INT 1010 08-1.pdf
INT 1010 08-1.pdfINT 1010 08-1.pdf
INT 1010 08-1.pdf
Luis R Castellanos
 
INT 1010 04-2.pdf
INT 1010 04-2.pdfINT 1010 04-2.pdf
INT 1010 04-2.pdf
Luis R Castellanos
 
INT 1010 04-3.pdf
INT 1010 04-3.pdfINT 1010 04-3.pdf
INT 1010 04-3.pdf
Luis R Castellanos
 
INT 1010 04-1.pdf
INT 1010 04-1.pdfINT 1010 04-1.pdf
INT 1010 04-1.pdf
Luis R Castellanos
 
INT 1010 04-4.pdf
INT 1010 04-4.pdfINT 1010 04-4.pdf
INT 1010 04-4.pdf
Luis R Castellanos
 
INT 1010 04-5.pdf
INT 1010 04-5.pdfINT 1010 04-5.pdf
INT 1010 04-5.pdf
Luis R Castellanos
 
INT 1010 03.pdf
INT 1010 03.pdfINT 1010 03.pdf
INT 1010 03.pdf
Luis R Castellanos
 
INT 1010 02.pdf
INT 1010 02.pdfINT 1010 02.pdf
INT 1010 02.pdf
Luis R Castellanos
 
INT 1010 01.pdf
INT 1010 01.pdfINT 1010 01.pdf
INT 1010 01.pdf
Luis R Castellanos
 
INT 1010 10-1.pdf
INT 1010 10-1.pdfINT 1010 10-1.pdf
INT 1010 10-1.pdf
Luis R Castellanos
 
INT 1010 10-3.pdf
INT 1010 10-3.pdfINT 1010 10-3.pdf
INT 1010 10-3.pdf
Luis R Castellanos
 
INT 1010 09-1.pdf
INT 1010 09-1.pdfINT 1010 09-1.pdf
INT 1010 09-1.pdf
Luis R Castellanos
 
INT 1010 09-2.pdf
INT 1010 09-2.pdfINT 1010 09-2.pdf
INT 1010 09-2.pdf
Luis R Castellanos
 
INT 1010 08-2.pdf
INT 1010 08-2.pdfINT 1010 08-2.pdf
INT 1010 08-2.pdf
Luis R Castellanos
 
INT 1010 07-4.pdf
INT 1010 07-4.pdfINT 1010 07-4.pdf
INT 1010 07-4.pdf
Luis R Castellanos
 
INT 1010 07-3.pdf
INT 1010 07-3.pdfINT 1010 07-3.pdf
INT 1010 07-3.pdf
Luis R Castellanos
 
INT 1010 07-1.pdf
INT 1010 07-1.pdfINT 1010 07-1.pdf
INT 1010 07-1.pdf
Luis R Castellanos
 
INT 1010 07-6.pdf
INT 1010 07-6.pdfINT 1010 07-6.pdf
INT 1010 07-6.pdf
Luis R Castellanos
 

More from Luis R Castellanos (20)

INT 1010 08-4.pdf
INT 1010 08-4.pdfINT 1010 08-4.pdf
INT 1010 08-4.pdf
 
INT 1010 08-3.pdf
INT 1010 08-3.pdfINT 1010 08-3.pdf
INT 1010 08-3.pdf
 
INT 1010 08-1.pdf
INT 1010 08-1.pdfINT 1010 08-1.pdf
INT 1010 08-1.pdf
 
INT 1010 04-2.pdf
INT 1010 04-2.pdfINT 1010 04-2.pdf
INT 1010 04-2.pdf
 
INT 1010 04-3.pdf
INT 1010 04-3.pdfINT 1010 04-3.pdf
INT 1010 04-3.pdf
 
INT 1010 04-1.pdf
INT 1010 04-1.pdfINT 1010 04-1.pdf
INT 1010 04-1.pdf
 
INT 1010 04-4.pdf
INT 1010 04-4.pdfINT 1010 04-4.pdf
INT 1010 04-4.pdf
 
INT 1010 04-5.pdf
INT 1010 04-5.pdfINT 1010 04-5.pdf
INT 1010 04-5.pdf
 
INT 1010 03.pdf
INT 1010 03.pdfINT 1010 03.pdf
INT 1010 03.pdf
 
INT 1010 02.pdf
INT 1010 02.pdfINT 1010 02.pdf
INT 1010 02.pdf
 
INT 1010 01.pdf
INT 1010 01.pdfINT 1010 01.pdf
INT 1010 01.pdf
 
INT 1010 10-1.pdf
INT 1010 10-1.pdfINT 1010 10-1.pdf
INT 1010 10-1.pdf
 
INT 1010 10-3.pdf
INT 1010 10-3.pdfINT 1010 10-3.pdf
INT 1010 10-3.pdf
 
INT 1010 09-1.pdf
INT 1010 09-1.pdfINT 1010 09-1.pdf
INT 1010 09-1.pdf
 
INT 1010 09-2.pdf
INT 1010 09-2.pdfINT 1010 09-2.pdf
INT 1010 09-2.pdf
 
INT 1010 08-2.pdf
INT 1010 08-2.pdfINT 1010 08-2.pdf
INT 1010 08-2.pdf
 
INT 1010 07-4.pdf
INT 1010 07-4.pdfINT 1010 07-4.pdf
INT 1010 07-4.pdf
 
INT 1010 07-3.pdf
INT 1010 07-3.pdfINT 1010 07-3.pdf
INT 1010 07-3.pdf
 
INT 1010 07-1.pdf
INT 1010 07-1.pdfINT 1010 07-1.pdf
INT 1010 07-1.pdf
 
INT 1010 07-6.pdf
INT 1010 07-6.pdfINT 1010 07-6.pdf
INT 1010 07-6.pdf
 

Recently uploaded

The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
PedroFerreira53928
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
PedroFerreira53928
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
Celine George
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
Steve Thomason
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
Vivekanand Anglo Vedic Academy
 

Recently uploaded (20)

The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
 

INT 1010 10-2.pdf

  • 1. Introduction to Information Technology 10.2. Internet Privacy, Internet Security, and Netiquette Introduction to Information Technology INT-1010 Prof C Luis R Castellanos 1 10 Internet Privacy, Internet Security, and Netiquette
  • 2. Introduction to Information Technology 10.2. Internet Privacy, Internet Security, and Netiquette 2 Internet Privacy Internet Security Netiquette
  • 3. Introduction to Information Technology 10.2. Internet Privacy, Internet Security, and Netiquette Introduction to Information Technology INT-1010 Prof C Luis R Castellanos 2022 3 10.2 Internet Privacy, Internet Security, and Netiquette: Internet Security
  • 4. Introduction to Information Technology 10.2. Internet Privacy, Internet Security, and Netiquette 4
  • 5. Introduction to Information Technology 10.2. Internet Privacy, Internet Security, and Netiquette 5 Computer Security Computer security, also known as cyber security or IT security, is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide.
  • 6. Introduction to Information Technology 10.2. Internet Privacy, Internet Security, and Netiquette 6 It includes controlling physical access to the hardware, as well as protecting against harm that may come via network access, data and code injection, and due to malpractice by operators, whether intentional, accidental, or due to them being tricked into deviating from secure procedures.
  • 7. Introduction to Information Technology 10.2. Internet Privacy, Internet Security, and Netiquette 7 The field is of growing importance due to the increasing reliance on computer systems and the Internet in most societies, wireless networks such as Bluetooth and Wi-Fi – and the growth of “smart” devices, including smartphones, televisions and tiny devices as part of the Internet of Things.
  • 8. Introduction to Information Technology 10.2. Internet Privacy, Internet Security, and Netiquette 8 Systems at Risk Computer security is critical in almost any industry which uses computers. Currently, most electronic devices such as computers, laptops and cellphones come with built in firewall security software, but despite this, computers are not 100 percent accurate and dependable to protect our data. There are many different ways of hacking into computers. It can be done through a network system, clicking into unknown links, connecting to unfamiliar Wi-Fi, downloading software and files from unsafe sites, power consumption, electromagnetic radiation waves, and many more.
  • 9. Introduction to Information Technology 10.2. Internet Privacy, Internet Security, and Netiquette 9 However, computers can be protected through well built software and hardware. By having strong internal interactions of properties, software complexity can prevent software crash and security failure.
  • 10. Introduction to Information Technology 10.2. Internet Privacy, Internet Security, and Netiquette 10 Financial Systems Web sites and apps that accept or store credit card numbers, brokerage accounts, and bank account information are prominent hacking targets, because of the potential for immediate financial gain from transferring money, making purchases, or selling the information on the black market. In-store payment systems and ATMs have also been tampered with in order to gather customer account data and PINs.
  • 11. Introduction to Information Technology 10.2. Internet Privacy, Internet Security, and Netiquette 11 Utilities and Industrial Equipment Computers control functions at many utilities, including coordination of telecommunications, the power grid, nuclear power plants, and valve opening and closing in water and gas networks.
  • 12. Introduction to Information Technology 10.2. Internet Privacy, Internet Security, and Netiquette 12 The Internet is a potential attack vector for such machines if connected, but the Stuxnet worm demonstrated that even equipment controlled by computers not connected to the Internet can be vulnerable to physical damage caused by malicious commands sent to industrial equipment (in that case uranium enrichment centrifuges) which are infected via removable media.
  • 13. Introduction to Information Technology 10.2. Internet Privacy, Internet Security, and Netiquette 13 Stuxnet is a malicious computer worm first uncovered in 2010 and thought to have been in development since at least 2005. Stuxnet targets supervisory control and data acquisition (SCADA) systems and is believed to be responsible for causing substantial damage to the nuclear program of Iran. https://en.wikipedia.org/wiki/Stuxnet
  • 14. Introduction to Information Technology 10.2. Internet Privacy, Internet Security, and Netiquette 14 In 2014, the Computer Emergency Readiness Team, a division of the Department of Homeland Security, investigated 79 hacking incidents at energy companies. Vulnerabilities in smart meters (many of which used local radio or cellular communications) caused some problems with billing fraud.
  • 15. Introduction to Information Technology 10.2. Internet Privacy, Internet Security, and Netiquette 15 Aviation The aviation industry is very reliant on a series of complex system which could be attacked. A simple power outage at one airport can cause repercussions worldwide, much of the system relies on radio transmissions which could be disrupted, and controlling aircraft over oceans is especially dangerous because radar surveillance only extends 175 to 225 miles offshore. There is also potential for attack from within an aircraft.
  • 16. Introduction to Information Technology 10.2. Internet Privacy, Internet Security, and Netiquette 16 The consequences of a successful attack range from loss of confidentiality to loss of system integrity, which may lead to more serious concerns such as exfiltration of data, network and air traffic control outages, which in turn can lead to airport closures, loss of aircraft, loss of passenger life, damages on the ground and to transportation infrastructure. A successful attack on a military aviation system that controls munitions could have even more serious consequences.
  • 17. Introduction to Information Technology 10.2. Internet Privacy, Internet Security, and Netiquette 17
  • 18. Introduction to Information Technology 10.2. Internet Privacy, Internet Security, and Netiquette 18 Europe has started to move towards centralized aviation network PENS (Pan-European Network Service) which do provide a common IP-based network service across the European region covering voice and data communication and later on even more with NewPENS, similar USA has in NextGen program.
  • 19. Introduction to Information Technology 10.2. Internet Privacy, Internet Security, and Netiquette 19 Consumer Devices Desktop computers and laptops are commonly infected with malware either to gather passwords or financial account information, or to construct a botnet to attack another target. Smart phones, tablet computers, smart watches, and other mobile devices such as Quantified Self devices like activity trackers have also become targets and many of these have sensors such as cameras, microphones, GPS receivers, compasses, and accelerometers which could be exploited, and may collect personal information, including sensitive health information.
  • 20. Introduction to Information Technology 10.2. Internet Privacy, Internet Security, and Netiquette 20 Wifi, Bluetooth, and cell phone networks on any of these devices could be used as attack vectors, and sensors might be remotely activated after a successful breach. Home automation devices such as the Nest thermostat are also potential targets.
  • 21. Introduction to Information Technology 10.2. Internet Privacy, Internet Security, and Netiquette 21 Large Corporations Large corporations are common targets. In many cases this is aimed at financial gain through identity theft and involves data breaches such as the loss of millions of clients’ credit card details by Home Depot, Staples, and Target Corporation. Medical records have been targeted for use in general identify theft, health insurance fraud, and impersonating patients to obtain prescription drugs for recreational purposes or resale.
  • 22. Introduction to Information Technology 10.2. Internet Privacy, Internet Security, and Netiquette 22 Not all attacks are financially motivated however; for example security firm HB Gary Federal suffered a serious series of attacks in 2011 from hacktivist group Anonymous in retaliation for the firm’s CEO claiming to have infiltrated their group, and Sony Pictures was attacked in 2014 where the motive appears to have been to embarrass with data leaks, and cripple the company by wiping workstations and servers.
  • 23. Introduction to Information Technology 10.2. Internet Privacy, Internet Security, and Netiquette 23 Automobiles If access is gained to a car’s internal controller area network, it is possible to disable the brakes and turn the steering wheel. Computerized engine timing, cruise control, anti-lock brakes, seat belt tensioners, door locks, airbags and advanced driver assistance systems make these disruptions possible, and self-driving cars go even further.
  • 24. Introduction to Information Technology 10.2. Internet Privacy, Internet Security, and Netiquette 24 Connected cars may use Wifi and Bluetooth to communicate with onboard consumer devices, and the cell phone network to contact concierge and emergency assistance services or get navigational or entertainment information; each of these networks is a potential entry point for malware or an attacker. Researchers were even able to use a malicious compact disc in a car’s stereo system as a successful attack vector, and cars with built-in voice recognition or remote assistance features have onboard microphones which could be used for eavesdropping.
  • 25. Introduction to Information Technology 10.2. Internet Privacy, Internet Security, and Netiquette 25 A 2015 report by U.S. Senator Edward Markey criticized manufacturers’ security measures as inadequate, and also highlighted privacy concerns about driving, location, and diagnostic data being collected, which is vulnerable to abuse by both manufacturers and hackers.
  • 26. Introduction to Information Technology 10.2. Internet Privacy, Internet Security, and Netiquette 26 Government Government and military computer systems are commonly attacked by activists and foreign powers. Local and regional government infrastructure such as traffic light controls, police and intelligence agency communications, personnel records, student records, and financial systems are also potential targets as they are now all largely computerized. Passports and government ID cards that control access to facilities which use RFID can be vulnerable to cloning.
  • 27. Introduction to Information Technology 10.2. Internet Privacy, Internet Security, and Netiquette 27 Radio-frequency identification (RFID) uses electromagnetic fields to automatically identify and track tags attached to objects. https://en.wikipedia.org/wiki/Radio-frequency_identification
  • 28. Introduction to Information Technology 10.2. Internet Privacy, Internet Security, and Netiquette 28 Internet of Things and physical vulnerabilities The Internet of Things (IoT) is the network of physical objects such as devices, vehicles, and buildings that are embedded with electronics, software, sensors, and network connectivity that enables them to collect and exchange data – and concerns have been raised that this is being developed without appropriate consideration of the security challenges involved.
  • 29. Introduction to Information Technology 10.2. Internet Privacy, Internet Security, and Netiquette 29 While the IoT creates opportunities for more direct integration of the physical world into computer-based systems, it also provides opportunities for misuse. In particular, as the Internet of Things spreads widely, cyber attacks are likely to become an increasingly physical (rather than simply virtual) threat. If a front door’s lock is connected to the Internet, and can be locked/unlocked from a phone, then a criminal could enter the home at the press of a button from a stolen or hacked phone.
  • 30. Introduction to Information Technology 10.2. Internet Privacy, Internet Security, and Netiquette 30 People could stand to lose much more than their credit card numbers in a world controlled by IoT-enabled devices. Thieves have also used electronic means to circumvent non-Internet- connected hotel door locks. Medical devices have either been successfully attacked or had potentially deadly vulnerabilities demonstrated, including both in-hospital diagnostic equipment and implanted devices including pacemakers and insulin pumps.
  • 31. Introduction to Information Technology 10.2. Internet Privacy, Internet Security, and Netiquette 31
  • 32. Introduction to Information Technology 10.2. Internet Privacy, Internet Security, and Netiquette 32 Impact of security breaches Serious financial damage has been caused by security breaches, but because there is no standard model for estimating the cost of an incident, the only data available is that which is made public by the organizations involved. “Several computer security consulting firms produce estimates of total worldwide losses attributable to virus and worm attacks and to hostile digital acts in general”.
  • 33. Introduction to Information Technology 10.2. Internet Privacy, Internet Security, and Netiquette 33 “The 2003 loss estimates by these firms range from $13 billion (worms and viruses only) to $226 billion (for all forms of covert attacks). The reliability of these estimates is often challenged; the underlying methodology is basically anecdotal.” However, reasonable estimates of the financial cost of security breaches can actually help organizations make rational investment decisions.
  • 34. Introduction to Information Technology 10.2. Internet Privacy, Internet Security, and Netiquette 34 According to the classic Gordon- Loeb Model analyzing the optimal investment level in information security, one can conclude that the amount a firm spends to protect information should generally be only a small fraction of the expected loss (i.e., the expected value of the loss resulting from a cyber/information security breach).
  • 35. Introduction to Information Technology 10.2. Internet Privacy, Internet Security, and Netiquette 35 The Gordon–Loeb model is a mathematical economic model analyzing the optimal investment level in information security. To draft this model, the company must possess knowledge of three parameters: ✓ how much the data is worth; ✓ how much the data is at risk; ✓ the probability an attack on the data is going to be successful, or vulnerability. https://en.wikipedia.org/wiki/Gordon% E2%80%93Loeb_model
  • 36. Introduction to Information Technology 10.2. Internet Privacy, Internet Security, and Netiquette 36 Attacker motivation As with physical security, the motivations for breaches of computer security vary between attackers. Some are thrill-seekers or vandals, others are activists or criminals looking for financial gain. State-sponsored attackers are now common and well resourced, but started with amateurs such as Markus Hess who hacked for the KGB, as recounted by Clifford Stoll, in The Cuckoo’s Egg.
  • 37. Introduction to Information Technology 10.2. Internet Privacy, Internet Security, and Netiquette 37 A standard part of threat modelling for any particular system is to identify what might motivate an attack on that system, and who might be motivated to breach it. The level and detail of precautions will vary depending on the system to be secured. A home personal computer, bank, and classified military network face very different threats, even when the underlying technologies in use are similar.
  • 38. Introduction to Information Technology 10.2. Internet Privacy, Internet Security, and Netiquette 38 Which motives are behind any cyber-attacks your organization experienced? https://www.helpnetsecurity.com/2017/01/11/ransom-motivation-behind-cyber-attacks/
  • 39. Introduction to Information Technology 10.2. Internet Privacy, Internet Security, and Netiquette 39
  • 40. Introduction to Information Technology 10.2. Internet Privacy, Internet Security, and Netiquette 40 Computer Security, also known as cyber security or IT security, is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide.
  • 41. Introduction to Information Technology 10.2. Internet Privacy, Internet Security, and Netiquette 41 Web sites and apps that accept or store credit card numbers, brokerage accounts, and bank account information are prominent hacking targets, because of the potential for immediate financial gain from transferring money, making purchases, or selling the information on the black market.
  • 42. Introduction to Information Technology 10.2. Internet Privacy, Internet Security, and Netiquette 42 Desktop computers and laptops are commonly infected with malware either to gather passwords or financial account information, or to construct a botnet to attack another target. Smart phones, tablet computers, smart watches, and other mobile devices have sensors such as cameras, microphones, GPS receivers, compasses, and accelerometers which could be exploited, and may collect personal information.
  • 43. Introduction to Information Technology 10.2. Internet Privacy, Internet Security, and Netiquette 43 If access is gained to a car’s internal controller area network, it is possible to disable the brakes and turn the steering wheel.
  • 44. Introduction to Information Technology 10.2. Internet Privacy, Internet Security, and Netiquette 44 While the IoT creates opportunities for more direct integration of the physical world into computer-based systems, it also provides opportunities for misuse. In particular, as the Internet of Things spreads widely, cyber attacks are likely to become an increasingly physical (rather than simply virtual) threat.
  • 45. Introduction to Information Technology 10.2. Internet Privacy, Internet Security, and Netiquette 45 Serious financial damage has been caused by security breaches, but because there is no standard model for estimating the cost of an incident, the only data available is that which is made public by the organizations involved.
  • 46. Introduction to Information Technology 10.2. Internet Privacy, Internet Security, and Netiquette 46 A standard part of threat modelling for any particular system is to identify what might motivate an attack on that system, and who might be motivated to breach it. The level and detail of precautions will vary depending on the system to be secured.
  • 47. Introduction to Information Technology 10.2. Internet Privacy, Internet Security, and Netiquette 47
  • 48. Introduction to Information Technology 10.2. Internet Privacy, Internet Security, and Netiquette
  • 49. Introduction to Information Technology 10.2. Internet Privacy, Internet Security, and Netiquette Textbook 49 https://eng.libretexts.org/Courses/Prince_ Georges_Community_College/INT_1010% 3A_Concepts_in_Computing Purchase of a book is not required.
  • 50. Introduction to Information Technology 10.2. Internet Privacy, Internet Security, and Netiquette Professor C 50 castellr@pgcc.edu eLearning Expert BS & MS in Systems Engineering BS & MS in Military Science and Arts HC Dr in Education IT Professor | Spanish Instructor LCINT1010.wordpress.com Presentation created in 01/2022. Slides last updated on 06/2023
  • 51. Introduction to Information Technology 10.2. Internet Privacy, Internet Security, and Netiquette Introduction to Information Technology INT-1010 Prof C Luis R Castellanos 51 10.2 Internet Privacy, Internet Security, and Netiquette: Internet Security