SlideShare a Scribd company logo
1 of 49
Chapter 3
Computer and Internet Crime
 Security of information technology is of
utmost importance
 Safeguard:
 Confidential business data
 Private customer and employee data
 Protect against malicious acts of theft or
disruption
 Balance against other business needs and issues
 Number of IT-related security incidents is
increasing around the world
Ethics in Information Technology, Fourth Edition
 Increasing complexity increases vulnerability
 Computing environment is enormously complex
 Continues to increase in complexity
 Number of entry points expands continuously
 Cloud computing and virtualization software
 Higher computer user expectations
 Computer help desks under intense pressure
 Forget to verify users’ IDs or check authorizations
 Computer users share login IDs and passwords
Ethics in Information Technology, Fourth Edition
 Expanding/changing systems equal new risks
 Network era
 Personal computers connect to networks with millions
of other computers
 All capable of sharing information
 Information technology
 Ubiquitous
 Necessary tool for organizations to achieve goals
 Increasingly difficult to match pace of technological
change
Ethics in Information Technology, Fourth Edition
 Increased reliance on commercial software
with known vulnerabilities
 Exploit
 Attack on information system
 Takes advantage of system vulnerability
 Due to poor system design or implementation
 Patch
 “Fix” to eliminate the problem
 Users are responsible for obtaining and installing
 Delays expose users to security breaches
Ethics in Information Technology, Fourth Edition
 Zero-day attack
 Before a vulnerability is discovered or fixed
 U.S. companies rely on commercial software
with known vulnerabilities
Ethics in Information Technology, Fourth Edition
 Computers as well as smartphones can be
target
 Types of attacks
 Virus
 Worm
 Trojan horse
 Distributed denial of service
 Rootkit
 Spam
 Phishing (spear-phishing, smishing, and vishing)
Ethics in Information Technology, Fourth Edition
 Pieces of programming code
 Usually disguised as something else
 Cause unexpected and undesirable behavior
 Often attached to files
 Deliver a “payload”
 Spread by actions of the “infected”
computer user
 Infected e-mail document attachments
 Downloads of infected programs
 Visits to infected Web sites
Ethics in Information Technology, Fourth Edition
 Harmful programs
 Reside in active memory of a computer
 Duplicate themselves
 Can propagate without human intervention
 Negative impact of worm attack
 Lost data and programs
 Lost productivity
 Additional effort for IT workers
Ethics in Information Technology, Fourth Edition
 Malicious code hidden inside seemingly
harmless programs
 Users are tricked into installing them
 Delivered via email attachment, downloaded
from a Web site, or contracted via a
removable media device
 Logic bomb
 Executes when triggered by certain event
Ethics in Information Technology, Fourth Edition
 Malicious hacker takes over computers on the
Internet and causes them to flood a target
site with demands for data and other small
tasks
 The computers that are taken over are called
zombies
 Botnet is a very large group of such computers
 Does not involve a break-in at the target
computer
 Target machine is busy responding to a stream of
automated requests
 Legitimate users cannot access target machine
Ethics in Information Technology, Fourth Edition
 Set of programs that enables its user to gain
administrator-level access to a computer
without the end user’s consent or knowledge
 Attacker can gain full control of the system
and even obscure the presence of the rootkit
 Fundamental problem in detecting a rootkit
is that the operating system currently
running cannot be trusted to provide valid
test results
Ethics in Information Technology, Fourth Edition
 Abuse of email systems to send unsolicited
email to large numbers of people
 Low-cost commercial advertising for
questionable products
 Method of marketing also used by many
legitimate organizations
 Controlling the Assault of Non-Solicited
Pornography and Marketing (CAN-SPAM) Act
 Legal to spam if basic requirements are met
Ethics in Information Technology, Fourth Edition
 Completely Automated Public Turing Test to
Tell Computers and Humans Apart (CAPTCHA)
 Software generates tests that humans can pass
but computer programs cannot
Ethics in Information Technology, Fourth Edition
 Act of using email fraudulently to try to get
the recipient to reveal personal data
 Legitimate-looking emails lead users to
counterfeit Web sites
 Spear-phishing
 Fraudulent emails to an organization’s employees
 Smishing
 Phishing via text messages
 Vishing
 Phishing via voice mail messages
Ethics in Information Technology, Fourth Edition
Ethics in Information Technology, Fourth Edition
 Perpetrators include:
 Thrill seekers wanting a challenge
 Common criminals looking for financial gain
 Industrial spies trying to gain an advantage
 Terrorists seeking to cause destruction
 Different objectives and access to varying
resources
 Willing to take different levels of risk to
accomplish an objective
Ethics in Information Technology, Fourth Edition
Ethics in Information Technology, Fourth Edition
 Hackers
 Test limitations of systems out of intellectual
curiosity
 Some smart and talented
 Others inept; termed “lamers” or “script kiddies”
 Crackers
 Cracking is a form of hacking
 Clearly criminal activity
Ethics in Information Technology, Fourth Edition
 Major security concern for companies
 Fraud within an organization is usually due to
weaknesses in internal control procedures
 Collusion
 Cooperation between an employee and an
outsider
 Insiders are not necessarily employees
 Can also be consultants and contractors
 Extremely difficult to detect or stop
 Authorized to access the very systems they abuse
 Negligent insiders have potential to cause
damage
Ethics in Information Technology, Fourth Edition
 Use illegal means to obtain trade secrets
from competitors
 Trade secrets are protected by the Economic
Espionage Act of 1996
 Competitive intelligence
 Uses legal techniques
 Gathers information available to the public
 Industrial espionage
 Uses illegal means
 Obtains information not available to the public
Ethics in Information Technology, Fourth Edition
 Hack into corporate computers to steal
 Engage in all forms of computer fraud
 Chargebacks are disputed transactions
 Loss of customer trust has more impact than
fraud
 To reduce potential for online credit card
fraud:
 Use encryption technology
 Verify the address submitted online against the
issuing bank
 Request a card verification value (CVV)
 Use transaction-risk scoring software
Ethics in Information Technology, Fourth Edition
 Smart cards
 Contain a memory chip
 Updated with encrypted data each time card is
used
 Used widely in Europe
 Not widely used in the U.S.
Ethics in Information Technology, Fourth Edition
 Hacktivism
 Hacking to achieve a political or social goal
 Cyberterrorist
 Attacks computers or networks in an attempt to
intimidate or coerce a government in order to
advance certain political or social objectives
 Seeks to cause harm rather than gather
information
 Uses techniques that destroy or disrupt services
Ethics in Information Technology, Fourth Edition
Ethics in Information Technology, Fourth Edition
 Trustworthy computing
 Delivers secure, private, and reliable computing
 Based on sound business practices
Ethics in Information Technology, Fourth Edition
 Security of any system or network
 Combination of technology, policy, and people
 Requires a wide range of activities to be
effective
 Systems must be monitored to detect
possible intrusion
 Clear reaction plan addresses:
 Notification, evidence protection, activity log
maintenance, containment, eradication, and
recovery
Ethics in Information Technology, Fourth Edition
 Process of assessing security-related risks:
 To an organization’s computers and networks
 From both internal and external threats
 Identifies investments that best protect from
most likely and serious threats
 Focuses security efforts on areas of highest
payoff
Ethics in Information Technology, Fourth Edition
 Eight-step risk assessment process
 #1 Identify assets of most concern
 #2 Identify loss events that could occur
 #3 Assess likelihood of each potential threat
 #4 Determine the impact of each threat
 #5 Determine how each threat could be
mitigated
 #6 Assess feasibility of mitigation options
 #7 Perform cost-benefit analysis
 #8 Decide which countermeasures to implement
Ethics in Information Technology, Fourth Edition
Ethics in Information Technology, Fourth Edition
Ethics in Information Technology, Fourth Edition
 A security policy defines:
 Organization’s security requirements
 Controls and sanctions needed to meet the
requirements
 Delineates responsibilities and expected
behavior
 Outlines what needs to be done
 Not how to do it
 Automated system policies should mirror
written policies
Ethics in Information Technology, Fourth Edition
 Trade-off between:
 Ease of use
 Increased security
 Areas of concern
 Email attachments
 Wireless devices
 VPN uses the Internet to relay
communications but maintains privacy
through security features
 Additional security includes encrypting
originating and receiving network addresses
Ethics in Information Technology, Fourth Edition
 Educate and motivate users to understand
and follow policy
 Discuss recent security incidents
 Help protect information systems by:
 Guarding passwords
 Not allowing sharing of passwords
 Applying strict access controls to protect data
 Reporting all unusual activity
 Protecting portable computing and data storage
devices
Ethics in Information Technology, Fourth Edition
 Implement a layered security solution
 Make computer break-ins harder
 Installing a corporate firewall
 Limits network access
 Intrusion prevention systems
 Block viruses, malformed packets, and other
threats
 Installing antivirus software
 Scans for sequence of bytes or virus signature
 United States Computer Emergency Readiness
Team (US-CERT) serves as clearinghouse
Ethics in Information Technology, Fourth Edition
Ethics in Information Technology, Fourth Edition
Ethics in Information Technology, Fourth Edition
 Safeguards against attacks by malicious
insiders
 Departing employees and contractors
 Promptly delete computer accounts, login IDs,
and passwords
 Carefully define employee roles and separate
key responsibilities
 Create roles and user accounts to limit
authority
Ethics in Information Technology, Fourth Edition
 Defending against cyberterrorism
 Department of Homeland Security and its
National Cyber Security Division (NCSD) is a
resource
 Builds and maintains a national security cyberspace
response system
 Implements a cyber-risk management program for
protection of critical infrastructure, including banking
and finance, water, government operations, and
emergency services
Ethics in Information Technology, Fourth Edition
 Conduct periodic IT security audits
 Evaluate policies and whether they are followed
 Review access and levels of authority
 Test system safeguards
 Information Protection Assessment kit is available
from the Computer Security Institute
Ethics in Information Technology, Fourth Edition
 Detection systems
 Catch intruders in the act
 Intrusion detection system
 Monitors system/network resources and activities
 Notifies the proper authority when it identifies:
 Possible intrusions from outside the organization
 Misuse from within the organization
 Knowledge-based approach
 Behavior-based approach
Ethics in Information Technology, Fourth Edition
 Response plan
 Develop well in advance of any incident
 Approved by:
 Legal department
 Senior management
 Primary goals
 Regain control and limit damage
 Not to monitor or catch an intruder
 Only 56% have response plan
Ethics in Information Technology, Fourth Edition
 Incident notification defines:
 Who to notify
 Who not to notify
 Security experts recommend against
releasing specific information about a
security compromise in public forums
 Document all details of a security incident
 All system events
 Specific actions taken
 All external conversations
Ethics in Information Technology, Fourth Edition
 Act quickly to contain an attack
 Eradication effort
 Collect and log all possible criminal evidence
 Verify necessary backups are current and
complete
 Create new backups
 Follow-up
 Determine how security was compromised
 Prevent it from happening again
Ethics in Information Technology, Fourth Edition
 Review
 Determine exactly what happened
 Evaluate how the organization responded
 Weigh carefully the amount of effort
required to capture the perpetrator
 Consider the potential for negative publicity
 Legal precedent
 Hold organizations accountable for their own IT
security weaknesses
Ethics in Information Technology, Fourth Edition
 Combines elements of law and computer
science to identify, collect, examine, and
preserve data and preserve its integrity so it
is admissible as evidence
 Computer forensics investigation requires
extensive training and certification and
knowledge of laws that apply to gathering of
criminal evidence
Ethics in Information Technology, Fourth Edition
 Ethical decisions in determining which
information systems and data most need
protection
 Most common computer exploits
 Viruses
 Worms
 Trojan horses
 Distributed denial-of-service attacks
 Rootkits
 Spam
 Phishing, spear-fishing, smishing, vishing
Ethics in Information Technology, Fourth Edition
 Perpetrators include:
 Hackers
 Crackers
 Malicious insider
 Industrial spies
 Cybercriminals
 Hacktivist
 Cyberterrorists
Ethics in Information Technology, Fourth Edition
 Must implement multilayer process for
managing security vulnerabilities, including:
 Assessment of threats
 Identifying actions to address vulnerabilities
 User education
 IT must lead the effort to implement:
 Security policies and procedures
 Hardware and software to prevent security
breaches
 Computer forensics is key to fighting
computer crime in a court of law
Ethics in Information Technology, Fourth Edition

More Related Content

Similar to Lecture-3.ppt

Chap13 Security and Ethical Challenges
Chap13 Security and Ethical ChallengesChap13 Security and Ethical Challenges
Chap13 Security and Ethical ChallengesAqib Syed
 
obrien13e_chap011.ppt
obrien13e_chap011.pptobrien13e_chap011.ppt
obrien13e_chap011.pptPradeep513562
 
E-COMMERCE SYSTEMS SECURITY FOR SMALL BUSINESSES
E-COMMERCE SYSTEMS SECURITY FOR SMALL BUSINESSESE-COMMERCE SYSTEMS SECURITY FOR SMALL BUSINESSES
E-COMMERCE SYSTEMS SECURITY FOR SMALL BUSINESSESIJNSA Journal
 
Ecommerce security
Ecommerce securityEcommerce security
Ecommerce securitypolitegcuf
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy IntroductionG Prachi
 
Security and ethical challenges in mis
Security and ethical challenges in misSecurity and ethical challenges in mis
Security and ethical challenges in misI P Abir
 
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN                   .docxRunning head CYBERSECURITY IN FINANCIAL DOMAIN                   .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docxhealdkathaleen
 
Edu 03 assingment
Edu 03 assingmentEdu 03 assingment
Edu 03 assingmentAswani34
 
First Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxFirst Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxCUInnovationTeam
 
Secure Computer Forensics and its tools
Secure Computer Forensics and its toolsSecure Computer Forensics and its tools
Secure Computer Forensics and its toolsKathirvel Ayyaswamy
 
7 Types of Cyber Security Threats | The Lifesciences Magazine
7 Types of Cyber Security Threats | The Lifesciences Magazine7 Types of Cyber Security Threats | The Lifesciences Magazine
7 Types of Cyber Security Threats | The Lifesciences MagazineThe Lifesciences Magazine
 
Cyber security.docx
Cyber security.docxCyber security.docx
Cyber security.docxsaivarun91
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hackingchakrekevin
 

Similar to Lecture-3.ppt (20)

Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
 
Ch01 Introduction to Security
Ch01 Introduction to SecurityCh01 Introduction to Security
Ch01 Introduction to Security
 
Chap13 Security and Ethical Challenges
Chap13 Security and Ethical ChallengesChap13 Security and Ethical Challenges
Chap13 Security and Ethical Challenges
 
obrien13e_chap011.ppt
obrien13e_chap011.pptobrien13e_chap011.ppt
obrien13e_chap011.ppt
 
E-COMMERCE SYSTEMS SECURITY FOR SMALL BUSINESSES
E-COMMERCE SYSTEMS SECURITY FOR SMALL BUSINESSESE-COMMERCE SYSTEMS SECURITY FOR SMALL BUSINESSES
E-COMMERCE SYSTEMS SECURITY FOR SMALL BUSINESSES
 
CS 1.ppt
CS 1.pptCS 1.ppt
CS 1.ppt
 
Ecommerce security
Ecommerce securityEcommerce security
Ecommerce security
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy Introduction
 
Security and ethical challenges in mis
Security and ethical challenges in misSecurity and ethical challenges in mis
Security and ethical challenges in mis
 
Information security threats
Information security threatsInformation security threats
Information security threats
 
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN                   .docxRunning head CYBERSECURITY IN FINANCIAL DOMAIN                   .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docx
 
Edu 03 assingment
Edu 03 assingmentEdu 03 assingment
Edu 03 assingment
 
First Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxFirst Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptx
 
Secure Computer Forensics and its tools
Secure Computer Forensics and its toolsSecure Computer Forensics and its tools
Secure Computer Forensics and its tools
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
7 Types of Cyber Security Threats | The Lifesciences Magazine
7 Types of Cyber Security Threats | The Lifesciences Magazine7 Types of Cyber Security Threats | The Lifesciences Magazine
7 Types of Cyber Security Threats | The Lifesciences Magazine
 
Cyber security.docx
Cyber security.docxCyber security.docx
Cyber security.docx
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
Chapter 8 securing information systems MIS
Chapter 8 securing information systems MISChapter 8 securing information systems MIS
Chapter 8 securing information systems MIS
 
C018131821
C018131821C018131821
C018131821
 

Recently uploaded

'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
 
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service PuneVIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service PuneCall girls in Ahmedabad High profile
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts servicevipmodelshub1
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Roomdivyansh0kumar0
 
Gram Darshan PPT cyber rural in villages of india
Gram Darshan PPT cyber rural  in villages of indiaGram Darshan PPT cyber rural  in villages of india
Gram Darshan PPT cyber rural in villages of indiaimessage0108
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Delhi Call girls
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...SofiyaSharma5
 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsstephieert
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Roomdivyansh0kumar0
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024APNIC
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girladitipandeya
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607dollysharma2066
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGAPNIC
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersDamian Radcliffe
 

Recently uploaded (20)

'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service PuneVIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
 
Gram Darshan PPT cyber rural in villages of india
Gram Darshan PPT cyber rural  in villages of indiaGram Darshan PPT cyber rural  in villages of india
Gram Darshan PPT cyber rural in villages of india
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girls
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
 
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
 
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
 

Lecture-3.ppt

  • 1. Chapter 3 Computer and Internet Crime
  • 2.  Security of information technology is of utmost importance  Safeguard:  Confidential business data  Private customer and employee data  Protect against malicious acts of theft or disruption  Balance against other business needs and issues  Number of IT-related security incidents is increasing around the world Ethics in Information Technology, Fourth Edition
  • 3.  Increasing complexity increases vulnerability  Computing environment is enormously complex  Continues to increase in complexity  Number of entry points expands continuously  Cloud computing and virtualization software  Higher computer user expectations  Computer help desks under intense pressure  Forget to verify users’ IDs or check authorizations  Computer users share login IDs and passwords Ethics in Information Technology, Fourth Edition
  • 4.  Expanding/changing systems equal new risks  Network era  Personal computers connect to networks with millions of other computers  All capable of sharing information  Information technology  Ubiquitous  Necessary tool for organizations to achieve goals  Increasingly difficult to match pace of technological change Ethics in Information Technology, Fourth Edition
  • 5.  Increased reliance on commercial software with known vulnerabilities  Exploit  Attack on information system  Takes advantage of system vulnerability  Due to poor system design or implementation  Patch  “Fix” to eliminate the problem  Users are responsible for obtaining and installing  Delays expose users to security breaches Ethics in Information Technology, Fourth Edition
  • 6.  Zero-day attack  Before a vulnerability is discovered or fixed  U.S. companies rely on commercial software with known vulnerabilities Ethics in Information Technology, Fourth Edition
  • 7.  Computers as well as smartphones can be target  Types of attacks  Virus  Worm  Trojan horse  Distributed denial of service  Rootkit  Spam  Phishing (spear-phishing, smishing, and vishing) Ethics in Information Technology, Fourth Edition
  • 8.  Pieces of programming code  Usually disguised as something else  Cause unexpected and undesirable behavior  Often attached to files  Deliver a “payload”  Spread by actions of the “infected” computer user  Infected e-mail document attachments  Downloads of infected programs  Visits to infected Web sites Ethics in Information Technology, Fourth Edition
  • 9.  Harmful programs  Reside in active memory of a computer  Duplicate themselves  Can propagate without human intervention  Negative impact of worm attack  Lost data and programs  Lost productivity  Additional effort for IT workers Ethics in Information Technology, Fourth Edition
  • 10.  Malicious code hidden inside seemingly harmless programs  Users are tricked into installing them  Delivered via email attachment, downloaded from a Web site, or contracted via a removable media device  Logic bomb  Executes when triggered by certain event Ethics in Information Technology, Fourth Edition
  • 11.  Malicious hacker takes over computers on the Internet and causes them to flood a target site with demands for data and other small tasks  The computers that are taken over are called zombies  Botnet is a very large group of such computers  Does not involve a break-in at the target computer  Target machine is busy responding to a stream of automated requests  Legitimate users cannot access target machine Ethics in Information Technology, Fourth Edition
  • 12.  Set of programs that enables its user to gain administrator-level access to a computer without the end user’s consent or knowledge  Attacker can gain full control of the system and even obscure the presence of the rootkit  Fundamental problem in detecting a rootkit is that the operating system currently running cannot be trusted to provide valid test results Ethics in Information Technology, Fourth Edition
  • 13.  Abuse of email systems to send unsolicited email to large numbers of people  Low-cost commercial advertising for questionable products  Method of marketing also used by many legitimate organizations  Controlling the Assault of Non-Solicited Pornography and Marketing (CAN-SPAM) Act  Legal to spam if basic requirements are met Ethics in Information Technology, Fourth Edition
  • 14.  Completely Automated Public Turing Test to Tell Computers and Humans Apart (CAPTCHA)  Software generates tests that humans can pass but computer programs cannot Ethics in Information Technology, Fourth Edition
  • 15.  Act of using email fraudulently to try to get the recipient to reveal personal data  Legitimate-looking emails lead users to counterfeit Web sites  Spear-phishing  Fraudulent emails to an organization’s employees  Smishing  Phishing via text messages  Vishing  Phishing via voice mail messages Ethics in Information Technology, Fourth Edition
  • 16. Ethics in Information Technology, Fourth Edition
  • 17.  Perpetrators include:  Thrill seekers wanting a challenge  Common criminals looking for financial gain  Industrial spies trying to gain an advantage  Terrorists seeking to cause destruction  Different objectives and access to varying resources  Willing to take different levels of risk to accomplish an objective Ethics in Information Technology, Fourth Edition
  • 18. Ethics in Information Technology, Fourth Edition
  • 19.  Hackers  Test limitations of systems out of intellectual curiosity  Some smart and talented  Others inept; termed “lamers” or “script kiddies”  Crackers  Cracking is a form of hacking  Clearly criminal activity Ethics in Information Technology, Fourth Edition
  • 20.  Major security concern for companies  Fraud within an organization is usually due to weaknesses in internal control procedures  Collusion  Cooperation between an employee and an outsider  Insiders are not necessarily employees  Can also be consultants and contractors  Extremely difficult to detect or stop  Authorized to access the very systems they abuse  Negligent insiders have potential to cause damage Ethics in Information Technology, Fourth Edition
  • 21.  Use illegal means to obtain trade secrets from competitors  Trade secrets are protected by the Economic Espionage Act of 1996  Competitive intelligence  Uses legal techniques  Gathers information available to the public  Industrial espionage  Uses illegal means  Obtains information not available to the public Ethics in Information Technology, Fourth Edition
  • 22.  Hack into corporate computers to steal  Engage in all forms of computer fraud  Chargebacks are disputed transactions  Loss of customer trust has more impact than fraud  To reduce potential for online credit card fraud:  Use encryption technology  Verify the address submitted online against the issuing bank  Request a card verification value (CVV)  Use transaction-risk scoring software Ethics in Information Technology, Fourth Edition
  • 23.  Smart cards  Contain a memory chip  Updated with encrypted data each time card is used  Used widely in Europe  Not widely used in the U.S. Ethics in Information Technology, Fourth Edition
  • 24.  Hacktivism  Hacking to achieve a political or social goal  Cyberterrorist  Attacks computers or networks in an attempt to intimidate or coerce a government in order to advance certain political or social objectives  Seeks to cause harm rather than gather information  Uses techniques that destroy or disrupt services Ethics in Information Technology, Fourth Edition
  • 25. Ethics in Information Technology, Fourth Edition
  • 26.  Trustworthy computing  Delivers secure, private, and reliable computing  Based on sound business practices Ethics in Information Technology, Fourth Edition
  • 27.  Security of any system or network  Combination of technology, policy, and people  Requires a wide range of activities to be effective  Systems must be monitored to detect possible intrusion  Clear reaction plan addresses:  Notification, evidence protection, activity log maintenance, containment, eradication, and recovery Ethics in Information Technology, Fourth Edition
  • 28.  Process of assessing security-related risks:  To an organization’s computers and networks  From both internal and external threats  Identifies investments that best protect from most likely and serious threats  Focuses security efforts on areas of highest payoff Ethics in Information Technology, Fourth Edition
  • 29.  Eight-step risk assessment process  #1 Identify assets of most concern  #2 Identify loss events that could occur  #3 Assess likelihood of each potential threat  #4 Determine the impact of each threat  #5 Determine how each threat could be mitigated  #6 Assess feasibility of mitigation options  #7 Perform cost-benefit analysis  #8 Decide which countermeasures to implement Ethics in Information Technology, Fourth Edition
  • 30. Ethics in Information Technology, Fourth Edition
  • 31. Ethics in Information Technology, Fourth Edition
  • 32.  A security policy defines:  Organization’s security requirements  Controls and sanctions needed to meet the requirements  Delineates responsibilities and expected behavior  Outlines what needs to be done  Not how to do it  Automated system policies should mirror written policies Ethics in Information Technology, Fourth Edition
  • 33.  Trade-off between:  Ease of use  Increased security  Areas of concern  Email attachments  Wireless devices  VPN uses the Internet to relay communications but maintains privacy through security features  Additional security includes encrypting originating and receiving network addresses Ethics in Information Technology, Fourth Edition
  • 34.  Educate and motivate users to understand and follow policy  Discuss recent security incidents  Help protect information systems by:  Guarding passwords  Not allowing sharing of passwords  Applying strict access controls to protect data  Reporting all unusual activity  Protecting portable computing and data storage devices Ethics in Information Technology, Fourth Edition
  • 35.  Implement a layered security solution  Make computer break-ins harder  Installing a corporate firewall  Limits network access  Intrusion prevention systems  Block viruses, malformed packets, and other threats  Installing antivirus software  Scans for sequence of bytes or virus signature  United States Computer Emergency Readiness Team (US-CERT) serves as clearinghouse Ethics in Information Technology, Fourth Edition
  • 36. Ethics in Information Technology, Fourth Edition
  • 37. Ethics in Information Technology, Fourth Edition
  • 38.  Safeguards against attacks by malicious insiders  Departing employees and contractors  Promptly delete computer accounts, login IDs, and passwords  Carefully define employee roles and separate key responsibilities  Create roles and user accounts to limit authority Ethics in Information Technology, Fourth Edition
  • 39.  Defending against cyberterrorism  Department of Homeland Security and its National Cyber Security Division (NCSD) is a resource  Builds and maintains a national security cyberspace response system  Implements a cyber-risk management program for protection of critical infrastructure, including banking and finance, water, government operations, and emergency services Ethics in Information Technology, Fourth Edition
  • 40.  Conduct periodic IT security audits  Evaluate policies and whether they are followed  Review access and levels of authority  Test system safeguards  Information Protection Assessment kit is available from the Computer Security Institute Ethics in Information Technology, Fourth Edition
  • 41.  Detection systems  Catch intruders in the act  Intrusion detection system  Monitors system/network resources and activities  Notifies the proper authority when it identifies:  Possible intrusions from outside the organization  Misuse from within the organization  Knowledge-based approach  Behavior-based approach Ethics in Information Technology, Fourth Edition
  • 42.  Response plan  Develop well in advance of any incident  Approved by:  Legal department  Senior management  Primary goals  Regain control and limit damage  Not to monitor or catch an intruder  Only 56% have response plan Ethics in Information Technology, Fourth Edition
  • 43.  Incident notification defines:  Who to notify  Who not to notify  Security experts recommend against releasing specific information about a security compromise in public forums  Document all details of a security incident  All system events  Specific actions taken  All external conversations Ethics in Information Technology, Fourth Edition
  • 44.  Act quickly to contain an attack  Eradication effort  Collect and log all possible criminal evidence  Verify necessary backups are current and complete  Create new backups  Follow-up  Determine how security was compromised  Prevent it from happening again Ethics in Information Technology, Fourth Edition
  • 45.  Review  Determine exactly what happened  Evaluate how the organization responded  Weigh carefully the amount of effort required to capture the perpetrator  Consider the potential for negative publicity  Legal precedent  Hold organizations accountable for their own IT security weaknesses Ethics in Information Technology, Fourth Edition
  • 46.  Combines elements of law and computer science to identify, collect, examine, and preserve data and preserve its integrity so it is admissible as evidence  Computer forensics investigation requires extensive training and certification and knowledge of laws that apply to gathering of criminal evidence Ethics in Information Technology, Fourth Edition
  • 47.  Ethical decisions in determining which information systems and data most need protection  Most common computer exploits  Viruses  Worms  Trojan horses  Distributed denial-of-service attacks  Rootkits  Spam  Phishing, spear-fishing, smishing, vishing Ethics in Information Technology, Fourth Edition
  • 48.  Perpetrators include:  Hackers  Crackers  Malicious insider  Industrial spies  Cybercriminals  Hacktivist  Cyberterrorists Ethics in Information Technology, Fourth Edition
  • 49.  Must implement multilayer process for managing security vulnerabilities, including:  Assessment of threats  Identifying actions to address vulnerabilities  User education  IT must lead the effort to implement:  Security policies and procedures  Hardware and software to prevent security breaches  Computer forensics is key to fighting computer crime in a court of law Ethics in Information Technology, Fourth Edition