Chapter 6: Computer and Network Security



Similar documents
Lecture 7-1 Computer and Network Security. Based on slides 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley

Chapter 7: Computer and Network Security

Cracking and Computer Security

CHAPTER 10: COMPUTER SECURITY AND RISKS

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

Threats and Attacks. Modifications by Prof. Dong Xuan and Adam C. Champion. Principles of Information Security, 5th Edition 1

COB 302 Management Information System (Lesson 8)

Emerging Trends in Malware - Antivirus and Beyond

SECURITY TERMS: Advisory Backdoor - Blended Threat Blind Worm Bootstrapped Worm Bot Coordinated Scanning

COSC 472 Network Security

FKCC AUP/LOCAL AUTHORITY

9. Information Assurance and Security, Protecting Information Resources. Janeela Maraj. Tutorial 9 21/11/2014 INFO 1500

Bendigo and Adelaide Bank Ltd Security Incident Response Procedure

Malicious Software. Ola Flygt Växjö University, Sweden Viruses and Related Threats

Achieving Truly Secure Cloud Communications. How to navigate evolving security threats

Cis1 Chapter 15 Computer Crime and Ethics

Spyware. Michael Glenn Technology Management 2004 Qwest Communications International Inc.

ORANGE REGIONAL MEDICAL CENTER Hospital Wide Policy/Procedure

Denial of Service (DoS)

Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange

CS549: Cryptography and Network Security

SY system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.

PROTECT YOUR COMPUTER AND YOUR PRIVACY!

Acceptable Usage Policy

4. Identify the security measures provided by Microsoft Office Access. 5. Identify the methods for securing a DBMS on the Web.

Security A to Z the most important terms

Information Security. CS526 Topic 1

Seminar Computer Security

Communications Internet Acceptable Use Policy

Software Engineering 4C03 Class Project. Computer Networks and Computer Security COMBATING HACKERS

資 通 安 全 產 品 研 發 與 驗 證 (I) ICT Security Overview. Prof.. Albert B. Jeng ( 鄭 博 仁 教 授 ) 景 文 科 技 大 學 資 訊 工 程 系

Viruses, Worms, and Trojan Horses

E-commerce. Security. Learning objectives. Internet Security Issues: Overview. Managing Risk-1. Managing Risk-2. Computer Security Classifications

1949 Self-reproducing cellular automata Core Wars

Network Security and the Small Business

ACCEPTABLE USAGE PLOICY

The Law. Computer Hacking & Cybercrime. Hacking Tools. Hacking Tools. Group 4 - Troester, van Winkle, Wickless, & Wilson

WEB SECURITY. Oriana Kondakciu Software Engineering 4C03 Project

Stopping zombies, botnets and other - and web-borne threats

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

How To Monitor The Internet In Idaho

Computer Security DD2395

Acceptable Usage Policy

Cryptography and Network Security Chapter 21. Malicious Software. Backdoor or Trapdoor. Logic Bomb 4/19/2010. Chapter 21 Malicious Software

Fundamentals of Information Systems Security Unit 1 Information Systems Security Fundamentals

ANTIVIRUS BEST PRACTICES

Malicious Software. Malicious Software. Overview. Backdoor or Trapdoor. Raj Jain. Washington University in St. Louis

Malicious Programs. CEN 448 Security and Internet Protocols Chapter 19 Malicious Software

Federal Bureau of Investigation. Los Angeles Field Office Computer Crime Squad

COUNSEL S CHAMBERS LIMITED

Countermeasures against Bots

TYPES, PREVALENCE, AND PREVENTION OF CYBERCRIME. Haya Fetais & Mohammed Shabana. Saint Leo University COM- 510

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT

Topic 1 Lesson 1: Importance of network security

Computer Viruses: How to Avoid Infection

United Tribes Technical College Acceptable Use Policies for United Tribes Computer System

Learn to protect yourself from Identity Theft. First National Bank can help.

Network attack and defense

Chapter 11 Manage Computing Securely, Safely and Ethically. Discovering Computers Your Interactive Guide to the Digital World

Denial of Service (DoS) Technical Primer

COMPUTER-INTERNET SECURITY. How am I vulnerable?

Network Incident Report

Chapter 14 Computer Threats

Computer Crime - The Emerging Threats - (1970 s to 2009) -

BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY


Terms and Conditions. Acceptable Use Policy Introduction. Compliance with UK Law. Compliance with foreign law

CS5008: Internet Computing

What you need to know to keep your computer safe on the Internet

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 2 Systems Threats and Risks

BBM 461: SECURE PROGRAMMING INTRODUCTION. Ahmet Burak Can

REGION 19 HEAD START. Acceptable Use Policy

Hosting Terms of Service

Barracuda Web Site Firewall Ensures PCI DSS Compliance

Updated January Hosting and Managed Services Acceptable Use Policy

Information Technology Cyber Security Policy

FLORIDA A&M UNIVERSITY BOARD OF TRUSTEES NOTICE OF PROPOSED AMENDED REGULATION

When you listen to the news, you hear about many different forms of computer infection(s). The most common are:

region16.net Acceptable Use Policy ( AUP )

Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them

Digital Citizenship Lesson

Introduction to Ethical Hacking and Network Defense. Objectives. Hackers

Threat Events: Software Attacks (cont.)

SECURITY FLAWS IN INTERNET VOTING SYSTEM

Responsible Use of Technology and Information Resources

Cyber Security: Beginners Guide to Firewalls

Austin Peay State University

CSE331: Introduction to Networks and Security. Lecture 15 Fall 2006

Acceptable Use Policy ("AUP")

Cyber Security Awareness

Countermeasures against Spyware

Security in DSL Networks. Issues and Solutions for Small-to-Medium Sized Enterprises

Case study: What the? Online scams and identity theft

Introduction to Computer Security

Cybercrimes NATIONAL CRIME PREVENTION COUNCIL

E-BUSINESS THREATS AND SOLUTIONS

Outpost For Home Users

Acceptable Use Policy

Transcription:

Chapter 6: Computer and Network Security Ethics for the Information Age Third Edition by Michael J. Quinn Copyright 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley

Chapter Overview Introduction Viruses, worms, and Trojan horses Phreaks and hackers Denial-of-service attacks Online voting 1-2 Copyright 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 6-2

Introduction Computers getting faster and less expensive Utility of computers increasing Email Web surfing Shopping Managing personal information Increasing use of computers growing importance of computer security 1-3 Copyright 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 6-3

Viruses (1/2) Virus: piece of self-replicating code embedded within another program (host) Viruses associated with program files Hard disks, floppy disks, CD-ROMS Email attachments How viruses spread Diskettes or CDs Email Files downloaded from Internet 1-4 Copyright 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 6-4

Viruses (2/2) Well-known viruses Brain Michelangelo Melissa Love Bug Viruses today Commercial antivirus software Few people keep up-to-date 1-5 Copyright 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 6-5

Worms Worm Self-contained program Spreads through a computer network Exploits security holes in networked computers Famous worms WANK Code Red Sapphire (Slammer) Blaster Sasser 1-6 Copyright 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 6-6

The Internet Worm Robert Tappan Morris, Jr. Graduate student at Cornell Released worm onto Internet from MIT computer Effect of worm Spread to 6,000 Unix computers Infected computers kept crashing or became unresponsive Took a day for fixes to be published Impact on Morris Suspended from Cornell 3 years probation + 400 hours community service $150,000 in legal fees and fines 1-7 Copyright 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 6-7

Ethical Evaluation Kantian evaluation Morris used others by gaining access to their computers without permission Social contract theory evaluation Morris violated property rights of organizations Utilitarian evaluation Benefits: Organizations learned of security flaws Harms: Time spent by those fighting worm, unavailable computers, disrupted network traffic, Morris s punishments Morris was wrong to have released the Internet worm 1-8 Copyright 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 6-8

Trojan Horses Trojan horse: program with benign capability that masks a sinister purpose Remote access Trojan: Trojan horse that gives attack access to victim s computer Back Orifice SubSeven RAT servers often found within files downloaded from erotica/porn Usenet sites 1-9 Copyright 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 6-9

Bot Networks Bot: A software program that responds to commands from a program on another computer Some bots support legitimate activities Internet Relay Chat Multiplayer Internet games Other bots support illegitimate activities Distributing spam Collecting person information for ID theft Distributed denial-of-service attacks 1-10 Copyright 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 6-10

Defensive Measures System administrators play key role Authorization: determining that a user has permission to perform a particular action Authentication: determining that people are who they claim to be Firewall: a computer monitoring packets entering and leaving a local area network 1-11 Copyright 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 6-11

Hackers (1/2) Original meaning Explorer Risk-taker Technical virtuoso Hacker ethic Hands-on imperative Free exchange of information Mistrust of authority Value skill above all else Optimistic view of technology 1-12 Copyright 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 6-12

Hackers (2/2) Meaning of hacker changed Movie WarGames Teenagers accessing corporate or government computers Dumpster diving Social engineering Malicious acts Destroying databases Stealing confidential personal information 1-13 Copyright 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 6-13

Phone Phreaking Phone phreak: someone who manipulates phone system to make free calls Most popular methods Steal long-distance telephone access codes Guess long-distance telephone access codes Use a blue box to get free access to longdistance lines Access codes posted on pirate boards 1-14 Copyright 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 6-14

The Cuckoo s Egg Clifford Stoll: system administrator at Lawrence Berkeley Laboratory Tracked accounting error, discovered unauthorized user Hacker was accessing military computers FBI, CIA, NSA, AFOSI, DIA joined search Trail led to group of West German hackers 1-15 Copyright 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 6-15

Legion of Doom Elite group of hackers/phreaks recruited by Lex Luthor LOD member Robert Riggs copied E911 Document from a Bell South Computer Craig Neidorf published edited E911 Document in his BBS magazine, Phrack 1-16 Copyright 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 6-16

U.S. v. Riggs Riggs and Neidorf arrested Charged with wire fraud Interstate transportation of stolen property valued at $79,449 Computer fraud Riggs pleaded guilty to wire fraud; went to federal prison Neidorf pleaded not guilty Defense showed similar info being sold for < $25 Prosecution moved to dismiss charges 1-17 Copyright 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 6-17

Steve Jackson Games Steve Jackson Games (SJG) published roleplaying games and operated BBS Loyd Blankenship Key SJG employee LOD member Published E911 document on his own BBS Secret Service raided SJG and seized computers, looking for copy of E911 Document Led to creation of Electronic Frontier Foundation EFF backed successful SJG lawsuit of Secret Service 1-18 Copyright 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 6-18

Retrospective Parallels between hackers and those who download MP3 files Establishment overvalues intellectual property Use of technology as a joy ride Breaking certain laws that not that big a deal Parallels between response of Secret Service and response of RIAA Cyberspace is real Those who break the law can be identified Illegal actions can have severe consequences 1-19 Copyright 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 6-19

Penalties for Hacking Examples of illegal activities Accessing without authorization any Internet computer Transmitting a virus or worm Trafficking in computer passwords Intercepting a telephone conversation, email, or any other data transmission Accessing stored email messages without authorization Adopting another identity to carry out an illegal activity Maximum penalty: 20 years in prison + $250,000 fine 1-20 Copyright 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 6-20

Denial-of-Service Attacks Denial-of-service attack: an intentional action designed to prevent legitimate users from making use of a computer service Goal of attack: disrupt a server s ability to respond to its clients About 4,000 Web sites attacked each week Asymmetrical attack that may prove popular with terrorists 1-21 Copyright 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 6-21

Attacks that Consume Scarce Resources SYN flood attack Smurf attack Fill target computer s hard disk Email bombing Worm Break-in followed by file copying 1-22 Copyright 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 6-22

Defensive Measures Physical security of server Benchmarking Disk quota systems Disabling unused network services Turning off routers amplifier network capability 1-23 Copyright 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 6-23

Distributed Denial-of-Service Attacks Attacker gains access to thousands of computers Launches simultaneous attack on target servers Defensive measures Secure computers to prevent hijackings Check for forged IP addresses 1-24 Copyright 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 6-24

SATAN Security Administrator Tool for Analyzing Networks (SATAN) Allows administrators to test their systems Could be used to probe other computers Critics worried SATAN would turn unskilled teenagers into hackers That never happened 1-25 Copyright 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 6-25

Motivation for Online Voting 2000 U.S. Presidential election closely contested Florida pivotal state Most Florida counties used keypunch voting machines Two voting irregularities traced to these machines Hanging chad Butterfly ballot in Palm Beach County 1-26 Copyright 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 6-26

Benefits of Online Voting More people would vote Votes would be counted more quickly No ambiguity with electronic votes Cost less money Eliminate ballot box tampering Software can prevent accidental over-voting Software can prevent under-voting 1-27 Copyright 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 6-27

Risks of Online Voting Gives unfair advantage to those with home computers More difficult to preserve voter privacy More opportunities for vote selling Obvious target for a DDoS attack Security of election depends on security of home computers Susceptible to vote-changing virus or RAT Susceptible to phony vote servers No paper copies of ballots for auditing or recounts 1-28 Copyright 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 6-28

Utilitarian Analysis Suppose online voting replaced traditional voting Benefit: Time savings Assume 50% of adults actually vote Suppose voter saves 1 hour by voting online Average pay in U.S. is $18.00 / hour Time savings worth $9 per adult American Harm of DDoS attack difficult to determine What is probability of a DDoS attack? What is the probability an attack would succeed? What is the probability a successful attack would change the outcome of the election? 1-29 Copyright 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 6-29

Kantian Analysis The will of each voter should be reflected in that voter s ballot The integrity of each ballot is paramount Ability to do a recount necessary to guarantee integrity of each ballot There should be a paper record of every vote Eliminating paper records to save time and/or money is wrong 1-30 Copyright 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 6-30

Conclusions Existing systems are highly localized Widespread tainting more possible with online system No paper records with online system Evidence of tampering with online elections Relying on security of home computers means system vulnerable to fraud Strong case for not allowing online voting 1-31 Copyright 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 6-31