ICT Security › If the firm is a victim of a computer crime, should they pursue prosecution of the...

15
ICT Ethics 3 Computer and Internet Crimes

Transcript of ICT Security › If the firm is a victim of a computer crime, should they pursue prosecution of the...

Page 1: ICT Security › If the firm is a victim of a computer crime, should they pursue prosecution of the criminals at all costs, should they maintain a low.

ICT Ethics 3Computer and Internet Crimes

Page 2: ICT Security › If the firm is a victim of a computer crime, should they pursue prosecution of the criminals at all costs, should they maintain a low.

Key issues related to ICT

ICT Security› If the firm is a victim of a computer crime,

should they pursue prosecution of the criminals at all costs, should they maintain a low profile to avoid negative publicity, must they inform their affected customers, or should they take some other actions?

› How much effort and money should be spent to safeguard against computer crime (how safe is safe enough)?

Page 3: ICT Security › If the firm is a victim of a computer crime, should they pursue prosecution of the criminals at all costs, should they maintain a low.

Key issues related to ICT

ICT Security› If their firm produces software with defects

that allow hackers to attack customer data and computers without doing anything illegal?

› What tactics should management ask employees to use to gather competitive intelligence without doing anything illegal?

› What should be done if recommended computer security safeguards make life more difficult for customers and employees, resulting in lost sales and increased costs?

Page 4: ICT Security › If the firm is a victim of a computer crime, should they pursue prosecution of the criminals at all costs, should they maintain a low.

Key issues related to ICT

Increasing complexity and increasing vulnerability› The number of possible entry points to a

network expands continually as more devices are added, increasing the possibility of security breaches

Higher computer user expectations› Fast delivery of ICT services› Reliable helpdesk---resets….

Page 5: ICT Security › If the firm is a victim of a computer crime, should they pursue prosecution of the criminals at all costs, should they maintain a low.

Types of Attacks

3.21 Viruses Technically, a virus is a piece of programming

code, usually disguised as something else, that causes some unexpected and usually undesirable event. Often, it is attached to a file so that when the infected file is opened, the virus executes.› ~a virus does not spread itself from computer to

computer› ~it is passed on to other users through infected

email document attachments, programs or USBs (diskettes? Naa pa ba?), or shared files

Page 6: ICT Security › If the firm is a victim of a computer crime, should they pursue prosecution of the criminals at all costs, should they maintain a low.

Types of Attacks

3.22 Worms Worms are harmful programs that reside

in the active memory of the computer and duplicate themselves› ~they propagate without human intervention,

sending copies of themselves to other computers by email. See W32.Sober-K@mm

› Impact of Worms:› ILOVEYOU ($8.75 b); Code Red ($2.62b);

SirCam ($1.15b);

Page 7: ICT Security › If the firm is a victim of a computer crime, should they pursue prosecution of the criminals at all costs, should they maintain a low.

Types of Attacks

3.23 Trojan Horses A Trojan Horse is a program that a hacker

secretly installs on a computer.› ~its harmful payload can allow the hacker to steal

passwords or Social Security numbers, or spy on users by recording keystrokes and transmitting them to a server operated by a third party.

› logic bomb—a Trojan Horse that executes at a certain specific condition; it can be triggered by a particular change in a file, a succession of specific key strokes, or by a specific time or date.

Page 8: ICT Security › If the firm is a victim of a computer crime, should they pursue prosecution of the criminals at all costs, should they maintain a low.

Types of Attacks

3.24 DoS (Denial of Service) Attacks A denial-of-service attack is one in which a

malicious hacker takes over computers on the Internet and causes them to flood a target site with demands for data and other small tasks.› ~It just keeps the target machine so busy responding

to a stream of automated requests that legitimate users cannot get in—the Internet equivalent of dialing a telephone number repeatedly so that all other callers hear a busy sites.

› ~Zombies do the requests for access to the site again and again.

› MyDoom

Page 9: ICT Security › If the firm is a victim of a computer crime, should they pursue prosecution of the criminals at all costs, should they maintain a low.

Perpetrators

3.31 Hackers› test the limitations of systems out of

intellectual curiosity—to see whether they can gain access and how far they can go.

› ~~lamers or script kiddies 3.32 Crackers

› break into other people’s networks and systems, deface Web pages, crash computers, spread harmful programs or hateful messages, and write scripts and automated programs that let other people do the same things.

Page 10: ICT Security › If the firm is a victim of a computer crime, should they pursue prosecution of the criminals at all costs, should they maintain a low.

Perpetrators

3.33 Malicious insiders› people who have knowledge concerning

the inner workings of the organization. Often this involves collusion between an employee and an outsider.

3.34 Industrial spies› people who use illegal means to obtain

secrets from the competitors of their firm.

Page 11: ICT Security › If the firm is a victim of a computer crime, should they pursue prosecution of the criminals at all costs, should they maintain a low.

Perpetrators

3.35 Cybercriminals—hack into corporate computers and steal, often by transferring one account after another› ~they also engage in all forms of computer fraud—

stealing and reselling credit card numbers, personal identities (identity theft), and cell phone IDs.

3.36 Cyberterrorists—intimidate or coerce a government or organization to advance their political or social objectives by launching computer-based attacks against other computers, networks, and the information stored in them

Page 12: ICT Security › If the firm is a victim of a computer crime, should they pursue prosecution of the criminals at all costs, should they maintain a low.

Perpetrators

~seek to cause harm rather than gather information, and they use techniques that destroy or disrupt services› ~1999, Email attacks on NATO computers

(Kosovo)› ~2000, attack computers and force them

to use modems to dial 911.› ~2002, sewage dump; Queensland,

Sunshine Coast

Page 13: ICT Security › If the firm is a victim of a computer crime, should they pursue prosecution of the criminals at all costs, should they maintain a low.

Possible ICT Intervention

4.1 Risk Assessment-review of potential threats to an organization’s computers and network and the probability of those threats occurring.› >its goal is to identify investments in time and

resources that can best protect the organization from its most likely and serious threats.

› >Reasonable assurance recognizes that managers must use their judgment to ensure that the cost control does not exceed the system’s benefit or the risk involved

Page 14: ICT Security › If the firm is a victim of a computer crime, should they pursue prosecution of the criminals at all costs, should they maintain a low.

Possible ICT Intervention

4.2 Establishing a security policy—A security policy defines an organization’s security requirements and the controls and sanctions needed to meet those requirements.› >delineates responsibilities and expected

behavior by members of the organization

Page 15: ICT Security › If the firm is a victim of a computer crime, should they pursue prosecution of the criminals at all costs, should they maintain a low.

Possible ICT Intervention

4.2 Establishing a security policy—A security policy defines an organization’s security requirements and the controls and sanctions needed to meet those requirements.› >delineates responsibilities and expected

behavior by members of the organization