SlideShare a Scribd company logo
chapter13 - Computing Security Ethics.pdf
Connecting with Computer Science 2
Objectives
• Learn about the origins about computer hacking
• Learn about some of the motivations for hackers and
crackers
• Learn about technologies that system intruders use
• Learn about malicious code
• Learn what social engineering is and how it works
Connecting with Computer Science 3
Objectives (continued)
• Learn how security experts categorize types of
system attacks
• Learn about physical and technical safeguards
• Learn how to select a good password
• Learn about antivirus software
• Learn about encryption
Connecting with Computer Science 4
Objectives (continued)
• Learn about preventive system setup, including
firewalls and routers
• Learn about laws to protect intellectual property and
prosecute cracking
• Learn about ethical behavior in computing
• Learn about privacy in computing and ways to
assure it
Connecting with Computer Science 5
The Intruder
• A hacker is a technically proficient individual who
breaks into a computer system
– Originally connoted good intent, but usage today is
similar to cracker
– A cracker is an unwelcome system intruder with
malicious intent
– A script kiddie is an amateur hacker that simply uses
the hacking tools developed by others
Connecting with Computer Science 6
The Intruder (continued)
• Two types of intentional intruders
– An undirected hacker is motivated by the challenge of
breaking into a system
– A directed hacker is motivated by greed and/or
politics
• Hacktivism is cracking into a system as a political act
– The Hacker’s Manifesto is an anonymous document
that justifies cracking into systems as an ethical
exercise
Connecting with Computer Science 7
How Do They Get In?
• Holes in the system
– System configuration, programming, security
• Malicious software programs (viruses)
• Social engineering
– Taking advantage of the innocent human tendency to
be helpful
– One of the most effective tools for hackers
Connecting with Computer Science 8
Holes in the System
• Open nature of the Internet and networks
– Remote access, mounting drives on other machines
• Backdoors
– Shortcuts into programs created by system
designers
• Sloppy programming
– Leaving sensitive information in a URL string
• Buffer overflow
– Placing more information into a memory location
than that location can handle
Connecting with Computer Science 9
Viruses, Worms, and
Other Nasty Things
• Malicious code is designed to breach system security
and threaten digital information
• Viruses are uninvited guest programs on your
computer with the potential to damage files and the
operating system
– A virus may be silent for awhile
– Users who share files can transmit a virus
– E-mail attachments can host a virus when the
attachment is opened
Connecting with Computer Science 10
Figure 13-1
A typical virus e-mail warning
Connecting with Computer Science 11
Viruses, Worms, and Other Nasty
Things (continued)
• A worm is a bot that actively reproduces itself across
a network
– A bot is a program that can roam the Internet
anonymously
• Bots can be quite useful
• A Trojan horse is a program that poses as an
innocent program
– Some action or the passage of time triggers the
program to do its dirty work
Connecting with Computer Science 12
The Human Factor-Social
Engineering
• Preys on human gullibility, sympathy, or fear to take
advantage of the target - basically, a con
– Posing as an insider at a company
– Dumpster diving
– Browsing a company Web site for intranet
information
– Using cracker techniques
– Sending spam
Connecting with Computer Science 13
Types of Attacks
• Access attacks include snooping, eavesdropping,
and interception
– Snooping may involve browsing a person’s files
– Eavesdropping may use a sniffer program to allow
the user to listen in on the traffic of a network
– Intercepting determines whether the information
continues on to its intended receiver
• Modification attacks modify information illicitly
Connecting with Computer Science 14
Types of Attacks (continued)
• Denial-of-service attacks deny legitimate users from
using the system or access to information
– Usually pure vandalism
• Repudiation attacks injure the reliability of the
information by creating a false impression about an
event
– Sending an e-mail to someone as if it it was from
someone else
Connecting with Computer Science 15
Managing Security:
The Threat Matrix
• Risk is the relationship between vulnerability and
threat
– Managed risk is the basis of security
• Vulnerability is the sensitivity of the information and
the skill level needed by the attacker to threaten that
information
– i.e., open ports, Internet connections
• A threat is characterized by targets, agents, and
events
Connecting with Computer Science 16
Threats: Targets and Events
• Confidentiality ensures that only those authorized to
access information can do so
– Encryption is often used with a high level of
confidentiality
• Transforms original text into coded or encrypted data
• Integrity assures that information is correct
– Digital certificates, encryption
Connecting with Computer Science 17
Threats: Targets and Events
(continued)
• Availability involves making information and
services accessible on a normal basis
– Backup copies, disaster recovery plans
• Accountability makes sure that a system is as secure
as feasible, and that there is a record of activities for
reconstructing a break
– Identification is knowing who someone is
– Authentication is verifying that someone is who they
claim to be
Connecting with Computer Science 18
Measuring Total Risk
• Risk can be measured in terms of cost
• Risk is difficult to calculate until the event occurs in
many cases
– Time the event might take to fix if a key system is
down
– Physical resources that need to be brought to bear
– Damage to the organization’s reputation
– Opportunity cost of lost business during the crisis
Connecting with Computer Science 19
Managing Security:
Countermeasures
• Have a security policy
• Have physical safeguards
– For computers, trash, visitors, etc.
• Use passwords to protect everything
– Startup, e-mail, router, phone, PDA, screen saver
• Destroy old copies of sensitive material
– Shredder, overwriting, software degausser
• Back up everything of value
– Generations of backups for important files
Connecting with Computer Science 20
Managing Security:
Countermeasures (continued)
• Protect against system failure
– Surge protector, uninterruptible power supply
• Create an Acceptable Use Policy (AUP) for your
company
– Defines who can use company computers and
networks, when, and how
– Options: callbacks, virtual private networks
• Protect against viruses
– Antivirus, antispam, and anticookie software
Connecting with Computer Science 21
Managing Security:
Countermeasures (continued)
• Have a disaster recovery plan (DRP)
– Written plan for responding to natural or other
disasters
– Intended to minimize downtime and damage to
systems and data
– May require off-site storage, alternative
communication technologies, and end-user
communication parameters
Connecting with Computer Science 22
Figure 13-2
Three technologies that help back up your system. From left to right:
surge suppressor, UPS, and physical locks
Connecting with Computer Science 23
Passwords
• Good passwords should
– Be at least eight characters
– Have no real words
– Include as many different characters as possible
• Because of problems with secure passwords, many
companies use a combination of
– something you know (like a password)
– something you have (like an ID)
– Something you are (using biometrics)
Connecting with Computer Science 24
Connecting with Computer Science 25
Figure 13-3
Three potentially combined authentication methods. From left to right:
what you know, what you have, what you are
Connecting with Computer Science 26
Antivirus Software
• Program designed to detect, block, and deal with
computer viruses
– Virus signature: bits of code that uniquely identify a
particular virus
– Honeypot: a trap laid by a system administrator to
catch and track numbers
– Heuristics: a set of rules that predict how a virus
might act
– Checksum: mathematical means to check the
content of a file or value
Connecting with Computer Science 27
Using Encryption to Secure
Transmissions and Data
• Encryption uses an encryption key to scramble a
transmission so only the receiver with the appropriate
decoding key can read it
– The longer the key, the more secure the encryption
(128-bit encryption used for online banking)
• Web pages use S-HTTP, SET, or SSL to send secure
transactions
– S-HTTP and SSL use digital certificates
• A certifying authority encrypts and verifies user
information
Connecting with Computer Science 28
Connecting with Computer Science 29
Connecting with Computer Science 30
More About Encryption
• Encryption standards used today are key-based
standards
• Symmetric encryption uses a private key to both
encrypt and decrypt
• Asymmetric encryption uses both a public key and a
private key
– Often used to avoid the difficulty with keeping both
private keys secret
Connecting with Computer Science 31
Figure 13-4
Using a public and private key (asymmetric encryption)
Connecting with Computer Science 32
Securing Systems with Firewalls
• A firewall is software or hardware that acts as a
protective filter between an internal computer
system and an external network such as the Internet
– Only allows authorized entrants
– A proxy firewall establishes a new link between each
packet of information and its destination
– A packet-filtering firewall inspects each packet and
moves it along an established link
• Faster but less secure than a proxy firewall
Connecting with Computer Science 33
Protecting a System with Routers
• Filtering software in a router can be a front line of
defense against certain service requests
– Closes ports that are not allowed
– Determines where servers are to be located on the
network
– Determines what services are offered outside a
firewall
• Internal and external DNS servers
Connecting with Computer Science 34
Connecting with Computer Science 35
The DMZ
• A location outside the firewalls (or between
firewalls) that is more vulnerable to attack from
outside
– Separates services offered internally from those
offered externally
• Is protected by
– Filters on the router
– Only allowing each server a particular service
– Another firewall on the other side of the firewall
Connecting with Computer Science 36
Figure 13-5
System configuration of a network that
includes a firewall, a DMZ, and a router
Connecting with Computer Science 37
Protecting Systems with
Machine Addressing
• Organizations usually have more machines than they
have IP addresses
– Handled by dynamically allocating IP addresses
• Organizations also use private class addressing
– Nodes on the internal network have a different address
than what is seen on the outside
– Network Address Translation (NAT): conversion of
internal to external IP addresses (and vice versa)
• Usually provided by the firewall
Connecting with Computer Science 38
Putting It All Together
• A comprehensive security plan includes
– Firewalls and antivirus software
– Restricting physical access to buildings and hardware
– Reminders and training about security dangers
– Security policy
– Continual updates and patches
– Appropriate access controls
Connecting with Computer Science 39
Computer Crime
• Intellectual property protections
– Copyright
• Protects the expression of the idea - not the idea itself
– Patent
• Government grant giving the sole right to make, use,
and sell an invention for a specified period of time
– Trade secrets
• Methods, formulas, or devices that give companies
competitive advantage and are kept secret
Connecting with Computer Science 40
Prosecuting Computer Crime
• The United State has a number of laws designed to
protect against computer crime
– Laws differ widely (both in the U.S. and in other
countries) and are open to interpretation
• Prosecuting a computer crime is complex
– Systems must be replicated entirely or put out of use
– Perpetrators are very difficult to find
Connecting with Computer Science 41
Connecting with Computer Science 42
Connecting with Computer Science 43
Table 13-5 (continued)
Connecting with Computer Science 44
I Fought the Law
and the Law Won
• Increasing numbers of crackers are being caught and
persecuted
• Corporations are willing to pursue copyright
violations much more aggressively
• Legal ways to use software today
– Purchase the right to use a copy with an EULA
agreement
– Purchase time on a program and connect to it through
a network
Connecting with Computer Science 45
Ethics in Computing
• Ethics are principles for judging right and wrong,
held by an individual or group
• Ethical systems (along with laws) help create a stable
platform from which to live life comfortably with
other people and benefit all
• Organization of computer professionals have
outlined ethical standards or codes of ethics (IEEE,
ACM, Computer Ethics Institute, etc.)
Connecting with Computer Science 46
Figure 13-6
An excerpt from the Association for Computing Machinery (ACM)
“Code of Ethics and Professional Conduct”
Connecting with Computer Science 47
Connecting with Computer Science 48
Ethical Issues
• Software piracy: illegal copying of software
• Viruses and virus hoaxes (phony virus warning)
• Weak passwords
• Plagiarism
• Cracking or hacking
• Health issues
– Designers should be aware of the ergonomics of how
the interface will be used
Connecting with Computer Science 49
Privacy
• The Internet and computerized databases have made
invasion of privacy much easier
– Spam: unsolicited (and almost always unwanted) e-
mail
– Spyware: software that can track, collect, and transmit
to a third party or Web site certain information about a
user’s computer habits
– Cookies: programs that can gather information about a
user and store it on the user’s machine
Connecting with Computer Science 50
One Last Thought
• Operators of computer systems must realize that they
are not just individually vulnerable; they are part of
an overall vulnerability
• Steps to reduce vulnerability
– Install and update antivirus software, firewalls, and
operating system patches
– Guard against communicating information
– Reassess balance between ease of use, customer, time
and cost on one hand, and system security on the other
Connecting with Computer Science 51
Summary
• Security is more than the hunt for intruders
• “hacking” and “hacker” did not originally have the
negative connotation that they do today
• Intruders can be classified as directed or undirected
• Crackers find holes in systems put there
intentionally or unintentionally by system
administrators and programmers
Connecting with Computer Science 52
Summary (continued)
• Viruses, worms, and Trojan horses are programs that
crackers use to infiltrate system
• Social engineering - human (not technological)
manipulation - one of the the greatest risks to a
company and its computers
• Types of attacks on computer systems: access,
modification, denial of service, and repudiation
• Total risk to an organization is made up of
vulnerability, threat, and existing countermeasures
Connecting with Computer Science 53
Summary (continued)
• Intruders target the confidentiality, integrity,
availability, or accountability of information
• Many countermeasures in managing security
• Install antivirus software, perform system updates,
physically restrict access to your computers, and
have a good backup system
• Users support cracking by using weak passwords
• Authentication and identification are different
Connecting with Computer Science 54
Summary (continued)
• Encrypt information to secure communications
• Use firewalls and routers
• Difficult to prosecute computer attackers
• Some issues in computing that can be viewed from
an ethical perspective: software piracy, virus
propagation, plagiarism, breaking into computers,
and doing harm to people through computers
Connecting with Computer Science 55
Summary (continued)
• Privacy is protected by law, but employees have
fewer rights to privacy while on the job
• Many things you can do to protect your privacy
– Only give out personal information when you must
• Computer and network security is everyone’s
responsibility

More Related Content

PDF
Lecture 7---Security (1).pdf
PPT
Isys20261 lecture 02
PDF
Sec0001 .pdf
PPT
MIS part 4_CH 11.ppt
PPTX
Lecture 9 Computer Security IN aict.pptx
PPTX
DOC-20250311-WA00nnjnnnnnnnnnnnnnnnnnn..pptx
PPTX
Understanding computer attacks and attackers - Eric Vanderburg - JURINNOV
PDF
Basic security concepts_chapter_1_6perpage
Lecture 7---Security (1).pdf
Isys20261 lecture 02
Sec0001 .pdf
MIS part 4_CH 11.ppt
Lecture 9 Computer Security IN aict.pptx
DOC-20250311-WA00nnjnnnnnnnnnnnnnnnnnn..pptx
Understanding computer attacks and attackers - Eric Vanderburg - JURINNOV
Basic security concepts_chapter_1_6perpage

Similar to chapter13 - Computing Security Ethics.pdf (20)

PDF
PPT
Chapter1 intro network_security_sunorganised
PPT
Network Security
PPT
PPTX
Computer Security and their social effect and their usage.
PPTX
Lecture 6 Cybersecurity-Basics and .pptx
PPTX
informations_security_presentations.pptx
PPTX
chapter1 Introduction to Software Security.pptx
PPTX
Orientation 28 sep education purpose only.pptx
PPT
dataprivacyactof2012r-180802030546sada.ppt
PPT
Security & control in management information system
PPT
Chapter 3-Introduction to Internet skills.ppt
PPTX
Lecture 5.1.pptx
PPTX
2014-09-03 Cybersecurity and Computer Crimes
PPTX
Lecture-2 about programming download.pptx
PPTX
2014-09-03 Cybersecurity and Computer Crimes
PPT
Information Security Audit and Analysis Module
PDF
Computer security
PPT
Complete notes security
PPTX
Security Architectures and Models.pptx
Chapter1 intro network_security_sunorganised
Network Security
Computer Security and their social effect and their usage.
Lecture 6 Cybersecurity-Basics and .pptx
informations_security_presentations.pptx
chapter1 Introduction to Software Security.pptx
Orientation 28 sep education purpose only.pptx
dataprivacyactof2012r-180802030546sada.ppt
Security & control in management information system
Chapter 3-Introduction to Internet skills.ppt
Lecture 5.1.pptx
2014-09-03 Cybersecurity and Computer Crimes
Lecture-2 about programming download.pptx
2014-09-03 Cybersecurity and Computer Crimes
Information Security Audit and Analysis Module
Computer security
Complete notes security
Security Architectures and Models.pptx
Ad

More from satonaka3 (10)

PDF
chapter14 - Emerging Technologies.pdf
PDF
chapter12 - Software engineering.pdf
PDF
chapter11 - Programming.pdf
PDF
chapter10 - File structures.pdf
PDF
chapter09 -Programming Data Structures.pdf
PDF
chapter08 - Database fundamentals.pdf
PDF
chapter07 - The Internet.pdf
PDF
chapter06 - Networks.pdf
PDF
chapter05 - Operating System.pdf
PDF
Numbering system data representation
chapter14 - Emerging Technologies.pdf
chapter12 - Software engineering.pdf
chapter11 - Programming.pdf
chapter10 - File structures.pdf
chapter09 -Programming Data Structures.pdf
chapter08 - Database fundamentals.pdf
chapter07 - The Internet.pdf
chapter06 - Networks.pdf
chapter05 - Operating System.pdf
Numbering system data representation
Ad

Recently uploaded (20)

PDF
Introduction to Data Science and Data Analysis
PDF
Galatica Smart Energy Infrastructure Startup Pitch Deck
PPTX
IBA_Chapter_11_Slides_Final_Accessible.pptx
PPTX
oil_refinery_comprehensive_20250804084928 (1).pptx
PPTX
ALIMENTARY AND BILIARY CONDITIONS 3-1.pptx
PDF
[EN] Industrial Machine Downtime Prediction
PPT
ISS -ESG Data flows What is ESG and HowHow
PPTX
iec ppt-1 pptx icmr ppt on rehabilitation.pptx
PPTX
DISORDERS OF THE LIVER, GALLBLADDER AND PANCREASE (1).pptx
PPTX
Qualitative Qantitative and Mixed Methods.pptx
PPTX
SAP 2 completion done . PRESENTATION.pptx
PPTX
Introduction to Firewall Analytics - Interfirewall and Transfirewall.pptx
PPTX
The THESIS FINAL-DEFENSE-PRESENTATION.pptx
PDF
Lecture1 pattern recognition............
PDF
Introduction to the R Programming Language
PPTX
mbdjdhjjodule 5-1 rhfhhfjtjjhafbrhfnfbbfnb
PPTX
AI Strategy room jwfjksfksfjsjsjsjsjfsjfsj
PDF
BF and FI - Blockchain, fintech and Financial Innovation Lesson 2.pdf
PDF
annual-report-2024-2025 original latest.
Introduction to Data Science and Data Analysis
Galatica Smart Energy Infrastructure Startup Pitch Deck
IBA_Chapter_11_Slides_Final_Accessible.pptx
oil_refinery_comprehensive_20250804084928 (1).pptx
ALIMENTARY AND BILIARY CONDITIONS 3-1.pptx
[EN] Industrial Machine Downtime Prediction
ISS -ESG Data flows What is ESG and HowHow
iec ppt-1 pptx icmr ppt on rehabilitation.pptx
DISORDERS OF THE LIVER, GALLBLADDER AND PANCREASE (1).pptx
Qualitative Qantitative and Mixed Methods.pptx
SAP 2 completion done . PRESENTATION.pptx
Introduction to Firewall Analytics - Interfirewall and Transfirewall.pptx
The THESIS FINAL-DEFENSE-PRESENTATION.pptx
Lecture1 pattern recognition............
Introduction to the R Programming Language
mbdjdhjjodule 5-1 rhfhhfjtjjhafbrhfnfbbfnb
AI Strategy room jwfjksfksfjsjsjsjsjfsjfsj
BF and FI - Blockchain, fintech and Financial Innovation Lesson 2.pdf
annual-report-2024-2025 original latest.

chapter13 - Computing Security Ethics.pdf

  • 2. Connecting with Computer Science 2 Objectives • Learn about the origins about computer hacking • Learn about some of the motivations for hackers and crackers • Learn about technologies that system intruders use • Learn about malicious code • Learn what social engineering is and how it works
  • 3. Connecting with Computer Science 3 Objectives (continued) • Learn how security experts categorize types of system attacks • Learn about physical and technical safeguards • Learn how to select a good password • Learn about antivirus software • Learn about encryption
  • 4. Connecting with Computer Science 4 Objectives (continued) • Learn about preventive system setup, including firewalls and routers • Learn about laws to protect intellectual property and prosecute cracking • Learn about ethical behavior in computing • Learn about privacy in computing and ways to assure it
  • 5. Connecting with Computer Science 5 The Intruder • A hacker is a technically proficient individual who breaks into a computer system – Originally connoted good intent, but usage today is similar to cracker – A cracker is an unwelcome system intruder with malicious intent – A script kiddie is an amateur hacker that simply uses the hacking tools developed by others
  • 6. Connecting with Computer Science 6 The Intruder (continued) • Two types of intentional intruders – An undirected hacker is motivated by the challenge of breaking into a system – A directed hacker is motivated by greed and/or politics • Hacktivism is cracking into a system as a political act – The Hacker’s Manifesto is an anonymous document that justifies cracking into systems as an ethical exercise
  • 7. Connecting with Computer Science 7 How Do They Get In? • Holes in the system – System configuration, programming, security • Malicious software programs (viruses) • Social engineering – Taking advantage of the innocent human tendency to be helpful – One of the most effective tools for hackers
  • 8. Connecting with Computer Science 8 Holes in the System • Open nature of the Internet and networks – Remote access, mounting drives on other machines • Backdoors – Shortcuts into programs created by system designers • Sloppy programming – Leaving sensitive information in a URL string • Buffer overflow – Placing more information into a memory location than that location can handle
  • 9. Connecting with Computer Science 9 Viruses, Worms, and Other Nasty Things • Malicious code is designed to breach system security and threaten digital information • Viruses are uninvited guest programs on your computer with the potential to damage files and the operating system – A virus may be silent for awhile – Users who share files can transmit a virus – E-mail attachments can host a virus when the attachment is opened
  • 10. Connecting with Computer Science 10 Figure 13-1 A typical virus e-mail warning
  • 11. Connecting with Computer Science 11 Viruses, Worms, and Other Nasty Things (continued) • A worm is a bot that actively reproduces itself across a network – A bot is a program that can roam the Internet anonymously • Bots can be quite useful • A Trojan horse is a program that poses as an innocent program – Some action or the passage of time triggers the program to do its dirty work
  • 12. Connecting with Computer Science 12 The Human Factor-Social Engineering • Preys on human gullibility, sympathy, or fear to take advantage of the target - basically, a con – Posing as an insider at a company – Dumpster diving – Browsing a company Web site for intranet information – Using cracker techniques – Sending spam
  • 13. Connecting with Computer Science 13 Types of Attacks • Access attacks include snooping, eavesdropping, and interception – Snooping may involve browsing a person’s files – Eavesdropping may use a sniffer program to allow the user to listen in on the traffic of a network – Intercepting determines whether the information continues on to its intended receiver • Modification attacks modify information illicitly
  • 14. Connecting with Computer Science 14 Types of Attacks (continued) • Denial-of-service attacks deny legitimate users from using the system or access to information – Usually pure vandalism • Repudiation attacks injure the reliability of the information by creating a false impression about an event – Sending an e-mail to someone as if it it was from someone else
  • 15. Connecting with Computer Science 15 Managing Security: The Threat Matrix • Risk is the relationship between vulnerability and threat – Managed risk is the basis of security • Vulnerability is the sensitivity of the information and the skill level needed by the attacker to threaten that information – i.e., open ports, Internet connections • A threat is characterized by targets, agents, and events
  • 16. Connecting with Computer Science 16 Threats: Targets and Events • Confidentiality ensures that only those authorized to access information can do so – Encryption is often used with a high level of confidentiality • Transforms original text into coded or encrypted data • Integrity assures that information is correct – Digital certificates, encryption
  • 17. Connecting with Computer Science 17 Threats: Targets and Events (continued) • Availability involves making information and services accessible on a normal basis – Backup copies, disaster recovery plans • Accountability makes sure that a system is as secure as feasible, and that there is a record of activities for reconstructing a break – Identification is knowing who someone is – Authentication is verifying that someone is who they claim to be
  • 18. Connecting with Computer Science 18 Measuring Total Risk • Risk can be measured in terms of cost • Risk is difficult to calculate until the event occurs in many cases – Time the event might take to fix if a key system is down – Physical resources that need to be brought to bear – Damage to the organization’s reputation – Opportunity cost of lost business during the crisis
  • 19. Connecting with Computer Science 19 Managing Security: Countermeasures • Have a security policy • Have physical safeguards – For computers, trash, visitors, etc. • Use passwords to protect everything – Startup, e-mail, router, phone, PDA, screen saver • Destroy old copies of sensitive material – Shredder, overwriting, software degausser • Back up everything of value – Generations of backups for important files
  • 20. Connecting with Computer Science 20 Managing Security: Countermeasures (continued) • Protect against system failure – Surge protector, uninterruptible power supply • Create an Acceptable Use Policy (AUP) for your company – Defines who can use company computers and networks, when, and how – Options: callbacks, virtual private networks • Protect against viruses – Antivirus, antispam, and anticookie software
  • 21. Connecting with Computer Science 21 Managing Security: Countermeasures (continued) • Have a disaster recovery plan (DRP) – Written plan for responding to natural or other disasters – Intended to minimize downtime and damage to systems and data – May require off-site storage, alternative communication technologies, and end-user communication parameters
  • 22. Connecting with Computer Science 22 Figure 13-2 Three technologies that help back up your system. From left to right: surge suppressor, UPS, and physical locks
  • 23. Connecting with Computer Science 23 Passwords • Good passwords should – Be at least eight characters – Have no real words – Include as many different characters as possible • Because of problems with secure passwords, many companies use a combination of – something you know (like a password) – something you have (like an ID) – Something you are (using biometrics)
  • 25. Connecting with Computer Science 25 Figure 13-3 Three potentially combined authentication methods. From left to right: what you know, what you have, what you are
  • 26. Connecting with Computer Science 26 Antivirus Software • Program designed to detect, block, and deal with computer viruses – Virus signature: bits of code that uniquely identify a particular virus – Honeypot: a trap laid by a system administrator to catch and track numbers – Heuristics: a set of rules that predict how a virus might act – Checksum: mathematical means to check the content of a file or value
  • 27. Connecting with Computer Science 27 Using Encryption to Secure Transmissions and Data • Encryption uses an encryption key to scramble a transmission so only the receiver with the appropriate decoding key can read it – The longer the key, the more secure the encryption (128-bit encryption used for online banking) • Web pages use S-HTTP, SET, or SSL to send secure transactions – S-HTTP and SSL use digital certificates • A certifying authority encrypts and verifies user information
  • 30. Connecting with Computer Science 30 More About Encryption • Encryption standards used today are key-based standards • Symmetric encryption uses a private key to both encrypt and decrypt • Asymmetric encryption uses both a public key and a private key – Often used to avoid the difficulty with keeping both private keys secret
  • 31. Connecting with Computer Science 31 Figure 13-4 Using a public and private key (asymmetric encryption)
  • 32. Connecting with Computer Science 32 Securing Systems with Firewalls • A firewall is software or hardware that acts as a protective filter between an internal computer system and an external network such as the Internet – Only allows authorized entrants – A proxy firewall establishes a new link between each packet of information and its destination – A packet-filtering firewall inspects each packet and moves it along an established link • Faster but less secure than a proxy firewall
  • 33. Connecting with Computer Science 33 Protecting a System with Routers • Filtering software in a router can be a front line of defense against certain service requests – Closes ports that are not allowed – Determines where servers are to be located on the network – Determines what services are offered outside a firewall • Internal and external DNS servers
  • 35. Connecting with Computer Science 35 The DMZ • A location outside the firewalls (or between firewalls) that is more vulnerable to attack from outside – Separates services offered internally from those offered externally • Is protected by – Filters on the router – Only allowing each server a particular service – Another firewall on the other side of the firewall
  • 36. Connecting with Computer Science 36 Figure 13-5 System configuration of a network that includes a firewall, a DMZ, and a router
  • 37. Connecting with Computer Science 37 Protecting Systems with Machine Addressing • Organizations usually have more machines than they have IP addresses – Handled by dynamically allocating IP addresses • Organizations also use private class addressing – Nodes on the internal network have a different address than what is seen on the outside – Network Address Translation (NAT): conversion of internal to external IP addresses (and vice versa) • Usually provided by the firewall
  • 38. Connecting with Computer Science 38 Putting It All Together • A comprehensive security plan includes – Firewalls and antivirus software – Restricting physical access to buildings and hardware – Reminders and training about security dangers – Security policy – Continual updates and patches – Appropriate access controls
  • 39. Connecting with Computer Science 39 Computer Crime • Intellectual property protections – Copyright • Protects the expression of the idea - not the idea itself – Patent • Government grant giving the sole right to make, use, and sell an invention for a specified period of time – Trade secrets • Methods, formulas, or devices that give companies competitive advantage and are kept secret
  • 40. Connecting with Computer Science 40 Prosecuting Computer Crime • The United State has a number of laws designed to protect against computer crime – Laws differ widely (both in the U.S. and in other countries) and are open to interpretation • Prosecuting a computer crime is complex – Systems must be replicated entirely or put out of use – Perpetrators are very difficult to find
  • 43. Connecting with Computer Science 43 Table 13-5 (continued)
  • 44. Connecting with Computer Science 44 I Fought the Law and the Law Won • Increasing numbers of crackers are being caught and persecuted • Corporations are willing to pursue copyright violations much more aggressively • Legal ways to use software today – Purchase the right to use a copy with an EULA agreement – Purchase time on a program and connect to it through a network
  • 45. Connecting with Computer Science 45 Ethics in Computing • Ethics are principles for judging right and wrong, held by an individual or group • Ethical systems (along with laws) help create a stable platform from which to live life comfortably with other people and benefit all • Organization of computer professionals have outlined ethical standards or codes of ethics (IEEE, ACM, Computer Ethics Institute, etc.)
  • 46. Connecting with Computer Science 46 Figure 13-6 An excerpt from the Association for Computing Machinery (ACM) “Code of Ethics and Professional Conduct”
  • 48. Connecting with Computer Science 48 Ethical Issues • Software piracy: illegal copying of software • Viruses and virus hoaxes (phony virus warning) • Weak passwords • Plagiarism • Cracking or hacking • Health issues – Designers should be aware of the ergonomics of how the interface will be used
  • 49. Connecting with Computer Science 49 Privacy • The Internet and computerized databases have made invasion of privacy much easier – Spam: unsolicited (and almost always unwanted) e- mail – Spyware: software that can track, collect, and transmit to a third party or Web site certain information about a user’s computer habits – Cookies: programs that can gather information about a user and store it on the user’s machine
  • 50. Connecting with Computer Science 50 One Last Thought • Operators of computer systems must realize that they are not just individually vulnerable; they are part of an overall vulnerability • Steps to reduce vulnerability – Install and update antivirus software, firewalls, and operating system patches – Guard against communicating information – Reassess balance between ease of use, customer, time and cost on one hand, and system security on the other
  • 51. Connecting with Computer Science 51 Summary • Security is more than the hunt for intruders • “hacking” and “hacker” did not originally have the negative connotation that they do today • Intruders can be classified as directed or undirected • Crackers find holes in systems put there intentionally or unintentionally by system administrators and programmers
  • 52. Connecting with Computer Science 52 Summary (continued) • Viruses, worms, and Trojan horses are programs that crackers use to infiltrate system • Social engineering - human (not technological) manipulation - one of the the greatest risks to a company and its computers • Types of attacks on computer systems: access, modification, denial of service, and repudiation • Total risk to an organization is made up of vulnerability, threat, and existing countermeasures
  • 53. Connecting with Computer Science 53 Summary (continued) • Intruders target the confidentiality, integrity, availability, or accountability of information • Many countermeasures in managing security • Install antivirus software, perform system updates, physically restrict access to your computers, and have a good backup system • Users support cracking by using weak passwords • Authentication and identification are different
  • 54. Connecting with Computer Science 54 Summary (continued) • Encrypt information to secure communications • Use firewalls and routers • Difficult to prosecute computer attackers • Some issues in computing that can be viewed from an ethical perspective: software piracy, virus propagation, plagiarism, breaking into computers, and doing harm to people through computers
  • 55. Connecting with Computer Science 55 Summary (continued) • Privacy is protected by law, but employees have fewer rights to privacy while on the job • Many things you can do to protect your privacy – Only give out personal information when you must • Computer and network security is everyone’s responsibility