0% found this document useful (0 votes)
120 views21 pages

Social and Professional Issues

Uploaded by

Randy Tabaog
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
120 views21 pages

Social and Professional Issues

Uploaded by

Randy Tabaog
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 21

Chapter 6:

Computer and Network Security

Ethics for the Information Age


Forth Edition

by
Randy G. Tabaog, LPT

Copyright © 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley


Chapter Overview

• Introduction
• Viruses, worms, and Trojan horses
• Phreaks and hackers
• Denial-of-service attacks
• Online voting

1-2

Copyright © 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 6-2


Introduction

• Computers getting faster and less expensive


• Utility of computers increasing
– Email
– Web surfing
– Shopping
– Managing personal information
• Increasing use of computers  growing
importance of computer security
1-3

Copyright © 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 6-3


Viruses (1/2)

• Virus: piece of self-replicating code embedded


within another program (host)
• Viruses associated with program files
– Hard disks, floppy disks, CD-ROMS
– Email attachments
• How viruses spread
– Diskettes or CDs
– Email
– Files downloaded from Internet

1-4

Copyright © 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 6-4


Viruses (2/2)

• Well-known viruses
– Brain
– Michelangelo
– Melissa
– Love Bug
• Viruses today
– Commercial antivirus software
– Few people keep up-to-date

1-5

Copyright © 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 6-5


Worms

• Worm
– Self-contained program
– Spreads through a computer network
– Exploits security holes in networked computers
• Famous worms
– WANK
– Code Red
– Sapphire (Slammer)
– Blaster
– Sasser

1-6

Copyright © 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 6-6


The Internet Worm

• Robert Tappan Morris, Jr.


– Graduate student at Cornell
– Released worm onto Internet from MIT computer
• Effect of worm
– Spread to 6,000 Unix computers
– Infected computers kept crashing or became unresponsive
– Took a day for fixes to be published
• Impact on Morris
– Suspended from Cornell
– 3 years’ probation + 400 hours community service
– $150,000 in legal fees and fines

1-7

Copyright © 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 6-7


Ethical Evaluation
• Kantian evaluation
– Morris used others by gaining access to their computers
without permission
• Social contract theory evaluation
– Morris violated property rights of organizations
• Utilitarian evaluation
– Benefits: Organizations learned of security flaws
– Harms: Time spent by those fighting worm, unavailable
computers, disrupted network traffic, Morris’s
punishments
• Morris was wrong to have released the Internet
worm
1-8

Copyright © 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 6-8


Trojan Horses
• Trojan horse: program with benign capability that
masks a sinister purpose
• Remote access Trojan: Trojan horse that gives
attack access to victim’s computer
– Back Orifice
– SubSeven
• RAT servers often found within files downloaded
from erotica/porn Usenet sites
• provide the attacker with complete control of the
victim's system. Attackers usually hide these Trojan
horses in games and other small programs that
unsuspecting users then execute on their PCs. 1-9

Copyright © 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 6-9


Bot Networks
• Bot: A software program that responds to
commands from a program on another computer
• Some bots support legitimate activities
– Internet Relay Chat
– Multiplayer Internet games
• Other bots support illegitimate activities
– Distributing spam
– Collecting person information for ID theft
– Distributed denial-of-service attacks

1-10

Copyright © 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 6-10


Defensive Measures
• System administrators play key role
• Authorization: determining that a user has
permission to perform a particular action
• Authentication: determining that people are
who they claim to be
• Firewall: a computer monitoring packets
entering and leaving a local area network
– Ex: packet filter which accepts packets only
from trusted computer on the Internet
1-11

Copyright © 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 6-11


Mon 29-11 Hackers (1/2)
• Original meaning (1950s)
– Explorer
– Risk-taker
– Technical virtuoso
– Make a system do something never done before
• MIT developed a system to control movement of trains
• Hacker ethic
– Hands-on imperative
• Access to computers that might teach you something about the
work
– Free exchange of information
– Mistrust of authority--- promote decentralization
– Value skill above all else  not degrees, position, …
– Optimistic view of technology  computer can change
your life to the better 1-12

Copyright © 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 6-12


Hackers (2/2)

• Meaning of “hacker” changed


– Movie WarGames (1983)
– Teenagers accessing corporate or government
computers by trying to get user names and passwords:
• Dumpster diving
– Looking through garbage for interesting bits of information
• Social engineering: manipulation of a person inside an
organization to gain access to confidential info.
– A hacker calling a system admin. Pretending he is his boss’s boss
and asks for revealing passwords.
– Modern use of hacking means ------- Malicious acts
• Computer break-ins
• Destroying databases
• Stealing confidential personal information
1-13

Copyright © 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 6-13


Phone Phreaking

• Phone phreak: someone who manipulates


phone system to make free calls
• Most popular methods
– Steal long-distance telephone access codes
– Guess long-distance telephone access codes
– Use a “blue box” to get free access to long-
distance lines --- mimic the actual frequency
• Access codes posted on “pirate boards” by
phreaks to share codes and credit card No.
1-14

Copyright © 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 6-14


Penalties for Hacking
• Examples of illegal activities
– Accessing without authorization any Internet computer
– Transmitting a virus or worm
– Trafficking in computer passwords
– Intercepting a telephone conversation, email, or any
other data transmission
– Accessing stored email messages without
authorization
– Adopting another identity to carry out an illegal activity
• Maximum penalty: 20 years in prison + $250,000 fine

1-15

Copyright © 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 6-15


Denial-of-Service Attacks
• Denial-of-service attack: an intentional action
designed to prevent legitimate users from
making use of a computer service
• Goal of attack: disrupt a server’s ability to
respond to its clients
• About 4,000 Web sites attacked each week
• Asymmetrical attack: a single person can harm
huge organization (multinational organization)
• Asymmetrical attack that may prove popular with
terrorists
– Ex: mafiaboy ---2000 --- Dos of amazon, yahoo, cnn,
ebay, dell
1-16

Copyright © 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 6-16


SATAN

• Security Administrator Tool for Analyzing


Networks (SATAN)
• Allows administrators (especially novices)
to test their systems
• Could be used by a hacker to probe other
computers for security weaknesses
• Critics worried SATAN would turn unskilled
teenagers into hackers
• That never happened
1-17

Copyright © 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 6-17


Motivation for Online Voting

• 2000 U.S. Presidential election closely contested


• Florida pivotal state
• Most Florida counties used keypunch voting
machines
• Two voting irregularities traced to these
machines
– Hanging chad
– “Butterfly ballot” in Palm Beach County

1-18

Copyright © 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 6-18


1-19

Copyright © 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 6-19


Benefits of Online Voting

• More people would vote


• Votes would be counted more quickly
• No ambiguity with electronic votes
• Cost less money
• Eliminate ballot box tampering
• Software can prevent accidental over-voting
• Software can prevent under-voting

1-20

Copyright © 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 6-20


Risks of Online Voting
• Gives unfair advantage to those with home computers
• More difficult to preserve voter privacy
– The system records the ballot as well as the identity of voter
• More opportunities for vote selling
– X:voter, y: candidate, z: broker who watch voting of x from his PC
• Obvious target for a DDoS attack
• Security of election depends on security of home
computers
– Susceptible to vote-changing virus or RAT
• Susceptible to phony vote servers
– Redirected to phony server, getting credentials, then vote on your
behalf from the actual site
• No paper copies of ballots for auditing or recounts
1-21

Copyright © 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley 6-21

You might also like