IC322 Fall 2013 Cyber Ethics. Background World population: 7,000,000,000 (7 billion) humans 80,000,000 (80 million) added to population each year 1,600,000,000.

Slides:



Advertisements
Similar presentations
Janis Gatewood EDU689 January 27, Faculty and Staff COMPUTER CRIME ACT Section of the Code of Laws of S.C. states that: 1. It is unlawful.
Advertisements

Black, White, Grey Hat Hackers Not all hackers are bad…which one’s which?
 Someone who exercises playful ingenuity  Misusers of the internet who try to obtain or corrupt information; people who try to prevent it.
An Introduction of Multimedia Etiquette Nicole Huang.
Ten Commandments of Cyber Ethics. I. Thou shalt not use a computer to harm people Be polite when you are sending messages to people. Treat other people.
COMPUTER Protection & PRIVACY ISSUES Selected examples using concepts from Computer Concepts by Pusins & Ambrose, South-Western Education Division, 2001.
1 Presented by Ahmad Bahaitham Mohammad Felemban.
Internet Etiquette Shenita D. Ballard Misty Monreal Sandra Monroe
Cyber Crime. Statistics  The 2000 Computer Security Institute/FBI Computer Crime and Security Survey  Ninety percent of the study's 585 respondents.
COMPUTER ETHICS What does it mean to be “ethical” on the computer?
Computer and Internet Crimes By: Tracey Ross & Tommy Brown.
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
Security, Privacy, and Ethics Online Computer Crimes.
Ethical Hacking by Shivam.
Hands-On Ethical Hacking and Network Defense
CDS Fall, 2011 Computing for Scientists Ethics (Dec. 06, 2011) Jie Zhang Copyright ©
Understanding Business Ethics
January 14, 2010 Introduction to Ethical Hacking and Network Defense MIS © Abdou Illia.
CDS Fall, 2010 Computing for Scientists Ethics (Nov. 30, 2010) Jie Zhang Copyright ©
Internet Etiquette or Netiquette BY: Jennifer Rudd Nov
What Is Computer Ethics?
Computers Are Your Future Twelfth Edition Spotlight 1: Ethics Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 1.
Port Byron Central School Port Byron NY Computer Ethics Presentation September 2003.
Computer Ethics – The Ten Commandments
Computer Hacking By: Caleb Herring Katie Edom. What is Computer Hacking Computer Hacking is defined as one who uses programming skills to access, legally.
Computer ethics.
By Adam, Rachelgail & Kayla. What is internet Ethics? They are principles and guidelines to be applied whilst using the internet. Codes of ethics have.
Possible WebQuest type links  
Describe ethical considerations resulting from technological advances.
Computer Ethics Prepared by. Discuss “Character is what you do when no one is watching.” --old adage.
Computer Ethics.
Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-1 ACS 1803 Lecture Outline 15 ETHICS AND COMPUTER CRIME.
Computer Ethics for Computer Users
Ethical and Legal Issues v Ethical and legal issues are relevant to any project involving systems development. – privacy – professionalism – ownership.
COMPUTER ETHICS. What is Computer Ethics? Ethics is a set of moral principles that govern the behavior of a group or individual. computer ethics is set.
COMPUTER ETHICS Do you know the difference between right and wrong?
Chapter 7: IT Ethcs Courtney Littlejohn CSCI 101 Thursday 3:30.
Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time.
Unit 3- Introduction to Computer Ethics
Ethics, Computing, and the Internet
Business Ethics Why should business ethics concern you?
The Ten Commandments of Computer Ethics. The 1st Commandment Thou shalt not use a computer to harm Thou shalt not use a computer to harm other people.
Computer Crimes Career & Technology Education Department.
8/16/08Computer Ethics Institute Mae Thomas The Ten Commandments of Computer Ethics by the Computer Ethics Institute.
COMPUTER ETHICS. Computer Ethics n What is ethical behavior? n How do we make ethical decisions? n Matherial from Ethical Decision Making and Information.
CSC Intro. to Computing Lecture 19: Ethics & Computers.
The Ten Commandments of Computer Ethics Written by the Computer Ethics Institute A project of the Brookings Institution
Computer Ethics CSCI 101 Kara kelly. Ethics Ethics can be defined as a discipline in which one attempts to identify, organize, analyze, and justify human.
Ethics Business Law Sunny Hills High School Mrs. Larsen.
Computer Ethics. Ten Commandments of Computer Ethics Copyright: Computer Ethics Institute Author: Dr. Ramon C. Barquin.
Topic 5: Basic Security.
Lesson 01: Computer Lab Regulations Lab Organisation
ALABAMA TECHNOLGY STANDARDS FOR TEACHERS Ethical Issues of Technology Presented by: Shirley Johnson & Keisha D. Smith.
Computer Ethics. Ethics The rules and standards governing the conduct of an individual with others.
Chapter 1 Ethical Hacking Overview. Hands-On Ethical Hacking and Network Defense2  Describe the role of an ethical hacker  Describe what you can do.
COMPUTER ETHICS AND LEGAL ISSUES
Intro to Information Security Phil Grimes Coach / Mentor Security Consultant.
INFORMATION TECHNOLOGY ETHICS INFORMATION TECHNOLOGY ETHICS.
External Threats Internal Threats Nation States Cyber Terrorists Hacktivists Organised criminal networks Independent insider Insider planted by external.
 Computer Ethics  Definition  Information Ethics  Areas of Ethical Problems  Computer Ethics Issues  Computer Ethics: Academic Discipline  History.
Starter Who is this cheerful character?. Legal, Ethical and Environmental Implications of Computer Use.
Introduction to Information Security Module 1. Objectives Definitions of information technology and information security Fundamental Security Concepts.
HACKING Submitted By: Ch. Leela Sasi, I M.C.A, Y11MC29011, CJJC P.G College.
Computer Ethics IT Fundamentals Battlefield High School.
Computers Are Your Future Twelfth Edition
Internet Etiquette or Netiquette
Internet Etiquette or Netiquette
Unit 3- Introduction to Computer Ethics
GenCyber Day 1.
Presentation transcript:

IC322 Fall 2013 Cyber Ethics

Background World population: 7,000,000,000 (7 billion) humans 80,000,000 (80 million) added to population each year 1,600,000,000 (1.6 billion) estimated Internet users Thousands of new hackers born every day Hackers can directly affect 23% of world population

What are Cyber Ethics? Cyber Ethics == Ethics Cyber Morals == Morals The same rules apply in cyberspace as in the real world: Trespassing is wrong Stealing services (Internet access) is wrong Stealing information is wrong Damaging somebody else’s property is wrong Reading somebody else’s mail is wrong Lying about yourself (e.g. name/age/background) is wrong Network owners make the rules; users follow them It is easy to convince yourself that you can’t be committing a crime in your own home, at your own computer, so people often act immoral online. Don’t fall into that trap.

Definitions Hacker – which definition is most appropriate? a) Orig. – member of the computer programmer subculture in 1960s academia, esp. at MIT b) (neg.) Person committed to circumvention of computer security c) (neg.) Computer criminal d) (pos.) Person who enjoys the details of programmable systems, especially networks The term “hacker” is controversial and means different things to different people. Hackers are usually only in the news when they are arrested, so the term picked up negative connotations in mainstream usage.

Definitions Cracker – Computer security penetration expert The same word applies to both moral and immoral actors Etymology is from “hacker” and “safe-cracker”

Definitions “Pentesting” – Penetration Testing Evaluating computer security by simulating an attack from malicious outsiders Generally a third-party evaluation Exposes vulnerabilities so sysadmin can repair them Care must be taken to hire a competent and ethical team Pentesting is by contract Penetration rules are clearly spelled out in advance Complete results are given to the network owner Never pentest without written permission from the network owner

Network threats - external Organized crime Terrorists Governments Corporate competition Hacktivists (e.g. Anonymous) Hired guns (crackers hired by one of the above) Script-kiddie trying to make a name for himself

Network threats - internal Disgruntled employees (e.g. alleged Wikileaks scandal) Clueless employees (e.g. accidental security compromises) Customers Suppliers Vendors Business partners Contractors/temps/consultants These groups often use their legitimate network access to try to find information about competition or an edge with contract bids

Types of Hackers Black Hat Hacker Violates computer security for maliciousness or personal gain Organized crime sets up zombie networks Keyboard loggers Password-stealing Identify theft Looking for kicks Breaking into a network “just to prove you can do it” You qualify as Black Hat whether the network is damaged or not. Trespassing/breaking and entering are crimes.

Types of Hackers White Hat Hacker Breaks into computer systems for non-malicious reasons “Ethical Hackers” – as defined by the people who own the network Penetration testers under contract “Ethical Hacking” certificates available:

Types of Hackers Grey Hat Hacker Many definitions; ethics are questionable and heavily debated Term originated with the debate over where to disclose security vulnerabilities: White Hats: support full disclosure to vendors, customers, etc. Black Hats: do not disclose security flaws, keep them for private use Grey Hats: report flaws to vendors and the hacking community only Other uses: White Hat hackers who engage in Black Hat activity at night Freelance hackers who browse the Internet looking for security holes, and then tell the sysadmin about them, possibly asking for a fee A hacker who acts illegally, but with the intent to improve security Navy ethics policy: “If there is doubt, there is no doubt.”

Types of Hackers “Hacktivist” A hacker who uses technology to spread their personal message Social Ideological Political Religious Usually involves web defacement and denial-of-service attacks Hacktivists act immorally, but would argue that it is for “the greater good” Anonymous taking down Church of Scientology websites Personal information about Bill O’Reilly’s web subscribers posted online Egyptian gov’t websites hacked during 2011 demonstrations DDOS attacks vs. Visa/Mastercard following Julian Assange’s arrest

Levels of Hacker Competence Elite Hacker Highly skilled Understand the OS extremely well Speaks multiple languages C++/Assembler/Machine code SQL/PHP/Javascript Finds new zero-day exploits Authors tools like Metasploit to break into networks May be White, Black, or Grey Hats

Levels of Hacker Competence Script-Kiddie Non-expert Uses OTS cracking/penetration tools like Metasploit, without understanding how they work Usually Black-Hat Often young and immature Most common attacks involve web defacement/deleting files Akin to graffiti “artists”

Rate the ethics… A hacker breaks into a server, touches nothing, then s the sysadmin with proof of the hack (e.g. screenshot) and tells them where their security weakness is. Highly unethical Highly ethical An intruder breaks into your house, touches nothing, then mails a photo of himself in your living room and a note that says your back door is unlocked. Highly unethical Highly ethical

Judging online ethics… People make the mistake of thinking online ethics are more permissive than real-world ethics When in doubt, find a real-world analogy to online behavior, and use that to judge if an action is right or wrong:

Ten Commandments of Computer Ethics From the Computer Ethics Institute 1. Thou Shalt Not Use A Computer To Harm Other People. 2. Thou Shalt Not Interfere With Other People’s Computer Work. 3. Thou Shalt Not Snoop Around In Other People’s Computer Files. 4. Thou Shalt Not Use A Computer To Steal. 5. Thou Shalt Not Use A Computer To Bear False Witness. 6. Thou Shalt Not Copy Or Use Proprietary Software For Which You have Not Paid.

Ten Commandments of Computer Ethics From the Computer Ethics Institute 7. Thou Shalt Not Use Other People’s Computer Resources Without Authorization Or Proper Compensation. 8. Thou Shalt Not Appropriate Other People’s Intellectual Output. 9. Thou Shalt Think About The Social Consequences Of The Program You Are Writing Or The System You Are Designing. 10. Thou Shalt Always Use A Computer In Ways That Ensure Consideration And Respect For Your Fellow Humans.

Ethical or unethical? Breaking into a secure network to steal gov’t secrets? Breaking into a network but not reading any files? Running a port-scanning tool on the USNA network to see whether it is at risk? Reading wireless network traffic at a public location? Logging into an unsecured “linksys” wireless router? Defacing a website that you find morally reprehensible? Logging into Facebook under an alias?

Legal policies affecting network access Computer Fraud and Abuse Act – 1986 Originally intended to protect nat’l security data on federal networks Expanded to penalize anybody who knowingly “exceeds authorized access” on a computer to obtain information Can be interpreted as “violating user agreements on a social networking site” Broad enough to include online mischief as well as criminals Fines & imprisonment up to 20 years Acceptable Use Policy for USNA IT Resources Similar policy in every command Loss of privileges – impacts your ability to be either a mid or officer Conduct/legal repercussions

Can a policy cover all contingencies? 4. PERMISSIBLE USES OF THE INTERNET ARE DEFINED TO INCLUDE ALL USES NOT PROHIBITED BY LAW, REGULATION, INSTRUCTION OR COMMAND POLICY. 5. PROHIBITED USES INCLUDE (NOT AN ALL INCLUSIVE LIST):