Trust, Safety, & Reliability Part 2 MALICE. Malware Malware: short for “malicious software” Hackers: people who write and deploy malware Worm: program.

Slides:



Advertisements
Similar presentations
4 Information Security.
Advertisements

What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
Computer Crimes and Security Professor Matt Thatcher.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Created by: Robert McAndrews Career & Technology Education Humble Independent School District.
1 Presented by Ahmad Bahaitham Mohammad Felemban.
Ethics in a Computing Culture
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Computer Crime and Digital Forensics.
Mod H-1 Examples of Computer Crimes. Mod H-2 Stuxnet.
3.04 Malicious Software Can Travel and Spread Unit 3 Internet Basics.
Define and identify unethical practices such as hacking, phone fraud, online piracy, cyberstalking, and data vandalism. Use of employer’s computers for.
What are Trojan horses?  A Trojan horse is full of as much trickery as the mythological Trojan horse it was named after. The Trojan horse, at first glance.
Security, Privacy, and Ethics Online Computer Crimes.
Threats To A Computer Network
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
GROUP 7 RAHUL JIMMY RONEY GEORGE SHABNAM EKKA SHEETHAL JOSEPH Cyber Laws in India- IT Act, 2000; 2004.
Internet Safety for Students Malicious Programs By: Mr. Bradshaw Scott City R-1 Schools.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
ISNE101 Dr. Ken Cosh Week 14. This Week  Challenges (still) facing Modern IS  Reliability  Security.
Cyber crime & Security Prepared by : Rughani Zarana.
Viruses & Destructive Programs
1.Too many users 2.Technical factors 3.Organizational factors 4.Environmental factors 5.Poor management decisions Which of the following is not a source.
C HAPTER 5 General Computer Topics. 5.1 Computer Crimes Computer crime refers to any crime that involves a computer and a network. Net crime refers to.
Computer crime University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot March 2011 March 2011 ITSS 4201 Internet Insurance and.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
 a crime committed on a computer network, esp. the Internet.
C8- Securing Information Systems
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
Introduction of Internet security Sui Wang IS300.
1.2 Security. Computer security is a branch of technology known as information security, it is applied to computers and networks. It is used to protect.
Information Security EDU IT Security Terms EDU
Chapter 5: General Computer Topics Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills /1436.
Here is a list of viruses Adware- or advertising-supported software-, is any software package which automatically plays, displays, or downloads advertisements.
Trojan Virus By Forbes and Mark. What is a Trojan virus Trojans are malicious programs that perform actions that have not been authorised by the user.
Computer Crime crime accomplished through knowledge or use of computer technology. Computers are tools – we choose how to use / apply the technology.
Computer Crimes Career & Technology Education Department.
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Topic 5: Basic Security.
Malicious Software.
Computer Skills and Applications Computer Security.
Internet safety By Suman Nazir
Understand Malware LESSON Security Fundamentals.
Security and Ethics Safeguards and Codes of Conduct.
C OMPUTER C RIMES “Criminal activity directly related to the use of computers, specifically illegal trespass into the computer system or database of.
Information Systems Week 7 Securing Information Systems.
Cybersecurity Test Review Introduction to Digital Technology.
Vocabulary Cassandra Peoples. Pharming the practice of redirecting computer users from legitimate websites to fraudulent ones for the purposes of extracting.
Securing the Electronic Frontier Ch. 6 Reading: pp ; ; CS 340.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Malicious Attacks By: Jamie Woznicki Rahul-Anaadi Kurl Alexander Kaufmann Curtis Songer Daniel Cardenas Rivero.
Information Systems Design and Development Security Risks Computing Science.
CIW Lesson 8 Part B. Malicious Software application that installs hidden services on systems term for software whose specific intent is to harm computer.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Securing Information Systems
CYBER SECURITY...
IT Security  .
Instructor Materials Chapter 7 Network Security
Lecture 8. Cyber Security, Ethics and Trust
Securing Information Systems
– Communication Technology in a Changing World
ISNE101 Dr. Ken Cosh Week 13.
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
Computer Security By: Muhammed Anwar.
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

Trust, Safety, & Reliability Part 2 MALICE

Malware Malware: short for “malicious software” Hackers: people who write and deploy malware Worm: program that makes copies of itself and propagates those copies through a network to infect other computers Virus: similar to a worm, but resides in another program program that must execute in order for the virus to propagate 2Ethics in a Computing Culture

Malware (continued) Spyware: program that is secretly installed for the purpose of collecting information about the computer’s user or users Trojan horse: software that masquerades as an innocent or useful program, but that is actually designed for a malicious purpose Rootkit: program that embeds itself into a computer’s operating system and acquires special privileges that would normally be available to the operating system 3Ethics in a Computing Culture

Case: Stuxnet Worm Stuxnet: a computer worm that has significantly set back the Iranian nuclear development program –extremely sophisticated software, speculated to have been created by the CIA and the Israeli governmant Can the people who wrote the Stuxnet worm be considered ethical hackers? 4Ethics in a Computing Culture

The Net Challenging the sale of virus do-it-yourself kits – Only illegal to release a virus Computer Fraud and Abuse Act Internet’s fragile infrastructure: susceptible to – Phishing attacks – Viruses (self-replicating programs) – Worms (independent programs that travel) The Slammer worm –

Defining cybercrime Criminal acts executed using computer and network technologies 1.Software piracy: unauthorized duplication 2.Computer sabotage: interference with computer systems – Viruses and worms – DoS attacks: mock requests to take down server 3.Electronic break-ins: – Computer espionage – trespass

Electronic break-ins Trespass in cyberspace – Computer Fraud and Abuse Act Protects the confidentiality and makes it a crime to access a computer w/o authorization – Now applies to most any computer iki/Computer_Fraud_and _Abuse_Act iki/Computer_Fraud_and _Abuse_Act Max penalty: 20 yrs & $250k fine Computer Fraud and Abuse Act 18 USC Section 1030 criminalizes: – Transmitting code (virus, worm) that damages a sys – Accessing w/o authorization any computer connected to Internet (n.b. does not req anything to be examined, changed or copied) – Transmitting classified info – Trafficking passwords – Computer fraud & extortion

Hacktivism Blend of hack and activism Malicious hacking for electronic political activism – Non-violent use of digital tools for political ends Typical actions, examples: – Defacing websites Defacing websites – Denial of service attacks Electronic Civil Disobedience (virtual sit-ins)

Case: A&P’s Cash Register Scandal Facts: Would you assume that you added incorrectly, or that the computer did? The A&P cash register scandal: –only possible because people trusted a computer to do arithmetic correctly 9Ethics in a Computing Culture