Chapter 2: Anatomy of the Problem Recent terrorist attacks and the raise in cyber attacks have raised concern about the need to protect the nation’s cyber.

Slides:



Advertisements
Similar presentations
By Kathryn DuFresne. WHAT are computer ethics? Computer Ethics is a branch of practical philosophy which deals with how computing professionals should.
Advertisements

The Whole/Hole of Security Public (DoD) v. Corporate Carl Bourland US Army Judge Advocate Generals Corps.
Chapter 15: Making Decisions about Computers, Information, and Society Invitation to Computer Science, Java Version, Third Edition.
Jacky Altal. T O C  Hackers Terminology  Cyber attacks in 2012 (so far…)  Nations Conflict  Cyber Motives  Characteristics of CyberCrime  DEMO –
Mark Carey, CPA, CISA President Toll free: x101 International: x101 Enterprise Risk Management:
In the next few minutes we’ll teach you how to: Maximize your RFID Solution Take the profit out of counterfeiting Keep accurate track of your chip inventory.
Chapter 1.  Security Problem  Virus and Worms  Intruders  Types of Attack  Avenues of Attack 2 Prepared by Mohammed Saher Hasan.
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Fundamentals of Information Systems, Second Edition 1 Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 9.
1 No Silver Bullet : Inherent Limitations of Computer Security Technologies Jeffrey W. Humphries Texas A&M University.
Ethical and Social...J.M.Kizza 1 Module 9: Computer Crimes Introduction History of Computer Crimes Computer Systems Attacks Motives Costs and Social Consequences.
Computer Crimes Chapter 9. Definition  Illegal act that involves a computer system or computer-related system  Telephone, microwave, satellite telecommunications.
Computers and Crime Breaking and Entering Eavesdropping Harassment Vandalism Destruction of Private Property Possession of Stolen Goods Theft.
Management’s Role in Information Security V.T. Raja, Ph.D., Oregon State University.
Hacker Ethics Kim Bissett Sabrina Short. Hacker Ethic: In General  Freedom of Information The web is not physical; it couldn’t be interpreted as property,
1 CHAPTER 1 POLITICS. 2 Definitions Of The Word Hacker Hacker – someone who has achieved some level of expertise with a computer Hacker – someone who.
Network Security of The United States of America By: Jeffery T. Pelletier.
Know the Client Own the Problem Share the Solution The 2005 Case for Information Technology Security October 14, 2004.
MSIS 110: Introduction to Computers; Instructor: S. Mathiyalakan1 Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter.
Global Information Security Issues According to the E&Y Global Survey, Managers Say the Right Thing… –90% of 1400 companies surveyed in 66 countries say.
Fundamentals of Information Systems, Second Edition 1 Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 9.
January 14, 2010 Introduction to Ethical Hacking and Network Defense MIS © Abdou Illia.
Are Large Scale Data Breaches Inevitable? Douglas E. Salane Center for Cybercrime Studies John Jay College of Criminal Justice Cyber Infrastructure Protection.
Ethics and the Law. Ethics Ethics comes from a Greek word ethe’ which means character. A set of theories of value, virtue or of right action A set of.
IT Security Readings A summary of Management's Role in Information Security in a Cyber Economy and The Myth of Secure Computing.
October The Insider Financial Crime and Identity Theft Hacktivists Piracy Cyber Espionage and Sabotage.
The Social Effect of Information System
What have you known about cybercrime? What do you want to know about cybercrime?
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
C4- Social, Legal, and Ethical Issues in the Digital Firm
IDENTIFYING THREATS IN A GLOBAL MARKETPLACE Ira S. Somerson, BCFE, CPP Loss Management Consultants, Inc. Institute for Global Management Studies And Temple.
Study Results Advanced Persistent Threat Awareness.
Chapter 3: Types of Cyber Attacks Expand the definition of cyberspace to include: – hardware like computers, printers, scanners, servers and communication.
The Simple Side of Computer Security for The Brownies That Like To Read!!
WHAT IS VIRUS? NAE GRAND CHALLENGE SECURE CYBERSPACE.
Introduction to Computer Ethics
Chapter 12 by Lisa Reeves Bertin Securing Information in a Network.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
FEED ME, SEYMOUR! LITTLE SHOP OF HORRORS (1986) DR. JOE CICCONE Unit 4: Monitoring Employees – CJ 315.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
 The job of a police officer is to work in a community to ensure the safety of the community and to maintain law and order. I am interested in this career.
Secure Connections for a Smarter World Dr. Shuyuan Mary Ho Assistant Professor School of Information Florida State University.
JEnterprise Suite For Network Monitoring and Security Dr. Sureswaran Ramadass, Dr. Rahmat Budiarto, Mr. Ahmad Manasrah, Mr. M. F. Pasha.
Force Protection. What is Force Protection? Force protection (FP) is a term used by the US military to describe preventive measures taken to mitigate.
Do you believe in this? Due to its very nature, the Internet is NOT a safe or secure environment. It is an ever-changing medium where anyone and everyone.
OCTAVE-S on TradeSolution Inc.. Introduction Phase 1: Critical Assets and threats Phase 2: Critical IT Components Phase 3: Changes Required in current.
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
A Global Approach to Protecting the Global Critical Infrastructure Dr. Stephen D. Bryen.
Security in Cloud Computing Zac Douglass Chris Kahn.
What is “national security”?  No longer defined only by threat of arms  It really is the economy  Infrastructure not controlled by the government.
National Model Scanning Tour “Communications”. The Iowa Department of Public Safety administers a trusted statewide network of servers, PCs, service.
CHAPTER 2 Laws of Security. Introduction Laws of security enable user make the judgment about the security of a system. Some of the “laws” are not really.
Principles of Information Systems, Sixth Edition Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 14.
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
Chapter 16 – Technological Development Technological Development Employees, managers and organisations, as well as the population in general, take for.
Regional Cyber Crime Unit
Centre of Expertise - Security Securing your business against cybercrime Or surely we do not have anything to worry about...do we?
External Threats Internal Threats Nation States Cyber Terrorists Hacktivists Organised criminal networks Independent insider Insider planted by external.
WHEN, NOT IF THE CYBER SECURITY CHALLENGES AMONG LOCAL GOVERNMENT UMBC Public Policy Forum Baltimore Maryland April 15, 2016 Gayle B. Guilford CISO Baltimore.
Chapter One Copyright © 2016 Thomas J. Holt. All rights reserved.
EUROPEAN SECURITY POLICY A SNAPSHOT ON SURVEILLANCE AND PRIVACY DESSI WORKSHOP, CPH 24 JUNE 2014 Birgitte Kofod Olsen, Chair Danish Council for Digital.
October 28, 2015 Cyber Security Awareness Update.
Cybersecurity as a Business Differentiator
Common Methods Used to Commit Computer Crimes
Fundamentals of Information Systems
Navigating Security Seas in a Small Ship with a Limited Crew
Securing your hack-free work environment
5/6/2019 Information Warfare Trends, Dangers, and the Impact for European Research Policy Dipl. Pol. Ralf Bendrath, Berlin FoG:IS ReG:IS Forschungsgruppe.
Chapter 15: Making Decisions about Computers, Information, and Society
Discussion Government Private Business Tools for prevention Congress
Presentation transcript:

Chapter 2: Anatomy of the Problem Recent terrorist attacks and the raise in cyber attacks have raised concern about the need to protect the nation’s cyber infrastructure The big and most recent ones like:

Code Red

Manila-based I Love You

Mafia Boy - DDoS

Melissa

Daily alerts from the tech people Almost every day at work you are reminded by the people in the tech support office of a virus on the loose.

Will there ever be an end to these? Cyberspace infrastructure and communication protocols are inherently weak T he average user in cyberspace has very limited knowledge of the computer network infrastructure, its weaknesses and gapping loopholes. Society, as a whole, is increasingly becoming irreversibly dependent on an infrastructure and technology that it least understands.

There are no long-term, let alone immediate plans and mechanism in place or planned to educate the public. There is a high degree of compliancy in a society that still accords a "Wiz Kid" status to cyberspace vandals The only known remedy mechanisms and solutions to the problem are patching loopholes after an attack has occurred. The price of this escalating problem is yet to be known. Reporting is voluntary, haphazard, and quite often at will. The nation is yet to understand the seriousness of cyber vandalism.

What are the causes? Vendetta/Revenge Demonstrations at World Trade Organization (WTO) in Seattle, Washington, the World Bank and the International Monetary Fund in Washington, D.C., Prague, Hungry, and Geneo Italy – against globalization. Joke/Hoax/Prank The Hacker's Ethics All information should be free Terrorism Political and Military Espionage Business ( Competition) Espionage Hate (national origin, gender, and race) Personal gain/Fame/Fun/Notoriety Ignorance

Challenges in Tracking Cyber Criminals Nearly in all countries there is no required reporting mechanism in government agencies, even the private sector, to detect intrusions and report such intrusions In the private sector, there is very little interest in reporting of any system related intrusions. This is a result of the fear of marketplace forces that would expose management’s weaknesses to the shareholder community and competitors.

There is no adequate enforcement of existing reporting mechanisms The insider effect, it is reported in some studies that most e-attacks are generated and started by inside employees. This makes the job of detection and reporting very murky. It is like having an arsonist working in the fire department Many nations have no required and trained security agencies to fight e-attacks.

Social and Ethical Consequences

Psychological effects – these include hate and joke especially on an individual. – may lead to individual reclusion, –increasing isolation, and such trends may lead to dangerous and costly repercussions on the individual, corporations and society as a whole. Moral decay – There is a moral imperative in all our actions. When human actions, whether bad or good, become so frequent, they create a level of familiarity that leads to acceptance as “normal”. This type of acceptance of actions formerly viewed as immoral and bad by society lead to moral decay.

Loss of privacy – After an attack, there is usually an over reaction and a resurgence in the need for quick solutions to the problem that seems to have hit home. Many businesses are responding with patches, filters, ID tools, and a whole list of “solutions”. profile scanners and straight scanners like Echlon. Echlon is a high-tech U.S. government spying software housed in England. It is capable of scanning millions of s given specific keywords. Tracking technology to lead to virus writers. Trust – Along with privacy lost, is trust lost. Individuals once attacked, lose trust in a person, group, company or anything else believed to be the source of the attack or believed to be unable to stop the attack.