CNS3113 - Ethics for IT Workers
56 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What term describes the act of making illegal copies of software?

  • Software licensing
  • Software piracy (correct)
  • Software modification
  • Software engineering

What is a critical ethical issue that arises when a company recommends its own products to clients?

  • Software piracy
  • Whistle-blowing
  • Negligence
  • Conflict of interest (correct)

Which organization aims to combat unauthorized software copying?

  • Business Ethics Alliance
  • International Software Federation
  • Global IT Standards Association
  • Business Software Alliance (correct)

What is a trade secret?

<p>Confidential business information (A)</p> Signup and view all the answers

What type of act is whistle-blowing associated with?

<p>Attracting attention to unethical actions (B)</p> Signup and view all the answers

In a client-IT worker relationship, what does the client typically provide?

<p>Compensation and access to resources (D)</p> Signup and view all the answers

What can misrepresentation during a project lead to?

<p>Charges of fraud or breach of contract (D)</p> Signup and view all the answers

Which of the following describes the relationship between IT workers and their clients?

<p>The relationship is usually documented contractually. (C)</p> Signup and view all the answers

What is a primary duty of IT workers in relation to users?

<p>To understand users' needs and capabilities (A)</p> Signup and view all the answers

Which of the following elements is typically included in professional codes of ethics?

<p>Aspirations of the organization (C)</p> Signup and view all the answers

How can following a professional code of ethics benefit society?

<p>By providing significant benefits and avoiding harm (B)</p> Signup and view all the answers

What must IT workers establish to support ethical behavior?

<p>An environment discouraging software piracy (B)</p> Signup and view all the answers

What expectation does society have of professional IT workers?

<p>To provide significant benefits without causing harm (B)</p> Signup and view all the answers

Which of the following is considered a form of cybercrime under UAE law?

<p>Hacking to IT systems (D)</p> Signup and view all the answers

What percentage of electronic harassment cases in the Middle East involves teenagers being cautious about their social networks?

<p>24% (A)</p> Signup and view all the answers

Which of the following actions does NOT correlate with UAE Cybercrime Law?

<p>Regulating social media platforms (C)</p> Signup and view all the answers

Which of these acts does the UAE Cyber Law classify as a serious offense?

<p>Defamation (B)</p> Signup and view all the answers

What is one of the primary aims of the My Safe Society App in the UAE?

<p>To report cybercrime incidents (B)</p> Signup and view all the answers

Which cybercrime is categorized by wrongful impersonation according to UAE laws?

<p>Identity theft (C)</p> Signup and view all the answers

What does Federal Law no.(4) of 2002 specifically address within the UAE laws?

<p>Criminalizing Money Laundering (A)</p> Signup and view all the answers

Which form of cybercrime is described by publishing illegal content?

<p>Sharing false information (A)</p> Signup and view all the answers

What must the IT team do if a company is a victim of a cybercrime?

<p>Cooperate with police to gather evidence. (C)</p> Signup and view all the answers

Why might Public Prosecution not pursue cases involving automatic money transfers outside the UAE?

<p>They lack sufficient evidence and interest. (D)</p> Signup and view all the answers

What is essential for investigating offenders outside the UAE?

<p>Judicial cooperation agreements for extradition. (D)</p> Signup and view all the answers

What is a significant challenge when identifying an offender in a cybercrime case?

<p>Not knowing the offender complicates identification. (C)</p> Signup and view all the answers

What must be adapted when gathering evidence for cybercrime cases?

<p>Thresholds of evidence must be less stringent. (D)</p> Signup and view all the answers

In cases of cybercrimes involving multiple victims, what aspect may complicate legal proceedings?

<p>Complications arise from jurisdictional issues. (D)</p> Signup and view all the answers

What legal action is necessary for the extradition of offenders outside the UAE?

<p>International agreements regulating extradition. (B)</p> Signup and view all the answers

Which element of a cybercrime must be proven to assist in the investigation?

<p>Validity of the evidence presented. (A)</p> Signup and view all the answers

What is the key purpose of implementing a SETA program in an organization?

<p>To enhance security and build in-depth knowledge for users (A)</p> Signup and view all the answers

Which of the following represents a significant component of professional malpractice in IT?

<p>Failure to exercise duty of care (C)</p> Signup and view all the answers

What is the primary benefit of security awareness programs?

<p>Improving organizational attitudes towards security (B)</p> Signup and view all the answers

Which of the following is NOT a typical job title associated with information security programs?

<p>Human Resources Manager (C)</p> Signup and view all the answers

What does the term 'duty of care' refer to in the context of IT malpractice?

<p>The responsibility to protect users against unreasonable risk (C)</p> Signup and view all the answers

Which of the following is a measure to promote ethical use of IT resources?

<p>Defining appropriate use policies for IT (D)</p> Signup and view all the answers

What aspect should NOT be included in training methodologies according to best practices?

<p>Use highly technical jargon for clarity (D)</p> Signup and view all the answers

Which of these practices is essential for creating an effective security awareness program?

<p>Regularly updating awareness techniques (D)</p> Signup and view all the answers

What challenge is faced when conducting security training for employees?

<p>Modifying employee behavior that risks security (C)</p> Signup and view all the answers

Which statement best describes the role of management in security training and awareness?

<p>Management's good example can reinforce training initiatives (B)</p> Signup and view all the answers

What is one common ethical issue among IT users?

<p>Inappropriate sharing of confidential information (D)</p> Signup and view all the answers

How does the 'reasonable person standard' relate to negligence in IT?

<p>It sets a bar for determining what a typical layperson should do (D)</p> Signup and view all the answers

What is an effective method for customizing security training?

<p>Tailoring training based on functional background and skill level (A)</p> Signup and view all the answers

What is the primary purpose of malicious acts in computer crimes?

<p>To steal important business information (D)</p> Signup and view all the answers

Which factor contributes to the increasing vulnerability of information technology security?

<p>Increasing complexity of computing environments (B)</p> Signup and view all the answers

What is a common characteristic of spam emails?

<p>Unsolicited and numerous (C)</p> Signup and view all the answers

Which type of attack often involves a hacker controlling numerous computers to overwhelm a target site?

<p>Distributed denial of service attack (A)</p> Signup and view all the answers

What is the primary goal of hacktivism?

<p>Achieving a political or social goal (D)</p> Signup and view all the answers

Why are computer crimes often difficult to prosecute?

<p>Prosecutors lack understanding of digital crimes (D)</p> Signup and view all the answers

What distinguishes crackers from hackers?

<p>Crackers engage in criminal activities intentionally (D)</p> Signup and view all the answers

What is one major risk associated with cloud computing?

<p>Increased complexity and vulnerabilities (C)</p> Signup and view all the answers

How can phishing attacks be categorized?

<p>Via emails, texts, and voice messages (A)</p> Signup and view all the answers

What aspect makes rootkits particularly challenging to detect?

<p>The operating system cannot be trusted (C)</p> Signup and view all the answers

What do zero-day attacks exploit?

<p>Vulnerabilities before they are known or patched (D)</p> Signup and view all the answers

Which type of attacker is primarily motivated by financial gain?

<p>Cyber criminals (B)</p> Signup and view all the answers

What issue arises from users sharing login IDs and passwords?

<p>Increased susceptibility to unauthorized access (A)</p> Signup and view all the answers

What is a known vulnerability associated with commercial software?

<p>Poor system design and implementation (D)</p> Signup and view all the answers

Flashcards

Dress Code

A set of rules specifying acceptable attire for employees at a company.

Work Hours

Predefined time periods for performing work-related activities.

Performance Expectations

Standards that measure an employee's output and quality of work.

Software Piracy

Unauthorized copying or use of software.

Signup and view all the flashcards

Trade Secrets

Confidential business information crucial for a company's competitive advantage.

Signup and view all the flashcards

Whistle-Blowing

Reporting unethical or illegal conduct within an organization.

Signup and view all the flashcards

Client-IT Worker Relationship

Formal or informal agreement between a client (customer) and an IT professional, concerning services provided and compensation.

Signup and view all the flashcards

Conflict of Interest

Ethical problems that arise when an IT worker recommends their own products/services instead of considering alternatives.

Signup and view all the flashcards

Project Reporting

Comprehensive and accurate updates of a project's status to clients.

Signup and view all the flashcards

Inappropriate sharing of corporate info

Sharing company details with unauthorized individuals, either intentionally or casually.

Signup and view all the flashcards

IT user

Someone who uses hardware or software products.

Signup and view all the flashcards

IT Worker Duties

IT workers should understand user needs, give suitable products/services and promote ethical behavior.

Signup and view all the flashcards

Software Piracy

Unauthorized copying or use of software.

Signup and view all the flashcards

Professional Codes of Ethics

Guidelines for expected behavior for a specific profession.

Signup and view all the flashcards

Core Values

Essential principles that guide a profession.

Signup and view all the flashcards

Professional Conduct

Acting in accordance with the professional code of ethics.

Signup and view all the flashcards

Benefits of Ethical Conduct (Profession)

Positive outcomes for individuals, the profession, and society resulting from ethical behavior.

Signup and view all the flashcards

Continuing Education

Ongoing learning and development within a profession.

Signup and view all the flashcards

Inappropriate Use of Computing Resources

Using company resources for personal gain or tasks not related to work duties

Signup and view all the flashcards

UAE Cybercrime Law

A set of laws in the UAE that criminalizes various online activities considered harmful or illegal.

Signup and view all the flashcards

Cybercrime

Harmful or illegal activity conducted using digital technologies, computers, or networks.

Signup and view all the flashcards

Hacking

Unauthorized access or control of IT systems, websites, tools, or networks.

Signup and view all the flashcards

Data Tampering

Altering, deleting, or destroying data in a digital system in an unauthorized way.

Signup and view all the flashcards

Cyberbullying

Harassment or intimidation of others through digital communication.

Signup and view all the flashcards

AE CERT

UAE Computer Emergency Response Team, providing cybersecurity reports & recommendations.

Signup and view all the flashcards

Ethical Decision Making in IT

Making choices that align with moral principles and professional standards in IT. This includes considering the impact on all stakeholders.

Signup and view all the flashcards

IT Professional Malpractice

Occurs when an IT professional fails to meet the expected standard of care, leading to harm or damage.

Signup and view all the flashcards

Negligence (in IT)

Failing to act as a reasonable person would in a similar situation, or acting in a way a reasonable person wouldn't, in IT contexts.

Signup and view all the flashcards

Duty of Care (IT)

Responsibility to avoid causing harm or risk to others through IT actions or inactions.

Signup and view all the flashcards

Reasonable Person Standard (IT)

The expected behavior of a typical professional in a similar situation in a similar role when dealing with information and technology.

Signup and view all the flashcards

Reasonable Professional Standard (IT)

The behavior expected of a qualified IT professional with the relevant skills, experience and knowledge.

Signup and view all the flashcards

Software Piracy

Unauthorized copying or use of software. A violation of copyright laws and software licenses.

Signup and view all the flashcards

Inappropriate Use of IT Resources

Using company computers, networks, or software for non-work-related purposes, leading to inefficiency and loss of productivity.

Signup and view all the flashcards

Information Security Policies

Rules and guidelines that govern how IT systems and data should be used and protected.

Signup and view all the flashcards

SETA (Security Education, Training, and Awareness)

Activities to enhance security awareness and knowledge within an organization.

Signup and view all the flashcards

Security Awareness Program

Activities to raise user awareness of security risks and best practices. This is a critical component of a successful SETA program.

Signup and view all the flashcards

Cybercrime Investigation (UAE)

Investigating cybercrimes where part of the crime is outside the UAE, which may involve challenges in jurisdictions and evidence gathering, and potential difficulties with foreign judicial authorities.

Signup and view all the flashcards

Evidence Gathering (Cybercrime)

Collecting digital evidence (e.g., from hard drives, bank records) crucial for cybercrime investigations; preservation of evidence is critical. Methods may vary depending on location of perpetrator.

Signup and view all the flashcards

International Judicial Cooperation

Agreements that facilitate cybercrime investigations with foreign countries, though foreign jurisdictions may not always be legally bound to cooperate.

Signup and view all the flashcards

Jurisdictional Issues (Cybercrime)

Challenges in determining which court has authority to investigate and prosecute a cybercrime involving multiple victims or locations, especially when the perpetrator is outside the country.

Signup and view all the flashcards

Evidence Thresholds (Cybercrime)

Standards for digital evidence in cybercrime investigations, sometimes needing adaptation to address the nature of the crime or available evidence, which may be less straightforward than traditional evidence methods.

Signup and view all the flashcards

Offender Location (Cybercrime)

Identifying the location of the offender in a cybercrime is essential in pursuing the case. International cooperation can help in extraditing offenders.

Signup and view all the flashcards

Suspicious Account Investigation

Investigating the opening of fraudulent bank accounts is crucial. Cooperation from banks is essential.

Signup and view all the flashcards

IT Security Incidents

Security breaches targeting information technology systems, threatening confidential data and operations.

Signup and view all the flashcards

Reasons for Incidents Spread

Growing complexity, user expectations, evolving systems, and reliance on vulnerable software contribute to widening security gaps.

Signup and view all the flashcards

Increasing Complexity

The expanding number of interconnected computers and software (especially cloud and virtual systems) creates more entry points for cyberattacks.

Signup and view all the flashcards

User Expectations & IT Support

High user expectations and insufficient verification by IT support staff increase vulnerabilities.

Signup and view all the flashcards

Shared Logins/Passwords

Users sharing login information makes systems easier to compromise once one account is breached.

Signup and view all the flashcards

Commercial Software Vulnerabilities

Reliance on software containing known flaws (vulnerabilities) can be exploited to compromise systems.

Signup and view all the flashcards

Zero-Day Attacks

Cyberattacks exploiting previously unknown vulnerabilities before patches are released.

Signup and view all the flashcards

Types of Computer Crimes

Various categories of cybercrimes, including business, financial, terrorist, and protest-motivated attacks, and fun attacks (often involving children).

Signup and view all the flashcards

Prosecuting Computer Crimes

Difficulties in prosecuting these crimes arise due to complex technical details, limited physical evidence, and challenges in recognizing digital asset value.

Signup and view all the flashcards

Computer Viruses

Self-replicating malicious code disguised as harmless programs, spreading through infected files or websites.

Signup and view all the flashcards

Computer Worms

Self-replicating programs that spread without human interaction, often causing damage and productivity losses.

Signup and view all the flashcards

Trojan Horse

Malicious code hidden within legitimate programs, tricked into execution by users.

Signup and view all the flashcards

Distributed Denial-of-Service (DDoS)

Cyberattacks flooding a target server with automated requests, overwhelming it and blocking legitimate users from access.

Signup and view all the flashcards

Rootkit

Set of programs granting unauthorized administrator-level access to a system, often hidden from the user.

Signup and view all the flashcards

Spam

Unsolicited or unwanted email used for advertising or other purposes.

Signup and view all the flashcards

Phishing

Cyberattacks impersonating legitimate entities to trick users into revealing sensitive information.

Signup and view all the flashcards

Hackers

Individuals seeking to explore and test system vulnerabilities.

Signup and view all the flashcards

Crackers

Hackers with criminal intent.

Signup and view all the flashcards

Malicious Insiders

Employees or other authorized individuals who use their access for malicious purposes.

Signup and view all the flashcards

Industrial Spies

Individuals attempting to illegally obtain confidential or proprietary information from competitors.

Signup and view all the flashcards

Cybercriminals

Individuals involved in online fraud or theft.

Signup and view all the flashcards

Hacktivism

Hacking for political or social reasons.

Signup and view all the flashcards

Cyber Terrorists

Individuals using hacking for intimidation or coercion.

Signup and view all the flashcards

Trustworthy Computing

A secure, private, and reliable computing approach emphasizing sound business practices.

Signup and view all the flashcards

Study Notes

Course Information

  • Course title: CNS3113 - CLO4: Ethics for IT workers, SETA programs, Computer Crimes
  • Instructor: Dr. Dimitrios Xanthidis, DBA
  • Institution: Higher Colleges of Technology

Learning Outcomes (Ethics for IT Workers)

  • Identify and explain relationships IT workers manage, and associated ethical issues
  • Describe actions to encourage IT worker professionalism
  • Identify and explain ethical issues faced by IT users
  • Suggest ways to encourage ethical behaviors by IT users

IT Professionals

  • Profession requires specialized knowledge and extensive academic preparation
  • Professionals require advanced training and experience
  • Must exercise discretion and judgment in their work
  • Work cannot be standardized
  • Contribute to society, participate in continuous training, and assist other professionals
  • Carry special rights and responsibilities
  • Partial list of IT specialists includes programmers, systems analysts, software engineers, database administrators, LAN administrators, and CIOs
  • IT workers are not legally defined as professionals, are not licensed by state or federal government, and are not liable for malpractice

Professional Relationships

  • Relationships are managed between employers, clients, suppliers, other professionals, and IT users
  • Relationships are often agreed upon (e.g., dress code, work hours, performance expectations)
  • Other aspects are defined by company policy and procedures
  • Some relationship aspects develop over time
  • IT workers set examples and enforce policies regarding ethical use of IT

Areas of IT Worker Law/Policy Violations

  • Software piracy: illegally copying or enabling access to software not entitled to use
  • The Business Software Alliance (BSA) is a trade group focused on stopping unauthorized software copying
  • Thousands of cases are prosecuted annually
  • Trade secrets, company information
  • Company actions to keep confidential information confidential
  • Some degree of uniqueness or novelty in information

Relationships Between IT Workers and Clients

  • Worker provides hardware, software, or services at a specific cost and time frame
  • Client provides compensation, access to key contacts, and work space
  • Relationship usually documented contractually; clients rely on worker's information, recommendations, and act as client's best interests
  • Conflict of interest: Workers potentially recommending own products/services
  • Problems may arise due to inability of workers to provide comprehensive project status reports

Problems Between IT Workers and Clients

  • Problems arise when workers cannot provide full and accurate project status reports
  • May lead to finger pointing and heated discussions
  • Fraud: obtaining goods, services, or property through deception or trickery
  • Misrepresentation, incomplete statement of material fact – leads to contract cancellation or reimbursement
  • Breach of contract: failure to meet contract terms, leading to party cancellation/compensation or discharge of performance
  • IT projects are collaborations, and difficulties may be difficult to assign blame

Relationships Between IT Workers and Suppliers

  • Develop good relationships to encourage flow of useful information and ideas effectively
  • Deal fairly with suppliers, and avoid unreasonable demands
  • Be wary of ethical abuses like bribery
  • A distinction between acceptable gifts and bribes can be based on the method of offering, secrecy, morality, and whether a favor is expected

Relationships Between IT Workers and Other Professionals

  • Professionals feel loyalty to other members of their profession
  • Professionals owe each other an obligation to follow their profession's code of conduct
  • Ethical problems frequently occur, e.g., résumé inflation

Relationships Between IT Workers and Users/Society

  • IT user is any person using hardware or software
  • IT workers' duties are to understand users' needs and capabilities; provide products and services accordingly
  • Establish environment that supports ethical behaviour, discourage software piracy, minimize inappropriate use of company resources, and avoid inappropriate sharing of information
  • Society expects benefits from members of professions; they should not cause harm through their actions
  • Professional organizations provide codes of ethics for action guidelines

Professional Codes of Ethics

  • State principles and core values essential to the work of an occupational group
  • Codes usually outline aspirational goals, expectations for members, and requirements for continuing education
  • Ethical practices often engender professional and societal benefits

IT Professional Malpractice

  • Negligence: failure to act as a reasonable person would; or acting in a way a reasonable person would not
  • Duty of care, obligation to protect people from unreasonable harm
  • Reasonable person standard, reasonable professional standard
  • Professionals liable for damages caused by their negligence
  • Ethical use of IT increasingly important due to increased access to personal computers, corporate systems, and the internet

Supporting Ethical Practices of IT

  • Policies protect against abuses by setting forth general rights, acceptable behaviors, and enabling management to punish violations
  • Policy components include guidelines for use of company software, defining appropriate use of IT resources, structuring info systems, and installing/maintaining a corporate firewall

Common Ethical Issues for IT Users

  • Software piracy
  • Inappropriate use of computing resources
  • Low productivity and wasted time
  • Possible lawsuits
  • Inappropriate sharing of information, including:
    • Private data (employees and customers)
    • Confidential information (company and operations)

CNS3113 - SETA: Learning Outcomes

  • Explain organizational approaches to information security
  • Identify and describe functional components of the information security program
  • Determine how to plan and staff organizational information security programs (size-based)
  • Evaluate internal and external factors affecting information security programs
  • List and describe typical IT security job titles and functions
  • Describe components of security education, training, and awareness programs
  • Explain how organizations create and manage security programs

Components of SETA

  • The details of information security needs vary based on organization/business culture, size, and budget
  • Determining what level information security program operates requires knowledge of organization's strategic plans/vision statements. CIO/CISOs use these statements to develop program mission statements designed to reduce accidental security breaches
  • Employee behavior and accountability improvement are two benefits of awareness, training, and education programs

Purpose and Framework of SETA

  • Building in-depth, needed knowledge to design, implement, or operate security programs for organizations and systems
  • Developing skills to better use IT systems while more securely performing job duties
  • Improve awareness of need to protect system resources

Security Training

  • Detailed information and hands-on instruction providing skills to users for secure performance of duties
  • Methods for customizing training (e.g., general, managerial, technical users; beginner, intermediate, advanced skill levels)
  • Employee training utilizing local training programs, continuing education departments, external training agencies, professional trainers, and in-house training

Security Awareness

  • Security awareness programs are one of the least frequently implemented, yet most effective methods.
  • Programs utilize methods to adjust organizational attitudes and realize the importance of security practices
  • SETA (Security Education, Training, and Awareness) best practices: focus on people, avoid technical jargon, utilize available venues, define objectives clearly, keep it easy to understand, and be timely

Commandment of InfoSec Awareness Training

  • Information security is a user/people issue, not a technical one; use language users understand
  • Make points identifiable; avoid jargon
  • Maintain humor and conclude points clearly
  • Let recipients know how actions will affect them
  • Formalize methodology
  • Be timely, even if it means adjusting schedules

Employee Behavior, Awareness, and Accountability

  • Security awareness and training modify employee behavior that endangers organizational information
  • Effective programs make employees accountable for their actions.
  • Dissemination and enforcement of policy is supported by training, and demonstrating due care prevents lawsuits

Awareness Techniques

  • Awareness can use various methods to deliver information based on the specific audience in a creative and frequently evaluated way
  • Effective security awareness programs recognize that some people tend to tune out

Developing Security Awareness Components

  • Many program components are available at low cost (videos, posters, lectures, conferences, computer-based training, newsletters, brochures, trinkets, bulletin boards)

Security Posters

  • Series can be a practical and inexpensive method for increasing awareness of security issues
  • Posters keep security concerns prominent in users' minds and can have a positive impact on user behavior
  • Professional posters are generally expensive; in-house development may be a more budget-friendly choice

Security Trinkets

  • Low unit cost, expensive to implement en masse
  • Examples (pens, mouse pads, coffee mugs, plastic cups, hats, t-shirts)

CNS3113 Computer Crimes & Laws in UAE: Learning Outcomes

  • Understand key trade-offs and ethical issues related to data/information system safeguards
  • Understand common types of computer security attacks
  • Understand primary perpetrators and their objectives
  • Understand required actions in response to security incidents
  • Discuss UAE cyber law's regulatory, compliance, and liability issues

IT Security Incidents

  • Security of information technology is crucial, especially for confidential business/customer data protection, and preventing theft/disruption
  • Importance of balancing against other business needs/issues

IT Security Incidents: Reasons for Their Spreading

  • Increased computing environment complexity
  • Expanding number of entry points/increasing complexity due to computer help desk pressure
  • Higher computer user expectations, need for more verification methods
  • Network era/globalization requiring more interconnected computer systems
  • Pace of technological change making organizations struggle to keep up with the rapid evolution of technological advancements

IT Security Incidents: Reasons for Their Spreading (2)

  • Increased dependence upon commercial software with known vulnerabilities
  • Poor design/implementation, leading to vulnerabilities
  • Attacks/exploitation of vulnerabilities
  • The "patch" (solution) involving users fixing/installing problems
  • Delays in fixing issues expose users

Types of Computer Crimes

  • Business attacks: compromise company systems for information theft
  • Financial attacks: exploit financial institutions for monetary gain
  • Terrorist attacks: cause havoc in society, usually through attacks on IT systems
  • Objection attacks: targeted at organizations/companies via IT systems to voice opposition to policies/measures
  • Fun attacks: done for recreational/entertainment purposes
  • Most common offenses (fraud, data damage/modification, unauthorized access)

Computer Crimes Are Hard to Prosecute

  • Lack of understanding by those tasked with prosecuting (judge, prosecutor)
  • Lack of easily-obtained physical evidence, with crimes often involving intangible items
  • Difficulty in recognizing the value of digital assets
  • Lack of political impact in such crimes
  • Complexity in describing cases
  • Young offenders involved in such cybercrimes

Types of Attacks on Computers & Smartphones

  • Viruses (small programs often disguised, attached to files, spread through user actions)
  • Worms (harmful programs, reside in active memory, can duplicate without intervention), can cause damage
  • Trojan Horses (malicious code within harmless programs)
  • Logic Bombs (execute when triggered by specific event)
  • Distributed Denial of Service (DoS): many machines flooding a target with requests)
  • Botnet (large networked group of compromised computers, used as tools in many types of attacks)
  • Rootkits (set of programs enabling administrator-level access without user consent/knowledge)
  • Spam ( unsolicited email abuse from many senders)
  • Phishing (email) and spear-phishing (emails to organizations), smishing (text messages), and vishing (voice messages)

Types of Perpetrators (Based on Motive)

  • Thrill seekers (seeking challenge)
  • Common criminals (financial gain)
  • Industrial spies (competitive advantage)
  • Terrorists (causing destruction)
  • Hacker (testing system limits, publicity)
  • Cracker, malicious insider, industrial spy, cybercriminal, hacktivist, cyberterrorist

Types of Perpetrators: Description

  • Hackers (intellectual curiosity)
  • Crackers (inept or with criminal intent)
  • Malicious insiders (weak internal controls, employee/outsider collusion)

Types of Perpetrators: (Industrial Spies)

  • Use illegal means to gain trade secrets from rivals (Economic Espionage Act of 1996)
  • Legal approaches to gathering competitor data (competitive intelligence)
  • Illegal methods to gain non-public data (industrial espionage)
  • Cybercriminals (computer hacking)

Types of Perpetrators: (Hacktivism)

  • Hacking for political/social goals
  • Cyberterrorist (goal is to intimidate/coerce, rather than gain information)
  • Techniques that destroy or cripple services

Implementing Trustworthy Computing

  • Trustworthy computing focuses on secure, private and reliable computing
  • Sound business practices are essential
  • Systems and networks require a combination of technology, policy and people for successful use
  • Monitors (detects possible intrusion) are essential for a thorough system
  • Thorough reaction plans are required to address issues such as notification, evidence protection, activity log maintenance, containment, eradication and recovery

Cybercrimes in the U.A.E.

  • UAE Computer Emergency Response Team reported cybersecurity statistics in a June 2020 report.
  • Details on attacks stopped and identified

Examples - Videos

  • Watch videos covering cybercrime law in UAE, My Safe Society app, and 10 most devastating cyberattacks

The U.A.E. Cyber Law "Key Offenses"

  • Hacking to IT systems, websites, or networks
  • Deletion/destruction of data
  • Altering/Modifying website design/layout
  • Credit card fraud
  • Forging official documents
  • Wrongful impersonation
  • Inciting criminal and terrorist acts
  • Threatening state security
  • Disclosure of confidential info
  • Defamation (publishing illegal content)

Correlated U.A.E. Laws

  • Cybersecurity Law correlates with several other UAE laws

8 Common Cybercrimes in the U.A.E.

  • Hacking
  • Cyberbullying and verbal offenses/defamation
  • Email fraud
  • Fake Websites/job-seeking fraud
  • Credit Card forgery
  • Online blackmailing
  • Phishing

Overview of Cyber Criminal Proceedings in U.A.E.

  • Police involvement/documentation procedures
  • Referrals to a Cybercrime unit/CID lab
  • Work with Cyber Departments
  • Reports to a prosecutor, possible arrest warrants, and court referrals

Required Documents and Evidence

  • Screen shots of social media pages involved in hacking case
  • Complete email, letter, correspondence documenting fraudulent impersonation
  • Information about the bank/type of account used in the incident.
  • Presence of victim/complainant

Technical Evidences/Bank Cooperation

  • Victims must assist police with all technical details
  • Detailed IT reports outlining how offenses occurred
  • Cooperation from companies/banks to gather evidence
  • Hard drives must not be replaced to preserve evidence
    • Bank cooperation crucial for investigating criminals

Challenges in the U.A.E.

  • Automatic money transfer issues/jurisdiction outside UAE
  • Public prosecution may be reluctant to pursue cases outside UAE
  • Judicial cooperation agreements needed for cases outside UAE
  • Thresholds for evidence can be challenging/lack of strictness
  • Negligence of prosecuting officials/lack of evidence

Example Jurisdictional Issues and Multiple Victims

  • Hacker accesses overseas victim's computers, impersonates a UAE victim, and defrauds consumers
  • Fraudulent bank account is located in UAE
  • Cases are more complex due to transnational involvement

Note About the Document

  • Study notes are derived from provided images. Please note that these are in summary format, leaving out details such as individual names, addresses etc.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

Description

This quiz explores ethical issues faced by IT workers and users, highlighting the importance of professionalism in the IT field. It covers relationships between IT professionals and ethical dilemmas they encounter, aiming to promote ethical behaviors and decision-making. Prepare to identify key concepts and suggest strategies to foster an ethical work environment.

More Like This

Use Quizgecko on...
Browser
Browser