Computer Viruses and Worms Overview
122 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is a virus in the context of computer programs?

  • A programming glitch that causes software to crash
  • A standalone application that performs automated tasks
  • A type of hardware that damages computer systems
  • A piece of self-replicating code embedded in another program (correct)
  • How do viruses typically spread?

  • Through social media platforms exclusively
  • By being intentionally deleted by users
  • Via diskettes, email, and files downloaded from the Internet (correct)
  • Only through websites with known vulnerabilities
  • What major step allows a virus to replicate once a user executes an infected program?

  • The virus modifies system preferences to allow access
  • The virus creates a new version of another executable program (correct)
  • The virus sends email notifications to all contacts
  • The virus automatically updates the user’s system
  • Which action can trigger an email virus spread?

    <p>Opening an attachment that contains a virus</p> Signup and view all the answers

    What is the importance of keeping antivirus software up-to-date?

    <p>It allows for detection and destruction of new viruses</p> Signup and view all the answers

    What type of application should consumers be wary of?

    <p>Fake antivirus applications</p> Signup and view all the answers

    What moral accountability does Butler have regarding Firesheep?

    <p>He has some moral responsibility for facilitating wrong actions</p> Signup and view all the answers

    What is a defining characteristic of a worm in computer networks?

    <p>It is a self-contained program.</p> Signup and view all the answers

    How did Robert Tappan Morris, Jr. release the Internet worm?

    <p>From an MIT computer.</p> Signup and view all the answers

    What was one significant consequence of the Internet worm's release?

    <p>Infected computers kept crashing or became unresponsive.</p> Signup and view all the answers

    What ethical theory argues that Morris violated others by accessing their computers without permission?

    <p>Kantian ethics.</p> Signup and view all the answers

    What was a societal benefit attributed to Morris's actions with the worm?

    <p>Organizations learned of security flaws.</p> Signup and view all the answers

    Which of the following consequences did Morris face for releasing the Internet worm?

    <p>Three years' probation and 400 hours of community service.</p> Signup and view all the answers

    What did the Sasser worm disrupt in its attack?

    <p>Operations at Delta Airlines and several other organizations.</p> Signup and view all the answers

    Who confessed to being responsible for the Sasser worm?

    <p>Sven Jaschan, a German juvenile.</p> Signup and view all the answers

    What punishment did Sven Jaschan receive for his actions with the Sasser worm?

    <p>30 hours of community service and probation.</p> Signup and view all the answers

    Which ethical evaluation suggests that Morris acted selfishly by using the Internet as a lab?

    <p>Virtue ethics evaluation.</p> Signup and view all the answers

    What significant cyber attack occurred in Estonia in 2007?

    <p>Politically motivated cyber attacks</p> Signup and view all the answers

    Which countries were targeted during the Fourth of July attacks in 2009?

    <p>United States and South Korea</p> Signup and view all the answers

    What specific vulnerability is associated with Internet-based SCADA systems?

    <p>They create potential security risks due to remote diagnostics</p> Signup and view all the answers

    Which cyber weapon was developed to attack Iran's nuclear capabilities?

    <p>Stuxnet worm</p> Signup and view all the answers

    What event coincided with the DDoS attack on Twitter and other sites in 2009?

    <p>The anniversary of the Georgia-Russia war over South Ossetia</p> Signup and view all the answers

    What was the primary concern addressed by the Department of Justice regarding Apple?

    <p>Apple could maintain custody of the software used.</p> Signup and view all the answers

    What does sidejacking involve?

    <p>Capturing a user’s cookie on an open Web session.</p> Signup and view all the answers

    What was the main function of the Firesheep extension released by Eric Butler?

    <p>To allow users to sidejack Web sessions easily.</p> Signup and view all the answers

    What was a notable outcome following the release of Firesheep?

    <p>Improved security measures from Facebook and Twitter.</p> Signup and view all the answers

    How did the act utilitarian analysis view the release of Firesheep?

    <p>It was viewed as good due to raised awareness of security issues.</p> Signup and view all the answers

    Which ethical attribute did Butler demonstrate by making Firesheep freely available?

    <p>Benevolence</p> Signup and view all the answers

    What was the primary security vulnerability highlighted by the internet security community?

    <p>Sidejacking on unencrypted wireless networks.</p> Signup and view all the answers

    What was the FBI's motive for requesting Apple to unlock the iPhone?

    <p>To create a legal precedent regarding privacy.</p> Signup and view all the answers

    What notable effect did Firesheep have on users in its first week after release?

    <p>It reached more than 500,000 downloads.</p> Signup and view all the answers

    What is a significant benefit of the Bring Your Own Device (BYOD) policy for employers?

    <p>Reduced hardware and software expenditures</p> Signup and view all the answers

    What is a main security risk associated with Bring Your Own Device?

    <p>Compromise of company data if the device is stolen</p> Signup and view all the answers

    What does spear-phishing specifically target?

    <p>Specific individuals or groups through selective email addresses</p> Signup and view all the answers

    What action can a company take regarding its data on a stolen personal device?

    <p>They may erase all data from the device</p> Signup and view all the answers

    How does SQL injection attack a web application?

    <p>By injecting SQL queries into text strings</p> Signup and view all the answers

    What is the primary purpose of phishing attacks?

    <p>To gain sensitive information from unwary users</p> Signup and view all the answers

    What should companies consider for personal devices under a BYOD policy?

    <p>Security standards like password requirements and anti-malware</p> Signup and view all the answers

    What potential harm can occur due to insecure personal devices in a BYOD environment?

    <p>Vulnerability to data breaches</p> Signup and view all the answers

    How many phishing attacks were recorded globally in the second half of 2014?

    <p>124,000</p> Signup and view all the answers

    What type of support might a company's IT department provide under a BYOD policy?

    <p>Limited support for specific applications</p> Signup and view all the answers

    What was the primary target of the Stuxnet worm?

    <p>SCADA systems running Siemens software in Iran</p> Signup and view all the answers

    Which attack occurred on the Fourth of July weekend in 2009?

    <p>A DDoS attack on governmental agencies in the U.S. and South Korea</p> Signup and view all the answers

    What security risk is associated with Internet-based SCADA systems?

    <p>Vulnerability to external hacking due to remote accessibility</p> Signup and view all the answers

    Which notable event coincided with the DDoS attacks on Twitter and other social networking sites in 2009?

    <p>The anniversary of the war between Georgia and Russia over South Ossetia</p> Signup and view all the answers

    Which group is believed to have orchestrated the DDoS attack during the Fourth of July weekend in 2009?

    <p>North Korean cyber forces</p> Signup and view all the answers

    What characteristic defines a worm in computer networks?

    <p>It spreads through exploitation of security holes.</p> Signup and view all the answers

    What was one of the immediate effects of the Internet worm released by Robert Tappan Morris, Jr.?

    <p>Significantly slowed traffic on communication networks.</p> Signup and view all the answers

    What alone can be considered a violation of property rights in Morris's actions?

    <p>Accessing computers without permission.</p> Signup and view all the answers

    What was one of the benefits associated with Morris's release of the Internet worm?

    <p>It helped organizations identify security flaws.</p> Signup and view all the answers

    What ethical evaluation suggests Morris demonstrated a lack of responsibility for his actions?

    <p>Virtue ethics evaluation.</p> Signup and view all the answers

    What disruption did the Sasser worm cause upon its release?

    <p>Disrupted operations at major transportation organizations.</p> Signup and view all the answers

    What was the consequence for Sven Jaschan regarding his involvement in the Sasser worm?

    <p>30 hours of community service.</p> Signup and view all the answers

    What motivation might Morris have had for releasing the Internet worm according to ethical evaluations?

    <p>To demonstrate his coding skills.</p> Signup and view all the answers

    Which of the following evaluations considers the consequences of Morris's actions on overall societal benefit?

    <p>Utilitarian evaluation.</p> Signup and view all the answers

    What conclusion did the Act Utilitarian Analysis draw about the release of Firesheep?

    <p>It was considered beneficial as it highlighted security issues.</p> Signup and view all the answers

    What did the release of Firesheep prompt Facebook and Twitter to announce?

    <p>Options to use their sites securely.</p> Signup and view all the answers

    What action did the FBI take regarding Apple's software request for unlocking the iPhone?

    <p>They withdrew their request after successfully accessing the iPhone.</p> Signup and view all the answers

    What vulnerability allowed sidejacking to occur, according to the content?

    <p>Cookies being sent over unencrypted networks.</p> Signup and view all the answers

    How did Eric Butler's release of Firesheep affect public awareness?

    <p>It increased public understanding of security vulnerabilities.</p> Signup and view all the answers

    What ethics-related attributes did Butler demonstrate by releasing Firesheep?

    <p>Courage and a commitment to public good.</p> Signup and view all the answers

    What was a common criticism of e-commerce sites regarding sidejacking?

    <p>They failed to change their practices despite vulnerability complaints.</p> Signup and view all the answers

    What is the primary purpose of the Conficker worm?

    <p>To propagate itself</p> Signup and view all the answers

    What is a characteristic of a Trojan horse in malware?

    <p>It appears to have a legitimate function</p> Signup and view all the answers

    How can ransomware be installed on a victim's computer?

    <p>All of the above are potential methods</p> Signup and view all the answers

    What method do attackers use in cross-site scripting attacks?

    <p>Inserting harmful code into web applications</p> Signup and view all the answers

    What is a defining feature of drive-by downloads?

    <p>They happen without user intent when visiting a website</p> Signup and view all the answers

    Which of the following examples is a known instant messaging worm?

    <p>Kelvir</p> Signup and view all the answers

    In which year did the Conficker worm emerge?

    <p>2008</p> Signup and view all the answers

    Which of the following can potentially lead to cross-site scripting vulnerabilities?

    <p>Websites allowing user-generated content</p> Signup and view all the answers

    What is the main action performed by backdoor Trojans?

    <p>Provide unauthorized access to attackers</p> Signup and view all the answers

    What percentage of Google's search queries return a malicious URL, according to the Google Anti-Malware Team?

    <p>1.3%</p> Signup and view all the answers

    What is the main objective of a denial-of-service (DoS) attack?

    <p>To prevent legitimate users from using a computer service</p> Signup and view all the answers

    Which of the following describes a Distributed Denial-of-Service (DDoS) attack?

    <p>An attack launched from multiple compromised devices simultaneously</p> Signup and view all the answers

    Which IoT devices are commonly exploited for DDoS attacks?

    <p>Network routers and baby monitors</p> Signup and view all the answers

    What significant event occurred during the DDoS attack on Dyn in October 2016?

    <p>Multiple prominent websites went offline for several hours</p> Signup and view all the answers

    What challenge did Blue Security face that led to the termination of its anti-spam activities?

    <p>Spammers retaliated with DDoS attacks and increased spam volume</p> Signup and view all the answers

    Which factor contributed to the vulnerability of IoT devices being co-opted for DDoS attacks?

    <p>Default passwords that are often unchanged by users</p> Signup and view all the answers

    Which organization was Jeanson James Ancheta associated with in the context of cybercrime?

    <p>Avalanche Gang</p> Signup and view all the answers

    What response did Blue Frog implement against spam messages?

    <p>Auto-replying with opt-out messages</p> Signup and view all the answers

    What was the outcome of the DDoS attacks launched by PharmaMaster against Blue Security?

    <p>Termination of Blue Security's anti-spam initiatives</p> Signup and view all the answers

    How did spammers react to Blue Security's spam deterrence system initially?

    <p>Many agreed to stop sending spam to Blue Frog users</p> Signup and view all the answers

    Which principle best describes the moral implications of Butler releasing Firesheep?

    <p>He facilitated privacy breaches for personal gain.</p> Signup and view all the answers

    What is a common misconception about how viruses spread through email?

    <p>They can only spread through email attachments.</p> Signup and view all the answers

    Which method do users often neglect that affects antivirus software effectiveness?

    <p>Regularly updating it.</p> Signup and view all the answers

    In what manner does a virus typically replicate after a user runs an infected program?

    <p>It embeds itself into executable files and spreads through downloads.</p> Signup and view all the answers

    What ethical issue is highlighted by Butler's decision to release Firesheep?

    <p>Neglecting informed consent of users.</p> Signup and view all the answers

    What is a significant misconception many users have regarding fake antivirus applications?

    <p>Purchasing them always guarantees device security.</p> Signup and view all the answers

    What specific behavior by users can exacerbate the spread of viruses through email?

    <p>Ignoring security warnings for attachments.</p> Signup and view all the answers

    Which activity is criminalized under the Computer Fraud and Abuse Act?

    <p>Transmitting classified government information</p> Signup and view all the answers

    What is the maximum penalty for offenses under the Computer Fraud and Abuse Act?

    <p>$250,000 fine and 20 years in prison</p> Signup and view all the answers

    Which of the following actions is illegal under the Electronic Communications Privacy Act?

    <p>Interception of telephone conversations</p> Signup and view all the answers

    What was Apple's main concern regarding the FBI's request to disable iPhone security features?

    <p>Risk of creating a vulnerability for all iPhone users</p> Signup and view all the answers

    Which security feature of the iPhone 5C protects personal data after multiple incorrect passcode attempts?

    <p>Encryption key deletion</p> Signup and view all the answers

    What was the outcome of the FBI's order for Apple to comply with unlocking the iPhone?

    <p>The FBI found another way to unlock the phone</p> Signup and view all the answers

    What aspect of Malik's actions raised concerns regarding national security?

    <p>Her pledge of allegiance to the Islamic State</p> Signup and view all the answers

    Which method did the FBI utilize to compel Apple to assist with the locked iPhone?

    <p>A magistrate's court order</p> Signup and view all the answers

    What impact did the delay between incorrect passcode attempts have on the security of the iPhone?

    <p>It helped deter brute force attacks</p> Signup and view all the answers

    What was a primary concern of the FBI regarding Apple's software?

    <p>The possibility of setting a legal precedent</p> Signup and view all the answers

    What was one of the immediate effects of the Firesheep release?

    <p>Widespread media coverage and public awareness of security issues</p> Signup and view all the answers

    Which ethical theory best describes Butler's actions in releasing Firesheep?

    <p>Virtue ethics emphasizing character and virtue</p> Signup and view all the answers

    Which factor contributed to the sidejacking vulnerability?

    <p>The transmission of cookies over unencrypted networks</p> Signup and view all the answers

    What was the response of Facebook and Twitter following the Firesheep release?

    <p>They allowed users to enable security protocols for better protection</p> Signup and view all the answers

    What aspect of public perception did the release of Firesheep primarily influence?

    <p>The recognition of the importance of encryption in web security</p> Signup and view all the answers

    How did the Department of Justice ultimately resolve its request to Apple regarding the locked iPhone?

    <p>By withdrawing the request entirely after accessing the phone</p> Signup and view all the answers

    What minimal harm was observed following the release of Firesheep?

    <p>A significant rise in identity theft cases</p> Signup and view all the answers

    What characteristic of Butler was highlighted in the virtue ethics analysis?

    <p>His willingness to take responsibility for his actions</p> Signup and view all the answers

    What was a significant outcome of the Stuxnet worm's attack on Iran's nuclear facilities?

    <p>Halt of uranium enrichment temporarily</p> Signup and view all the answers

    Which of the following best describes the nature of the 2009 DDoS attack on Twitter and other sites?

    <p>A politically motivated attack coinciding with a significant anniversary</p> Signup and view all the answers

    What characteristic of SCADA systems increases their vulnerability to security risks?

    <p>The exposure of their protocols to Internet Protocol</p> Signup and view all the answers

    What was the common attribution for the Fourth of July attacks in 2009?

    <p>Retaliation by North Korea for United Nations sanctions</p> Signup and view all the answers

    Which event involved a significant espionage threat attributed to China's military?

    <p>Espionage aimed at gaining access to SCADA systems</p> Signup and view all the answers

    What is the primary aim of a Denial-of-Service (DoS) attack?

    <p>To disrupt a server's ability to respond to clients</p> Signup and view all the answers

    What type of attack involves using multiple devices to overwhelm a target?

    <p>Distributed Denial-of-Service (DDoS) attack</p> Signup and view all the answers

    Which event is primarily associated with the Mirai botnet?

    <p>The 2016 attack on Dyn's DNS services</p> Signup and view all the answers

    What was Blue Security known for before its decline?

    <p>Selling a spam deterrence system</p> Signup and view all the answers

    What tactic did PharmaMaster use to combat Blue Security’s efforts?

    <p>Sending more spam and executing DDoS attacks</p> Signup and view all the answers

    Which characteristic of Internet-of-Things (IoT) devices made them susceptible to DDoS attacks?

    <p>Many users do not change default passwords</p> Signup and view all the answers

    What significant consequence did Blue Security face from the DDoS attacks?

    <p>Terminating their anti-spam activities</p> Signup and view all the answers

    Which group was primarily known for generating revenue from malware attacks?

    <p>Criminal organizations</p> Signup and view all the answers

    Which of the following was NOT a reason for the success of the Mirai botnet?

    <p>The complex encryption methods employed</p> Signup and view all the answers

    What was a significant outcome of the Blue Frog bot's operation?

    <p>A reduction in spam for Blue Frog users</p> Signup and view all the answers

    Study Notes

    Chapter 7: Computer and Network Security

    • Chapter covers computer and network security, including hacking, malware, cybercrime, and online voting.

    Learning Objectives

    • Introduction to computer security
    • Hacking definitions and methods
    • Types of Malware
    • Cybercrime and cyberattacks
    • Online voting

    7.1 Introduction

    • Increasing computer use highlights the growing importance of computer security.
    • Lack of security leads to harmful consequences like stolen information and extortion.
    • Computer systems can be weaponized, impacting governments and organizations.

    7.2 Hacking

    • Original meaning of "hacker" involved exploration, risk-taking, and system innovation (e.g., MIT Tech Model Railroad Club).
    • Modern meaning of "hacker" is someone who gains unauthorized access to computers and networks.
    • Methods for gaining login names and passwords include eavesdropping, dumpster diving, social engineering, brute-force searches, and dictionary attacks.

    Password Dos and Don'ts

    • Avoid short, dictionary-based passwords.
    • Do not reuse passwords.
    • Utilize strong, complex passwords.
    • Enable two-factor authentication when available.
    • Have password recoveries sent to a secure email address.

    Computer Fraud and Abuse Act

    • Criminalizes various hacker activities, such as transmitting damaging code, gaining unauthorized access to computers, transmitting classified information, and trafficking in passwords.
    • Maximum penalty includes 20 years in prison and a $250,000 fine.

    Electronic Communications Privacy Act

    • Illegal to intercept phone conversations, emails, or other data transmissions.
    • Criminal to access stored email messages without authorization.

    FBI and the Locked iPhone

    • December 2015: Syed Farook and Tashfeen Malik killed and wounded people in California. FBI recovered an iPhone 5C from the perpetrator but it was encrypted.
    • February 2016: FBI asked Apple to create a new version of iOS to disable passcode security features. Apple refused.
    • FBI persuaded a US magistrate for an order.
    • Apple argued that creating a "backdoor" for the FBI would harm the security of all iPhones.

    Sidejacking

    • Sidejacking is hijacking an open web session by capturing user cookies.
    • Sidejacking is frequently achievable with unencrypted wireless networks.
    • Internet security community long warned about this phenomenon, but ecommerce didn't act upon it for years.

    Case Study: Firesheep

    • October 2010: Eric Butler released a Firesheep Firefox extension.
    • Firesheep allowed easy sidejacking of web sessions.
    • In its first week, more than 500,000 downloads occurred.
    • Firesheep brought media attention to security issues.
    • Early 2011: Facebook and Twitter introduced new ways to increase site security.

    Act Utilitarian Analysis for Firesheep

    • Release of Firesheep helped focus media's attention on security.
    • Benefits: improved security by prompting changes to Facebook and Twitter.
    • Harms: minimal evidence suggesting Firesheep increased malicious activity in online theft.
    • Conclusion: Releasing Firesheep, according to Act Utilitarianism, was likely a good act.

    Virtue Ethics Analysis for Firesheep

    • Butler's actions helped the public understand security issues on unencrypted networks.
    • Butler's actions reflected an interest in protecting privacy and good.
    • Butler's courage in taking responsibility for the program and the benevolence in making the software freely.

    Kantian Analysis for Firesheep

    • Accessing someone else's account is an invasion of privacy and therefore wrong.
    • Butler created a tool for malicious activities; therefore, he had some moral responsibility for the misuse of Firesheep.
    • Butler's hope that public pressure would prompt improvement of site security led to negative outcomes when he was willing to tolerate short-term increase in privacy violations.
    • Treating victims as mere tools was ethically objectionable.
    • Butler's release of Firesheep was wrong under a Kantian framework.

    7.3 Malware

    • Virus: A self-replicating code embedded within other programs (like documents or executables).
    • Viruses are often included in downloaded software.
    • Viruses are often associated with:
      • Hard disks
      • Floppy disks
      • CDs/DVDs
      • Email attachments
    • Viruses spread via:
      • Diskettes or CDs
      • Email attachments
      • Files downloaded from the Internet

    Email Attachments with Possible Virus

    • Email attachments can conceal viruses.

    How an Email Virus Spreads

    • Users open attachments containing viruses.
    • The virus reads the user's address book.
    • The virus sends emails with virus-containing attachments.

    Antivirus Software Packages

    • Antivirus software is used to detect and destroy viruses.
    • Antivirus software needs to be kept up-to-date.
    • Consumers need to be cautious of fake antivirus applications.

    Worm

    • Worm: A self-contained program that spreads through a computer network, often exploiting vulnerabilities.
    • It spreads by exploiting security holes in interconnected computers.
    • Examples include the:
      • Internet Worm (Morris Worm)
      • Sasser Worm
      • Conficker Worm
      • Other instant messaging worms

    The Internet Worm

    • Released by Robert Tappan Morris.
    • Infected Unix computers.
    • Led to widespread computer crashes.
    • Resulted in significant penalties for Morris.

    Ethical Evaluation of the Internet Worm

    • Kantian evaluation— Morris used others by gaining access without authorization.
    • Social contract theory evaluation – violated organizations’ property rights.
    • Benefits—organizations learned about their security vulnerabilities.
    • Harms—waste of time, unavailable computers, disrupted network traffic, and Morris's punishment.
    • Virtue ethics evaluation— Morris misused the Internet and did not take responsibility for the consequences of his actions.
    • Conclusion—Morris acted wrongly, exhibiting poor ethical character.

    Sasser Worm

    • Launched in 2004.
    • Infected 18 million computers.
    • Disrupted the operations of companies (Delta Airlines, European Commission, Australian railroads, British Coast Guard).
    • German juvenile Sven Jaschan confessed and received 30 hours of community service.

    Instant Messaging Worms (e.g., Choke and Hello, Kelvir, Palevo)

    • Malware spreads through instant messaging services.
    • Some required users to delete or downgrade their systems to remove the worms.

    Conficker Worm

    • 2008 Windows computer worm.
    • Widely circulated among computers using older software.
    • Often found in legacy systems of factories and healthcare facilities.

    Cross-Site Scripting

    • Downloading malware without knowing.
    • Web sites used by others to view posted documents or comments used to inject malware.
    • Victims download malicious code from web servers when clicking links or reading comments.

    Drive-By Downloads

    • Malware unknowingly downloaded by visiting a compromised website.
    • Pop-up windows prompt users for consent and downloads.
    • Google's search engine occasionally returns a malicious link resulting in drive-by-downloads.

    Trojan Horses and Backdoor Trojans

    • Trojan horse: A program with a benign capability that conceals a sinister purpose.
    • Backdoor Trojan: A type of Trojan that grants attackers access to the victim's computer.

    Ransomware

    • Malware that extorts money from the victim, often by encrypting victims files and asking for payments to release them.
    • Installed via:
      • Drive-by downloads
      • Trojan Horses
      • Email attachments
      • Other means.

    Rootkits

    • A set of programs that provides privileged access to the computer.
    • Activated whenever the computer is started.
    • Uses security privileges to prevent recognition by the user.

    Spyware and Adware

    • Spyware: Software communicating over the internet without user knowledge.
    • Monitors web surfing.
    • Logs keystrokes.
    • Captures snapshots of the computer screen.
    • Sends reports back to the host computer.
    • Adware: displays pop-up advertisements.
    • Backdoor Trojans sometimes used to install spyware/adware.

    Bots

    • Bots are Trojan backdoor programs that respond to commands from another computer.
    • First bots involved in legitimate activities such as internet relay chat/multiplayer games.
    • Later bots were also used for illegal activities such as distributing spam/collecting personal information for theft and denial of service attacks.

    Bots and Botnets

    • Bot: a backdoor Trojan program that responds to commands from another computer.
    • Botnet: a collection of infected computers controlled by the same command-and-control software.
    • Botnet herders distribute spam and launch distributed denial-of-service attacks.

    Protecting Your Internet-Connected Devices

    • Keep security patches up-to-date on systems.
    • Install and maintain anti-malware.
    • Examine manufacturer's precautions before purchasing an Internet-connected device.
    • Change default passwords on devices immediately upon connection to the Internet.
    • Never use the same password on multiple devices.
    • If possible, replace insecure Internet-of-Things (IoT) devices.

    Security Risks of "Bring Your Own Device"

    • 87% of US companies rely on employees using their personal devices for work purposes.
    • The advantages of BYOD include reduced investments in hardware.
    • Productivity and employee job satisfaction also improve when employees are allowed to use their personal tech for work.
    • The risks of BYOD include corporate data breaches, especially when devices are lost or stolen.

    "Bring Your Own Device" Policy Questions

    • The concerns related to this policy regarding the security of employed devices.
    • The apps that employers permit employees to utilize on personal devices.
    • The type of technical support the company offers.
    • In case of data breaches, the company's control over personal worker data.
    • Company procedure for removing company data from employee devices.

    7.4 Cyber Crime & Cyberattacks

    • Phishing: Large-scale efforts to acquire user information.
    • Spear Phishing: A variant where targeted users are selected.
    • SQL Injection: Attacks on improperly secured database-driven web applications.
    • Denial-of-Service Attacks (DoS): Attacks disrupting computer services.
    • Distributed Denial-of-Service Attacks (DDoS): Attacks from numerous computers.

    Internet-of-Things Devices Co-opted for DDoS Attacks

    • IoT devices like network routers, security cameras, baby monitors, are often vulnerable to use in DDoS attacks.

    Cyber Espionage

    • Large-scale government hacking. Hundreds of terabytes of stolen data, dozens of countries.
    • People's Liberation Army suspected of involvement.

    Anonymous

    • Loosely organized hacktivism group with various political aims.

    Actions Attributed to Anonymous

    • Cyberattacks often related to protests or social/political issues.

    Convictions of Anonymous Members

    • Numerous people arrested and convicted for Anonymous-related cyber activities.
    • Examples of specific individuals and prison sentences provided.

    7.5 Online Voting

    • The 2000 US Presidential election, particularly in Florida, highlights the issues with using traditional voting machines.
    • Two voting irregularities included:
      • Hanging chads
      • The "Butterfly ballot" design

    Benefits of Online Voting

    • Increase voter participation - more people would participate at a quicker rate.
    • Faster vote counting.
    • Eliminates ambiguity present in traditional voting.
    • Reduced costs.
    • Eliminates ballot-box tampering and potential manipulation.
    • Accurate vote counts through software protections against over/under-voting.

    Risks of Online Voting

    • Possible bias in digital voting since some may rely on home computers over others.
    • Voter privacy is more threatened in electronic voting.
    • More opportunities to sell votes.
    • Online voting is often a target for attacks such as denial-of-service.
    • Vulnerability to software and/or hard drive manipulation/hacks affecting votes.
    • Lack of physical ballots for auditing or recounts.

    Utilitarian Analysis of Online Voting

    • Time savings from online voting is weighed against the increased risk of DDoS attacks.
    • The probability of a successful attack that changes the outcome of the election needs a determination.

    Kantian Analysis of Online Voting

    • Voter's will to be reflected in their ballots - integrity of the votes is necessary.
    • Recounts require the ability to verify votes – integrity is paramount.
    • A paper record of each vote is crucial for auditing and recounting, protecting vote integrity.
    • Electronic voting may decrease costs, but the lack of paper records means a loss of auditability, impinging upon vote integrity.
    • Eliminating paper votes may seem cost-effective, but at the expense of vote integrity.

    Summary of Cyber Security

    • Cyber security issues highlight the trade-off between security and convenience.
    • Individuals can become infected with malware in several ways.
    • Internet-of-Things (IoT) devices are a new vector for cyberattacks.
    • Issues need to be addressed regarding when cyberattacks become acts of war.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    This quiz covers key concepts related to computer viruses and worms, including how they spread, their characteristics, and notable historical events like the Internet worm. Test your knowledge on the ethical implications and consequences of these malicious programs.

    More Like This

    Use Quizgecko on...
    Browser
    Browser