Podcast
Questions and Answers
What is a virus in the context of computer programs?
What is a virus in the context of computer programs?
- A programming glitch that causes software to crash
- A standalone application that performs automated tasks
- A type of hardware that damages computer systems
- A piece of self-replicating code embedded in another program (correct)
How do viruses typically spread?
How do viruses typically spread?
- Through social media platforms exclusively
- By being intentionally deleted by users
- Via diskettes, email, and files downloaded from the Internet (correct)
- Only through websites with known vulnerabilities
What major step allows a virus to replicate once a user executes an infected program?
What major step allows a virus to replicate once a user executes an infected program?
- The virus modifies system preferences to allow access
- The virus creates a new version of another executable program (correct)
- The virus sends email notifications to all contacts
- The virus automatically updates the user’s system
Which action can trigger an email virus spread?
Which action can trigger an email virus spread?
What is the importance of keeping antivirus software up-to-date?
What is the importance of keeping antivirus software up-to-date?
What type of application should consumers be wary of?
What type of application should consumers be wary of?
What moral accountability does Butler have regarding Firesheep?
What moral accountability does Butler have regarding Firesheep?
What is a defining characteristic of a worm in computer networks?
What is a defining characteristic of a worm in computer networks?
How did Robert Tappan Morris, Jr. release the Internet worm?
How did Robert Tappan Morris, Jr. release the Internet worm?
What was one significant consequence of the Internet worm's release?
What was one significant consequence of the Internet worm's release?
What ethical theory argues that Morris violated others by accessing their computers without permission?
What ethical theory argues that Morris violated others by accessing their computers without permission?
What was a societal benefit attributed to Morris's actions with the worm?
What was a societal benefit attributed to Morris's actions with the worm?
Which of the following consequences did Morris face for releasing the Internet worm?
Which of the following consequences did Morris face for releasing the Internet worm?
What did the Sasser worm disrupt in its attack?
What did the Sasser worm disrupt in its attack?
Who confessed to being responsible for the Sasser worm?
Who confessed to being responsible for the Sasser worm?
What punishment did Sven Jaschan receive for his actions with the Sasser worm?
What punishment did Sven Jaschan receive for his actions with the Sasser worm?
Which ethical evaluation suggests that Morris acted selfishly by using the Internet as a lab?
Which ethical evaluation suggests that Morris acted selfishly by using the Internet as a lab?
What significant cyber attack occurred in Estonia in 2007?
What significant cyber attack occurred in Estonia in 2007?
Which countries were targeted during the Fourth of July attacks in 2009?
Which countries were targeted during the Fourth of July attacks in 2009?
What specific vulnerability is associated with Internet-based SCADA systems?
What specific vulnerability is associated with Internet-based SCADA systems?
Which cyber weapon was developed to attack Iran's nuclear capabilities?
Which cyber weapon was developed to attack Iran's nuclear capabilities?
What event coincided with the DDoS attack on Twitter and other sites in 2009?
What event coincided with the DDoS attack on Twitter and other sites in 2009?
What was the primary concern addressed by the Department of Justice regarding Apple?
What was the primary concern addressed by the Department of Justice regarding Apple?
What does sidejacking involve?
What does sidejacking involve?
What was the main function of the Firesheep extension released by Eric Butler?
What was the main function of the Firesheep extension released by Eric Butler?
What was a notable outcome following the release of Firesheep?
What was a notable outcome following the release of Firesheep?
How did the act utilitarian analysis view the release of Firesheep?
How did the act utilitarian analysis view the release of Firesheep?
Which ethical attribute did Butler demonstrate by making Firesheep freely available?
Which ethical attribute did Butler demonstrate by making Firesheep freely available?
What was the primary security vulnerability highlighted by the internet security community?
What was the primary security vulnerability highlighted by the internet security community?
What was the FBI's motive for requesting Apple to unlock the iPhone?
What was the FBI's motive for requesting Apple to unlock the iPhone?
What notable effect did Firesheep have on users in its first week after release?
What notable effect did Firesheep have on users in its first week after release?
What is a significant benefit of the Bring Your Own Device (BYOD) policy for employers?
What is a significant benefit of the Bring Your Own Device (BYOD) policy for employers?
What is a main security risk associated with Bring Your Own Device?
What is a main security risk associated with Bring Your Own Device?
What does spear-phishing specifically target?
What does spear-phishing specifically target?
What action can a company take regarding its data on a stolen personal device?
What action can a company take regarding its data on a stolen personal device?
How does SQL injection attack a web application?
How does SQL injection attack a web application?
What is the primary purpose of phishing attacks?
What is the primary purpose of phishing attacks?
What should companies consider for personal devices under a BYOD policy?
What should companies consider for personal devices under a BYOD policy?
What potential harm can occur due to insecure personal devices in a BYOD environment?
What potential harm can occur due to insecure personal devices in a BYOD environment?
How many phishing attacks were recorded globally in the second half of 2014?
How many phishing attacks were recorded globally in the second half of 2014?
What type of support might a company's IT department provide under a BYOD policy?
What type of support might a company's IT department provide under a BYOD policy?
What was the primary target of the Stuxnet worm?
What was the primary target of the Stuxnet worm?
Which attack occurred on the Fourth of July weekend in 2009?
Which attack occurred on the Fourth of July weekend in 2009?
What security risk is associated with Internet-based SCADA systems?
What security risk is associated with Internet-based SCADA systems?
Which notable event coincided with the DDoS attacks on Twitter and other social networking sites in 2009?
Which notable event coincided with the DDoS attacks on Twitter and other social networking sites in 2009?
Which group is believed to have orchestrated the DDoS attack during the Fourth of July weekend in 2009?
Which group is believed to have orchestrated the DDoS attack during the Fourth of July weekend in 2009?
What characteristic defines a worm in computer networks?
What characteristic defines a worm in computer networks?
What was one of the immediate effects of the Internet worm released by Robert Tappan Morris, Jr.?
What was one of the immediate effects of the Internet worm released by Robert Tappan Morris, Jr.?
What alone can be considered a violation of property rights in Morris's actions?
What alone can be considered a violation of property rights in Morris's actions?
What was one of the benefits associated with Morris's release of the Internet worm?
What was one of the benefits associated with Morris's release of the Internet worm?
What ethical evaluation suggests Morris demonstrated a lack of responsibility for his actions?
What ethical evaluation suggests Morris demonstrated a lack of responsibility for his actions?
What disruption did the Sasser worm cause upon its release?
What disruption did the Sasser worm cause upon its release?
What was the consequence for Sven Jaschan regarding his involvement in the Sasser worm?
What was the consequence for Sven Jaschan regarding his involvement in the Sasser worm?
What motivation might Morris have had for releasing the Internet worm according to ethical evaluations?
What motivation might Morris have had for releasing the Internet worm according to ethical evaluations?
Which of the following evaluations considers the consequences of Morris's actions on overall societal benefit?
Which of the following evaluations considers the consequences of Morris's actions on overall societal benefit?
What conclusion did the Act Utilitarian Analysis draw about the release of Firesheep?
What conclusion did the Act Utilitarian Analysis draw about the release of Firesheep?
What did the release of Firesheep prompt Facebook and Twitter to announce?
What did the release of Firesheep prompt Facebook and Twitter to announce?
What action did the FBI take regarding Apple's software request for unlocking the iPhone?
What action did the FBI take regarding Apple's software request for unlocking the iPhone?
What vulnerability allowed sidejacking to occur, according to the content?
What vulnerability allowed sidejacking to occur, according to the content?
How did Eric Butler's release of Firesheep affect public awareness?
How did Eric Butler's release of Firesheep affect public awareness?
What ethics-related attributes did Butler demonstrate by releasing Firesheep?
What ethics-related attributes did Butler demonstrate by releasing Firesheep?
What was a common criticism of e-commerce sites regarding sidejacking?
What was a common criticism of e-commerce sites regarding sidejacking?
What is the primary purpose of the Conficker worm?
What is the primary purpose of the Conficker worm?
What is a characteristic of a Trojan horse in malware?
What is a characteristic of a Trojan horse in malware?
How can ransomware be installed on a victim's computer?
How can ransomware be installed on a victim's computer?
What method do attackers use in cross-site scripting attacks?
What method do attackers use in cross-site scripting attacks?
What is a defining feature of drive-by downloads?
What is a defining feature of drive-by downloads?
Which of the following examples is a known instant messaging worm?
Which of the following examples is a known instant messaging worm?
In which year did the Conficker worm emerge?
In which year did the Conficker worm emerge?
Which of the following can potentially lead to cross-site scripting vulnerabilities?
Which of the following can potentially lead to cross-site scripting vulnerabilities?
What is the main action performed by backdoor Trojans?
What is the main action performed by backdoor Trojans?
What percentage of Google's search queries return a malicious URL, according to the Google Anti-Malware Team?
What percentage of Google's search queries return a malicious URL, according to the Google Anti-Malware Team?
What is the main objective of a denial-of-service (DoS) attack?
What is the main objective of a denial-of-service (DoS) attack?
Which of the following describes a Distributed Denial-of-Service (DDoS) attack?
Which of the following describes a Distributed Denial-of-Service (DDoS) attack?
Which IoT devices are commonly exploited for DDoS attacks?
Which IoT devices are commonly exploited for DDoS attacks?
What significant event occurred during the DDoS attack on Dyn in October 2016?
What significant event occurred during the DDoS attack on Dyn in October 2016?
What challenge did Blue Security face that led to the termination of its anti-spam activities?
What challenge did Blue Security face that led to the termination of its anti-spam activities?
Which factor contributed to the vulnerability of IoT devices being co-opted for DDoS attacks?
Which factor contributed to the vulnerability of IoT devices being co-opted for DDoS attacks?
Which organization was Jeanson James Ancheta associated with in the context of cybercrime?
Which organization was Jeanson James Ancheta associated with in the context of cybercrime?
What response did Blue Frog implement against spam messages?
What response did Blue Frog implement against spam messages?
What was the outcome of the DDoS attacks launched by PharmaMaster against Blue Security?
What was the outcome of the DDoS attacks launched by PharmaMaster against Blue Security?
How did spammers react to Blue Security's spam deterrence system initially?
How did spammers react to Blue Security's spam deterrence system initially?
Which principle best describes the moral implications of Butler releasing Firesheep?
Which principle best describes the moral implications of Butler releasing Firesheep?
What is a common misconception about how viruses spread through email?
What is a common misconception about how viruses spread through email?
Which method do users often neglect that affects antivirus software effectiveness?
Which method do users often neglect that affects antivirus software effectiveness?
In what manner does a virus typically replicate after a user runs an infected program?
In what manner does a virus typically replicate after a user runs an infected program?
What ethical issue is highlighted by Butler's decision to release Firesheep?
What ethical issue is highlighted by Butler's decision to release Firesheep?
What is a significant misconception many users have regarding fake antivirus applications?
What is a significant misconception many users have regarding fake antivirus applications?
What specific behavior by users can exacerbate the spread of viruses through email?
What specific behavior by users can exacerbate the spread of viruses through email?
Which activity is criminalized under the Computer Fraud and Abuse Act?
Which activity is criminalized under the Computer Fraud and Abuse Act?
What is the maximum penalty for offenses under the Computer Fraud and Abuse Act?
What is the maximum penalty for offenses under the Computer Fraud and Abuse Act?
Which of the following actions is illegal under the Electronic Communications Privacy Act?
Which of the following actions is illegal under the Electronic Communications Privacy Act?
What was Apple's main concern regarding the FBI's request to disable iPhone security features?
What was Apple's main concern regarding the FBI's request to disable iPhone security features?
Which security feature of the iPhone 5C protects personal data after multiple incorrect passcode attempts?
Which security feature of the iPhone 5C protects personal data after multiple incorrect passcode attempts?
What was the outcome of the FBI's order for Apple to comply with unlocking the iPhone?
What was the outcome of the FBI's order for Apple to comply with unlocking the iPhone?
What aspect of Malik's actions raised concerns regarding national security?
What aspect of Malik's actions raised concerns regarding national security?
Which method did the FBI utilize to compel Apple to assist with the locked iPhone?
Which method did the FBI utilize to compel Apple to assist with the locked iPhone?
What impact did the delay between incorrect passcode attempts have on the security of the iPhone?
What impact did the delay between incorrect passcode attempts have on the security of the iPhone?
What was a primary concern of the FBI regarding Apple's software?
What was a primary concern of the FBI regarding Apple's software?
What was one of the immediate effects of the Firesheep release?
What was one of the immediate effects of the Firesheep release?
Which ethical theory best describes Butler's actions in releasing Firesheep?
Which ethical theory best describes Butler's actions in releasing Firesheep?
Which factor contributed to the sidejacking vulnerability?
Which factor contributed to the sidejacking vulnerability?
What was the response of Facebook and Twitter following the Firesheep release?
What was the response of Facebook and Twitter following the Firesheep release?
What aspect of public perception did the release of Firesheep primarily influence?
What aspect of public perception did the release of Firesheep primarily influence?
How did the Department of Justice ultimately resolve its request to Apple regarding the locked iPhone?
How did the Department of Justice ultimately resolve its request to Apple regarding the locked iPhone?
What minimal harm was observed following the release of Firesheep?
What minimal harm was observed following the release of Firesheep?
What characteristic of Butler was highlighted in the virtue ethics analysis?
What characteristic of Butler was highlighted in the virtue ethics analysis?
What was a significant outcome of the Stuxnet worm's attack on Iran's nuclear facilities?
What was a significant outcome of the Stuxnet worm's attack on Iran's nuclear facilities?
Which of the following best describes the nature of the 2009 DDoS attack on Twitter and other sites?
Which of the following best describes the nature of the 2009 DDoS attack on Twitter and other sites?
What characteristic of SCADA systems increases their vulnerability to security risks?
What characteristic of SCADA systems increases their vulnerability to security risks?
What was the common attribution for the Fourth of July attacks in 2009?
What was the common attribution for the Fourth of July attacks in 2009?
Which event involved a significant espionage threat attributed to China's military?
Which event involved a significant espionage threat attributed to China's military?
What is the primary aim of a Denial-of-Service (DoS) attack?
What is the primary aim of a Denial-of-Service (DoS) attack?
What type of attack involves using multiple devices to overwhelm a target?
What type of attack involves using multiple devices to overwhelm a target?
Which event is primarily associated with the Mirai botnet?
Which event is primarily associated with the Mirai botnet?
What was Blue Security known for before its decline?
What was Blue Security known for before its decline?
What tactic did PharmaMaster use to combat Blue Security’s efforts?
What tactic did PharmaMaster use to combat Blue Security’s efforts?
Which characteristic of Internet-of-Things (IoT) devices made them susceptible to DDoS attacks?
Which characteristic of Internet-of-Things (IoT) devices made them susceptible to DDoS attacks?
What significant consequence did Blue Security face from the DDoS attacks?
What significant consequence did Blue Security face from the DDoS attacks?
Which group was primarily known for generating revenue from malware attacks?
Which group was primarily known for generating revenue from malware attacks?
Which of the following was NOT a reason for the success of the Mirai botnet?
Which of the following was NOT a reason for the success of the Mirai botnet?
What was a significant outcome of the Blue Frog bot's operation?
What was a significant outcome of the Blue Frog bot's operation?
Flashcards
Sidejacking
Sidejacking
Hijacking an open web session by capturing a user's cookie.
Virus definition
Virus definition
A self-replicating piece of code hidden inside another program (host).
Virus spreading methods
Virus spreading methods
Viruses spread through floppy disks, CDs, email attachments, and downloaded files from the internet.
Unencrypted Wireless Networks
Unencrypted Wireless Networks
Signup and view all the flashcards
Firesheep
Firesheep
Signup and view all the flashcards
Virus Replication Process
Virus Replication Process
Signup and view all the flashcards
Act Utilitarian Analysis of Firesheep
Act Utilitarian Analysis of Firesheep
Signup and view all the flashcards
Email virus spread
Email virus spread
Signup and view all the flashcards
FBI and the Locked iPhone
FBI and the Locked iPhone
Signup and view all the flashcards
Antivirus software
Antivirus software
Signup and view all the flashcards
Antivirus software updates
Antivirus software updates
Signup and view all the flashcards
Virtue Ethics Analysis of Firesheep
Virtue Ethics Analysis of Firesheep
Signup and view all the flashcards
Fake antivirus applications
Fake antivirus applications
Signup and view all the flashcards
Kantian analysis of Firesheep
Kantian analysis of Firesheep
Signup and view all the flashcards
BYOD security risks
BYOD security risks
Signup and view all the flashcards
BYOD benefits
BYOD benefits
Signup and view all the flashcards
Phishing
Phishing
Signup and view all the flashcards
Spear Phishing
Spear Phishing
Signup and view all the flashcards
SQL Injection
SQL Injection
Signup and view all the flashcards
BYOD policy
BYOD policy
Signup and view all the flashcards
Politically Motivated Cyber Attacks
Politically Motivated Cyber Attacks
Signup and view all the flashcards
DDOS Attack
DDOS Attack
Signup and view all the flashcards
SCADA Systems
SCADA Systems
Signup and view all the flashcards
Stuxnet Worm
Stuxnet Worm
Signup and view all the flashcards
Estonia (2007)
Estonia (2007)
Signup and view all the flashcards
Georgia (2008, 2009)
Georgia (2008, 2009)
Signup and view all the flashcards
Worm (computer)
Worm (computer)
Signup and view all the flashcards
Worm Propagation
Worm Propagation
Signup and view all the flashcards
The Internet Worm
The Internet Worm
Signup and view all the flashcards
Robert Tappan Morris, Jr.
Robert Tappan Morris, Jr.
Signup and view all the flashcards
Security Holes
Security Holes
Signup and view all the flashcards
Sasser Worm
Sasser Worm
Signup and view all the flashcards
Ethical Evaluation of Cyberattacks
Ethical Evaluation of Cyberattacks
Signup and view all the flashcards
Kantian Evaluation
Kantian Evaluation
Signup and view all the flashcards
Social Contract Theory
Social Contract Theory
Signup and view all the flashcards
Utilitarian Evaluation
Utilitarian Evaluation
Signup and view all the flashcards
Virtue Ethics Evaluation
Virtue Ethics Evaluation
Signup and view all the flashcards
Sidejacking
Sidejacking
Signup and view all the flashcards
Firesheep
Firesheep
Signup and view all the flashcards
Act Utilitarian Analysis of Firesheep
Act Utilitarian Analysis of Firesheep
Signup and view all the flashcards
FBI and the Locked iPhone
FBI and the Locked iPhone
Signup and view all the flashcards
Virtue Ethics Analysis of Firesheep
Virtue Ethics Analysis of Firesheep
Signup and view all the flashcards
Worm (computer)
Worm (computer)
Signup and view all the flashcards
Worm Propagation
Worm Propagation
Signup and view all the flashcards
The Internet Worm
The Internet Worm
Signup and view all the flashcards
Robert Tappan Morris, Jr.
Robert Tappan Morris, Jr.
Signup and view all the flashcards
Security Holes
Security Holes
Signup and view all the flashcards
Sasser Worm
Sasser Worm
Signup and view all the flashcards
Ethical Evaluation of Cyberattacks
Ethical Evaluation of Cyberattacks
Signup and view all the flashcards
Kantian Evaluation
Kantian Evaluation
Signup and view all the flashcards
Social Contract Theory
Social Contract Theory
Signup and view all the flashcards
Utilitarian Evaluation
Utilitarian Evaluation
Signup and view all the flashcards
Denial-of-Service (DoS) attack
Denial-of-Service (DoS) attack
Signup and view all the flashcards
Politically Motivated Cyber Attacks
Politically Motivated Cyber Attacks
Signup and view all the flashcards
Estonia (2007)
Estonia (2007)
Signup and view all the flashcards
Distributed Denial-of-Service (DDoS) attack
Distributed Denial-of-Service (DDoS) attack
Signup and view all the flashcards
Mirai botnet
Mirai botnet
Signup and view all the flashcards
Georgia (2008, 2009)
Georgia (2008, 2009)
Signup and view all the flashcards
Internet-of-Things (IoT) devices
Internet-of-Things (IoT) devices
Signup and view all the flashcards
DDOS Attack
DDOS Attack
Signup and view all the flashcards
SCADA Systems
SCADA Systems
Signup and view all the flashcards
Cyber Crime
Cyber Crime
Signup and view all the flashcards
Stuxnet Worm
Stuxnet Worm
Signup and view all the flashcards
Blue Security
Blue Security
Signup and view all the flashcards
Spam deterrence system
Spam deterrence system
Signup and view all the flashcards
Instant Messaging Worms
Instant Messaging Worms
Signup and view all the flashcards
Conficker Worm
Conficker Worm
Signup and view all the flashcards
Cross-Site Scripting
Cross-Site Scripting
Signup and view all the flashcards
Drive-By Downloads
Drive-By Downloads
Signup and view all the flashcards
Trojan Horses
Trojan Horses
Signup and view all the flashcards
Backdoor Trojans
Backdoor Trojans
Signup and view all the flashcards
Ransomware
Ransomware
Signup and view all the flashcards
Computer Fraud and Abuse Act
Computer Fraud and Abuse Act
Signup and view all the flashcards
Electronic Communications Privacy Act
Electronic Communications Privacy Act
Signup and view all the flashcards
FBI and the Locked iPhone
FBI and the Locked iPhone
Signup and view all the flashcards
Computer Fraud
Computer Fraud
Signup and view all the flashcards
Computer extortion
Computer extortion
Signup and view all the flashcards
Maximum penalty for Computer Crimes
Maximum penalty for Computer Crimes
Signup and view all the flashcards
Virus
Virus
Signup and view all the flashcards
Virus Spread
Virus Spread
Signup and view all the flashcards
Virus Replication
Virus Replication
Signup and view all the flashcards
Email Virus
Email Virus
Signup and view all the flashcards
Antivirus Software
Antivirus Software
Signup and view all the flashcards
Antivirus Update
Antivirus Update
Signup and view all the flashcards
Fake Antivirus
Fake Antivirus
Signup and view all the flashcards
Kantian Analysis
Kantian Analysis
Signup and view all the flashcards
Firesheep
Firesheep
Signup and view all the flashcards
Privacy Violation
Privacy Violation
Signup and view all the flashcards
Sidejacking
Sidejacking
Signup and view all the flashcards
Firesheep
Firesheep
Signup and view all the flashcards
Act Utilitarian Analysis of Firesheep
Act Utilitarian Analysis of Firesheep
Signup and view all the flashcards
FBI and Locked iPhone
FBI and Locked iPhone
Signup and view all the flashcards
Virtue Ethics Analysis of Firesheep
Virtue Ethics Analysis of Firesheep
Signup and view all the flashcards
Denial-of-Service (DoS) attack
Denial-of-Service (DoS) attack
Signup and view all the flashcards
Distributed Denial-of-Service (DDoS) attack
Distributed Denial-of-Service (DDoS) attack
Signup and view all the flashcards
Mirai botnet
Mirai botnet
Signup and view all the flashcards
Internet-of-Things (IoT) devices
Internet-of-Things (IoT) devices
Signup and view all the flashcards
Cyber Crime
Cyber Crime
Signup and view all the flashcards
Blue Security
Blue Security
Signup and view all the flashcards
Spam Deterrence System
Spam Deterrence System
Signup and view all the flashcards
DDoS attack (2016)
DDoS attack (2016)
Signup and view all the flashcards
Politically Motivated Cyber Attacks
Politically Motivated Cyber Attacks
Signup and view all the flashcards
Estonia (2007)
Estonia (2007)
Signup and view all the flashcards
Georgia (2008, 2009)
Georgia (2008, 2009)
Signup and view all the flashcards
DDOS Attack
DDOS Attack
Signup and view all the flashcards
SCADA Systems
SCADA Systems
Signup and view all the flashcards
Stuxnet Worm
Stuxnet Worm
Signup and view all the flashcards
Fourth of July Attacks (2009)
Fourth of July Attacks (2009)
Signup and view all the flashcards
Attacks on Social Networking Sites (2009)
Attacks on Social Networking Sites (2009)
Signup and view all the flashcards
Study Notes
Chapter 7: Computer and Network Security
- Chapter covers computer and network security, including hacking, malware, cybercrime, and online voting.
Learning Objectives
- Introduction to computer security
- Hacking definitions and methods
- Types of Malware
- Cybercrime and cyberattacks
- Online voting
7.1 Introduction
- Increasing computer use highlights the growing importance of computer security.
- Lack of security leads to harmful consequences like stolen information and extortion.
- Computer systems can be weaponized, impacting governments and organizations.
7.2 Hacking
- Original meaning of "hacker" involved exploration, risk-taking, and system innovation (e.g., MIT Tech Model Railroad Club).
- Modern meaning of "hacker" is someone who gains unauthorized access to computers and networks.
- Methods for gaining login names and passwords include eavesdropping, dumpster diving, social engineering, brute-force searches, and dictionary attacks.
Password Dos and Don'ts
- Avoid short, dictionary-based passwords.
- Do not reuse passwords.
- Utilize strong, complex passwords.
- Enable two-factor authentication when available.
- Have password recoveries sent to a secure email address.
Computer Fraud and Abuse Act
- Criminalizes various hacker activities, such as transmitting damaging code, gaining unauthorized access to computers, transmitting classified information, and trafficking in passwords.
- Maximum penalty includes 20 years in prison and a $250,000 fine.
Electronic Communications Privacy Act
- Illegal to intercept phone conversations, emails, or other data transmissions.
- Criminal to access stored email messages without authorization.
FBI and the Locked iPhone
- December 2015: Syed Farook and Tashfeen Malik killed and wounded people in California. FBI recovered an iPhone 5C from the perpetrator but it was encrypted.
- February 2016: FBI asked Apple to create a new version of iOS to disable passcode security features. Apple refused.
- FBI persuaded a US magistrate for an order.
- Apple argued that creating a "backdoor" for the FBI would harm the security of all iPhones.
Sidejacking
- Sidejacking is hijacking an open web session by capturing user cookies.
- Sidejacking is frequently achievable with unencrypted wireless networks.
- Internet security community long warned about this phenomenon, but ecommerce didn't act upon it for years.
Case Study: Firesheep
- October 2010: Eric Butler released a Firesheep Firefox extension.
- Firesheep allowed easy sidejacking of web sessions.
- In its first week, more than 500,000 downloads occurred.
- Firesheep brought media attention to security issues.
- Early 2011: Facebook and Twitter introduced new ways to increase site security.
Act Utilitarian Analysis for Firesheep
- Release of Firesheep helped focus media's attention on security.
- Benefits: improved security by prompting changes to Facebook and Twitter.
- Harms: minimal evidence suggesting Firesheep increased malicious activity in online theft.
- Conclusion: Releasing Firesheep, according to Act Utilitarianism, was likely a good act.
Virtue Ethics Analysis for Firesheep
- Butler's actions helped the public understand security issues on unencrypted networks.
- Butler's actions reflected an interest in protecting privacy and good.
- Butler's courage in taking responsibility for the program and the benevolence in making the software freely.
Kantian Analysis for Firesheep
- Accessing someone else's account is an invasion of privacy and therefore wrong.
- Butler created a tool for malicious activities; therefore, he had some moral responsibility for the misuse of Firesheep.
- Butler's hope that public pressure would prompt improvement of site security led to negative outcomes when he was willing to tolerate short-term increase in privacy violations.
- Treating victims as mere tools was ethically objectionable.
- Butler's release of Firesheep was wrong under a Kantian framework.
7.3 Malware
- Virus: A self-replicating code embedded within other programs (like documents or executables).
- Viruses are often included in downloaded software.
- Viruses are often associated with:
- Hard disks
- Floppy disks
- CDs/DVDs
- Email attachments
- Viruses spread via:
- Diskettes or CDs
- Email attachments
- Files downloaded from the Internet
Email Attachments with Possible Virus
- Email attachments can conceal viruses.
How an Email Virus Spreads
- Users open attachments containing viruses.
- The virus reads the user's address book.
- The virus sends emails with virus-containing attachments.
Antivirus Software Packages
- Antivirus software is used to detect and destroy viruses.
- Antivirus software needs to be kept up-to-date.
- Consumers need to be cautious of fake antivirus applications.
Worm
- Worm: A self-contained program that spreads through a computer network, often exploiting vulnerabilities.
- It spreads by exploiting security holes in interconnected computers.
- Examples include the:
- Internet Worm (Morris Worm)
- Sasser Worm
- Conficker Worm
- Other instant messaging worms
The Internet Worm
- Released by Robert Tappan Morris.
- Infected Unix computers.
- Led to widespread computer crashes.
- Resulted in significant penalties for Morris.
Ethical Evaluation of the Internet Worm
- Kantian evaluation— Morris used others by gaining access without authorization.
- Social contract theory evaluation – violated organizations’ property rights.
- Benefits—organizations learned about their security vulnerabilities.
- Harms—waste of time, unavailable computers, disrupted network traffic, and Morris's punishment.
- Virtue ethics evaluation— Morris misused the Internet and did not take responsibility for the consequences of his actions.
- Conclusion—Morris acted wrongly, exhibiting poor ethical character.
Sasser Worm
- Launched in 2004.
- Infected 18 million computers.
- Disrupted the operations of companies (Delta Airlines, European Commission, Australian railroads, British Coast Guard).
- German juvenile Sven Jaschan confessed and received 30 hours of community service.
Instant Messaging Worms (e.g., Choke and Hello, Kelvir, Palevo)
- Malware spreads through instant messaging services.
- Some required users to delete or downgrade their systems to remove the worms.
Conficker Worm
- 2008 Windows computer worm.
- Widely circulated among computers using older software.
- Often found in legacy systems of factories and healthcare facilities.
Cross-Site Scripting
- Downloading malware without knowing.
- Web sites used by others to view posted documents or comments used to inject malware.
- Victims download malicious code from web servers when clicking links or reading comments.
Drive-By Downloads
- Malware unknowingly downloaded by visiting a compromised website.
- Pop-up windows prompt users for consent and downloads.
- Google's search engine occasionally returns a malicious link resulting in drive-by-downloads.
Trojan Horses and Backdoor Trojans
- Trojan horse: A program with a benign capability that conceals a sinister purpose.
- Backdoor Trojan: A type of Trojan that grants attackers access to the victim's computer.
Ransomware
- Malware that extorts money from the victim, often by encrypting victims files and asking for payments to release them.
- Installed via:
- Drive-by downloads
- Trojan Horses
- Email attachments
- Other means.
Rootkits
- A set of programs that provides privileged access to the computer.
- Activated whenever the computer is started.
- Uses security privileges to prevent recognition by the user.
Spyware and Adware
- Spyware: Software communicating over the internet without user knowledge.
- Monitors web surfing.
- Logs keystrokes.
- Captures snapshots of the computer screen.
- Sends reports back to the host computer.
- Adware: displays pop-up advertisements.
- Backdoor Trojans sometimes used to install spyware/adware.
Bots
- Bots are Trojan backdoor programs that respond to commands from another computer.
- First bots involved in legitimate activities such as internet relay chat/multiplayer games.
- Later bots were also used for illegal activities such as distributing spam/collecting personal information for theft and denial of service attacks.
Bots and Botnets
- Bot: a backdoor Trojan program that responds to commands from another computer.
- Botnet: a collection of infected computers controlled by the same command-and-control software.
- Botnet herders distribute spam and launch distributed denial-of-service attacks.
Protecting Your Internet-Connected Devices
- Keep security patches up-to-date on systems.
- Install and maintain anti-malware.
- Examine manufacturer's precautions before purchasing an Internet-connected device.
- Change default passwords on devices immediately upon connection to the Internet.
- Never use the same password on multiple devices.
- If possible, replace insecure Internet-of-Things (IoT) devices.
Security Risks of "Bring Your Own Device"
- 87% of US companies rely on employees using their personal devices for work purposes.
- The advantages of BYOD include reduced investments in hardware.
- Productivity and employee job satisfaction also improve when employees are allowed to use their personal tech for work.
- The risks of BYOD include corporate data breaches, especially when devices are lost or stolen.
"Bring Your Own Device" Policy Questions
- The concerns related to this policy regarding the security of employed devices.
- The apps that employers permit employees to utilize on personal devices.
- The type of technical support the company offers.
- In case of data breaches, the company's control over personal worker data.
- Company procedure for removing company data from employee devices.
7.4 Cyber Crime & Cyberattacks
- Phishing: Large-scale efforts to acquire user information.
- Spear Phishing: A variant where targeted users are selected.
- SQL Injection: Attacks on improperly secured database-driven web applications.
- Denial-of-Service Attacks (DoS): Attacks disrupting computer services.
- Distributed Denial-of-Service Attacks (DDoS): Attacks from numerous computers.
Internet-of-Things Devices Co-opted for DDoS Attacks
- IoT devices like network routers, security cameras, baby monitors, are often vulnerable to use in DDoS attacks.
Cyber Espionage
- Large-scale government hacking. Hundreds of terabytes of stolen data, dozens of countries.
- People's Liberation Army suspected of involvement.
Anonymous
- Loosely organized hacktivism group with various political aims.
Actions Attributed to Anonymous
- Cyberattacks often related to protests or social/political issues.
Convictions of Anonymous Members
- Numerous people arrested and convicted for Anonymous-related cyber activities.
- Examples of specific individuals and prison sentences provided.
7.5 Online Voting
- The 2000 US Presidential election, particularly in Florida, highlights the issues with using traditional voting machines.
- Two voting irregularities included:
- Hanging chads
- The "Butterfly ballot" design
Benefits of Online Voting
- Increase voter participation - more people would participate at a quicker rate.
- Faster vote counting.
- Eliminates ambiguity present in traditional voting.
- Reduced costs.
- Eliminates ballot-box tampering and potential manipulation.
- Accurate vote counts through software protections against over/under-voting.
Risks of Online Voting
- Possible bias in digital voting since some may rely on home computers over others.
- Voter privacy is more threatened in electronic voting.
- More opportunities to sell votes.
- Online voting is often a target for attacks such as denial-of-service.
- Vulnerability to software and/or hard drive manipulation/hacks affecting votes.
- Lack of physical ballots for auditing or recounts.
Utilitarian Analysis of Online Voting
- Time savings from online voting is weighed against the increased risk of DDoS attacks.
- The probability of a successful attack that changes the outcome of the election needs a determination.
Kantian Analysis of Online Voting
- Voter's will to be reflected in their ballots - integrity of the votes is necessary.
- Recounts require the ability to verify votes – integrity is paramount.
- A paper record of each vote is crucial for auditing and recounting, protecting vote integrity.
- Electronic voting may decrease costs, but the lack of paper records means a loss of auditability, impinging upon vote integrity.
- Eliminating paper votes may seem cost-effective, but at the expense of vote integrity.
Summary of Cyber Security
- Cyber security issues highlight the trade-off between security and convenience.
- Individuals can become infected with malware in several ways.
- Internet-of-Things (IoT) devices are a new vector for cyberattacks.
- Issues need to be addressed regarding when cyberattacks become acts of war.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.