Podcast
Questions and Answers
What is a virus in the context of computer programs?
What is a virus in the context of computer programs?
How do viruses typically spread?
How do viruses typically spread?
What major step allows a virus to replicate once a user executes an infected program?
What major step allows a virus to replicate once a user executes an infected program?
Which action can trigger an email virus spread?
Which action can trigger an email virus spread?
Signup and view all the answers
What is the importance of keeping antivirus software up-to-date?
What is the importance of keeping antivirus software up-to-date?
Signup and view all the answers
What type of application should consumers be wary of?
What type of application should consumers be wary of?
Signup and view all the answers
What moral accountability does Butler have regarding Firesheep?
What moral accountability does Butler have regarding Firesheep?
Signup and view all the answers
What is a defining characteristic of a worm in computer networks?
What is a defining characteristic of a worm in computer networks?
Signup and view all the answers
How did Robert Tappan Morris, Jr. release the Internet worm?
How did Robert Tappan Morris, Jr. release the Internet worm?
Signup and view all the answers
What was one significant consequence of the Internet worm's release?
What was one significant consequence of the Internet worm's release?
Signup and view all the answers
What ethical theory argues that Morris violated others by accessing their computers without permission?
What ethical theory argues that Morris violated others by accessing their computers without permission?
Signup and view all the answers
What was a societal benefit attributed to Morris's actions with the worm?
What was a societal benefit attributed to Morris's actions with the worm?
Signup and view all the answers
Which of the following consequences did Morris face for releasing the Internet worm?
Which of the following consequences did Morris face for releasing the Internet worm?
Signup and view all the answers
What did the Sasser worm disrupt in its attack?
What did the Sasser worm disrupt in its attack?
Signup and view all the answers
Who confessed to being responsible for the Sasser worm?
Who confessed to being responsible for the Sasser worm?
Signup and view all the answers
What punishment did Sven Jaschan receive for his actions with the Sasser worm?
What punishment did Sven Jaschan receive for his actions with the Sasser worm?
Signup and view all the answers
Which ethical evaluation suggests that Morris acted selfishly by using the Internet as a lab?
Which ethical evaluation suggests that Morris acted selfishly by using the Internet as a lab?
Signup and view all the answers
What significant cyber attack occurred in Estonia in 2007?
What significant cyber attack occurred in Estonia in 2007?
Signup and view all the answers
Which countries were targeted during the Fourth of July attacks in 2009?
Which countries were targeted during the Fourth of July attacks in 2009?
Signup and view all the answers
What specific vulnerability is associated with Internet-based SCADA systems?
What specific vulnerability is associated with Internet-based SCADA systems?
Signup and view all the answers
Which cyber weapon was developed to attack Iran's nuclear capabilities?
Which cyber weapon was developed to attack Iran's nuclear capabilities?
Signup and view all the answers
What event coincided with the DDoS attack on Twitter and other sites in 2009?
What event coincided with the DDoS attack on Twitter and other sites in 2009?
Signup and view all the answers
What was the primary concern addressed by the Department of Justice regarding Apple?
What was the primary concern addressed by the Department of Justice regarding Apple?
Signup and view all the answers
What does sidejacking involve?
What does sidejacking involve?
Signup and view all the answers
What was the main function of the Firesheep extension released by Eric Butler?
What was the main function of the Firesheep extension released by Eric Butler?
Signup and view all the answers
What was a notable outcome following the release of Firesheep?
What was a notable outcome following the release of Firesheep?
Signup and view all the answers
How did the act utilitarian analysis view the release of Firesheep?
How did the act utilitarian analysis view the release of Firesheep?
Signup and view all the answers
Which ethical attribute did Butler demonstrate by making Firesheep freely available?
Which ethical attribute did Butler demonstrate by making Firesheep freely available?
Signup and view all the answers
What was the primary security vulnerability highlighted by the internet security community?
What was the primary security vulnerability highlighted by the internet security community?
Signup and view all the answers
What was the FBI's motive for requesting Apple to unlock the iPhone?
What was the FBI's motive for requesting Apple to unlock the iPhone?
Signup and view all the answers
What notable effect did Firesheep have on users in its first week after release?
What notable effect did Firesheep have on users in its first week after release?
Signup and view all the answers
What is a significant benefit of the Bring Your Own Device (BYOD) policy for employers?
What is a significant benefit of the Bring Your Own Device (BYOD) policy for employers?
Signup and view all the answers
What is a main security risk associated with Bring Your Own Device?
What is a main security risk associated with Bring Your Own Device?
Signup and view all the answers
What does spear-phishing specifically target?
What does spear-phishing specifically target?
Signup and view all the answers
What action can a company take regarding its data on a stolen personal device?
What action can a company take regarding its data on a stolen personal device?
Signup and view all the answers
How does SQL injection attack a web application?
How does SQL injection attack a web application?
Signup and view all the answers
What is the primary purpose of phishing attacks?
What is the primary purpose of phishing attacks?
Signup and view all the answers
What should companies consider for personal devices under a BYOD policy?
What should companies consider for personal devices under a BYOD policy?
Signup and view all the answers
What potential harm can occur due to insecure personal devices in a BYOD environment?
What potential harm can occur due to insecure personal devices in a BYOD environment?
Signup and view all the answers
How many phishing attacks were recorded globally in the second half of 2014?
How many phishing attacks were recorded globally in the second half of 2014?
Signup and view all the answers
What type of support might a company's IT department provide under a BYOD policy?
What type of support might a company's IT department provide under a BYOD policy?
Signup and view all the answers
What was the primary target of the Stuxnet worm?
What was the primary target of the Stuxnet worm?
Signup and view all the answers
Which attack occurred on the Fourth of July weekend in 2009?
Which attack occurred on the Fourth of July weekend in 2009?
Signup and view all the answers
What security risk is associated with Internet-based SCADA systems?
What security risk is associated with Internet-based SCADA systems?
Signup and view all the answers
Which notable event coincided with the DDoS attacks on Twitter and other social networking sites in 2009?
Which notable event coincided with the DDoS attacks on Twitter and other social networking sites in 2009?
Signup and view all the answers
Which group is believed to have orchestrated the DDoS attack during the Fourth of July weekend in 2009?
Which group is believed to have orchestrated the DDoS attack during the Fourth of July weekend in 2009?
Signup and view all the answers
What characteristic defines a worm in computer networks?
What characteristic defines a worm in computer networks?
Signup and view all the answers
What was one of the immediate effects of the Internet worm released by Robert Tappan Morris, Jr.?
What was one of the immediate effects of the Internet worm released by Robert Tappan Morris, Jr.?
Signup and view all the answers
What alone can be considered a violation of property rights in Morris's actions?
What alone can be considered a violation of property rights in Morris's actions?
Signup and view all the answers
What was one of the benefits associated with Morris's release of the Internet worm?
What was one of the benefits associated with Morris's release of the Internet worm?
Signup and view all the answers
What ethical evaluation suggests Morris demonstrated a lack of responsibility for his actions?
What ethical evaluation suggests Morris demonstrated a lack of responsibility for his actions?
Signup and view all the answers
What disruption did the Sasser worm cause upon its release?
What disruption did the Sasser worm cause upon its release?
Signup and view all the answers
What was the consequence for Sven Jaschan regarding his involvement in the Sasser worm?
What was the consequence for Sven Jaschan regarding his involvement in the Sasser worm?
Signup and view all the answers
What motivation might Morris have had for releasing the Internet worm according to ethical evaluations?
What motivation might Morris have had for releasing the Internet worm according to ethical evaluations?
Signup and view all the answers
Which of the following evaluations considers the consequences of Morris's actions on overall societal benefit?
Which of the following evaluations considers the consequences of Morris's actions on overall societal benefit?
Signup and view all the answers
What conclusion did the Act Utilitarian Analysis draw about the release of Firesheep?
What conclusion did the Act Utilitarian Analysis draw about the release of Firesheep?
Signup and view all the answers
What did the release of Firesheep prompt Facebook and Twitter to announce?
What did the release of Firesheep prompt Facebook and Twitter to announce?
Signup and view all the answers
What action did the FBI take regarding Apple's software request for unlocking the iPhone?
What action did the FBI take regarding Apple's software request for unlocking the iPhone?
Signup and view all the answers
What vulnerability allowed sidejacking to occur, according to the content?
What vulnerability allowed sidejacking to occur, according to the content?
Signup and view all the answers
How did Eric Butler's release of Firesheep affect public awareness?
How did Eric Butler's release of Firesheep affect public awareness?
Signup and view all the answers
What ethics-related attributes did Butler demonstrate by releasing Firesheep?
What ethics-related attributes did Butler demonstrate by releasing Firesheep?
Signup and view all the answers
What was a common criticism of e-commerce sites regarding sidejacking?
What was a common criticism of e-commerce sites regarding sidejacking?
Signup and view all the answers
What is the primary purpose of the Conficker worm?
What is the primary purpose of the Conficker worm?
Signup and view all the answers
What is a characteristic of a Trojan horse in malware?
What is a characteristic of a Trojan horse in malware?
Signup and view all the answers
How can ransomware be installed on a victim's computer?
How can ransomware be installed on a victim's computer?
Signup and view all the answers
What method do attackers use in cross-site scripting attacks?
What method do attackers use in cross-site scripting attacks?
Signup and view all the answers
What is a defining feature of drive-by downloads?
What is a defining feature of drive-by downloads?
Signup and view all the answers
Which of the following examples is a known instant messaging worm?
Which of the following examples is a known instant messaging worm?
Signup and view all the answers
In which year did the Conficker worm emerge?
In which year did the Conficker worm emerge?
Signup and view all the answers
Which of the following can potentially lead to cross-site scripting vulnerabilities?
Which of the following can potentially lead to cross-site scripting vulnerabilities?
Signup and view all the answers
What is the main action performed by backdoor Trojans?
What is the main action performed by backdoor Trojans?
Signup and view all the answers
What percentage of Google's search queries return a malicious URL, according to the Google Anti-Malware Team?
What percentage of Google's search queries return a malicious URL, according to the Google Anti-Malware Team?
Signup and view all the answers
What is the main objective of a denial-of-service (DoS) attack?
What is the main objective of a denial-of-service (DoS) attack?
Signup and view all the answers
Which of the following describes a Distributed Denial-of-Service (DDoS) attack?
Which of the following describes a Distributed Denial-of-Service (DDoS) attack?
Signup and view all the answers
Which IoT devices are commonly exploited for DDoS attacks?
Which IoT devices are commonly exploited for DDoS attacks?
Signup and view all the answers
What significant event occurred during the DDoS attack on Dyn in October 2016?
What significant event occurred during the DDoS attack on Dyn in October 2016?
Signup and view all the answers
What challenge did Blue Security face that led to the termination of its anti-spam activities?
What challenge did Blue Security face that led to the termination of its anti-spam activities?
Signup and view all the answers
Which factor contributed to the vulnerability of IoT devices being co-opted for DDoS attacks?
Which factor contributed to the vulnerability of IoT devices being co-opted for DDoS attacks?
Signup and view all the answers
Which organization was Jeanson James Ancheta associated with in the context of cybercrime?
Which organization was Jeanson James Ancheta associated with in the context of cybercrime?
Signup and view all the answers
What response did Blue Frog implement against spam messages?
What response did Blue Frog implement against spam messages?
Signup and view all the answers
What was the outcome of the DDoS attacks launched by PharmaMaster against Blue Security?
What was the outcome of the DDoS attacks launched by PharmaMaster against Blue Security?
Signup and view all the answers
How did spammers react to Blue Security's spam deterrence system initially?
How did spammers react to Blue Security's spam deterrence system initially?
Signup and view all the answers
Which principle best describes the moral implications of Butler releasing Firesheep?
Which principle best describes the moral implications of Butler releasing Firesheep?
Signup and view all the answers
What is a common misconception about how viruses spread through email?
What is a common misconception about how viruses spread through email?
Signup and view all the answers
Which method do users often neglect that affects antivirus software effectiveness?
Which method do users often neglect that affects antivirus software effectiveness?
Signup and view all the answers
In what manner does a virus typically replicate after a user runs an infected program?
In what manner does a virus typically replicate after a user runs an infected program?
Signup and view all the answers
What ethical issue is highlighted by Butler's decision to release Firesheep?
What ethical issue is highlighted by Butler's decision to release Firesheep?
Signup and view all the answers
What is a significant misconception many users have regarding fake antivirus applications?
What is a significant misconception many users have regarding fake antivirus applications?
Signup and view all the answers
What specific behavior by users can exacerbate the spread of viruses through email?
What specific behavior by users can exacerbate the spread of viruses through email?
Signup and view all the answers
Which activity is criminalized under the Computer Fraud and Abuse Act?
Which activity is criminalized under the Computer Fraud and Abuse Act?
Signup and view all the answers
What is the maximum penalty for offenses under the Computer Fraud and Abuse Act?
What is the maximum penalty for offenses under the Computer Fraud and Abuse Act?
Signup and view all the answers
Which of the following actions is illegal under the Electronic Communications Privacy Act?
Which of the following actions is illegal under the Electronic Communications Privacy Act?
Signup and view all the answers
What was Apple's main concern regarding the FBI's request to disable iPhone security features?
What was Apple's main concern regarding the FBI's request to disable iPhone security features?
Signup and view all the answers
Which security feature of the iPhone 5C protects personal data after multiple incorrect passcode attempts?
Which security feature of the iPhone 5C protects personal data after multiple incorrect passcode attempts?
Signup and view all the answers
What was the outcome of the FBI's order for Apple to comply with unlocking the iPhone?
What was the outcome of the FBI's order for Apple to comply with unlocking the iPhone?
Signup and view all the answers
What aspect of Malik's actions raised concerns regarding national security?
What aspect of Malik's actions raised concerns regarding national security?
Signup and view all the answers
Which method did the FBI utilize to compel Apple to assist with the locked iPhone?
Which method did the FBI utilize to compel Apple to assist with the locked iPhone?
Signup and view all the answers
What impact did the delay between incorrect passcode attempts have on the security of the iPhone?
What impact did the delay between incorrect passcode attempts have on the security of the iPhone?
Signup and view all the answers
What was a primary concern of the FBI regarding Apple's software?
What was a primary concern of the FBI regarding Apple's software?
Signup and view all the answers
What was one of the immediate effects of the Firesheep release?
What was one of the immediate effects of the Firesheep release?
Signup and view all the answers
Which ethical theory best describes Butler's actions in releasing Firesheep?
Which ethical theory best describes Butler's actions in releasing Firesheep?
Signup and view all the answers
Which factor contributed to the sidejacking vulnerability?
Which factor contributed to the sidejacking vulnerability?
Signup and view all the answers
What was the response of Facebook and Twitter following the Firesheep release?
What was the response of Facebook and Twitter following the Firesheep release?
Signup and view all the answers
What aspect of public perception did the release of Firesheep primarily influence?
What aspect of public perception did the release of Firesheep primarily influence?
Signup and view all the answers
How did the Department of Justice ultimately resolve its request to Apple regarding the locked iPhone?
How did the Department of Justice ultimately resolve its request to Apple regarding the locked iPhone?
Signup and view all the answers
What minimal harm was observed following the release of Firesheep?
What minimal harm was observed following the release of Firesheep?
Signup and view all the answers
What characteristic of Butler was highlighted in the virtue ethics analysis?
What characteristic of Butler was highlighted in the virtue ethics analysis?
Signup and view all the answers
What was a significant outcome of the Stuxnet worm's attack on Iran's nuclear facilities?
What was a significant outcome of the Stuxnet worm's attack on Iran's nuclear facilities?
Signup and view all the answers
Which of the following best describes the nature of the 2009 DDoS attack on Twitter and other sites?
Which of the following best describes the nature of the 2009 DDoS attack on Twitter and other sites?
Signup and view all the answers
What characteristic of SCADA systems increases their vulnerability to security risks?
What characteristic of SCADA systems increases their vulnerability to security risks?
Signup and view all the answers
What was the common attribution for the Fourth of July attacks in 2009?
What was the common attribution for the Fourth of July attacks in 2009?
Signup and view all the answers
Which event involved a significant espionage threat attributed to China's military?
Which event involved a significant espionage threat attributed to China's military?
Signup and view all the answers
What is the primary aim of a Denial-of-Service (DoS) attack?
What is the primary aim of a Denial-of-Service (DoS) attack?
Signup and view all the answers
What type of attack involves using multiple devices to overwhelm a target?
What type of attack involves using multiple devices to overwhelm a target?
Signup and view all the answers
Which event is primarily associated with the Mirai botnet?
Which event is primarily associated with the Mirai botnet?
Signup and view all the answers
What was Blue Security known for before its decline?
What was Blue Security known for before its decline?
Signup and view all the answers
What tactic did PharmaMaster use to combat Blue Security’s efforts?
What tactic did PharmaMaster use to combat Blue Security’s efforts?
Signup and view all the answers
Which characteristic of Internet-of-Things (IoT) devices made them susceptible to DDoS attacks?
Which characteristic of Internet-of-Things (IoT) devices made them susceptible to DDoS attacks?
Signup and view all the answers
What significant consequence did Blue Security face from the DDoS attacks?
What significant consequence did Blue Security face from the DDoS attacks?
Signup and view all the answers
Which group was primarily known for generating revenue from malware attacks?
Which group was primarily known for generating revenue from malware attacks?
Signup and view all the answers
Which of the following was NOT a reason for the success of the Mirai botnet?
Which of the following was NOT a reason for the success of the Mirai botnet?
Signup and view all the answers
What was a significant outcome of the Blue Frog bot's operation?
What was a significant outcome of the Blue Frog bot's operation?
Signup and view all the answers
Study Notes
Chapter 7: Computer and Network Security
- Chapter covers computer and network security, including hacking, malware, cybercrime, and online voting.
Learning Objectives
- Introduction to computer security
- Hacking definitions and methods
- Types of Malware
- Cybercrime and cyberattacks
- Online voting
7.1 Introduction
- Increasing computer use highlights the growing importance of computer security.
- Lack of security leads to harmful consequences like stolen information and extortion.
- Computer systems can be weaponized, impacting governments and organizations.
7.2 Hacking
- Original meaning of "hacker" involved exploration, risk-taking, and system innovation (e.g., MIT Tech Model Railroad Club).
- Modern meaning of "hacker" is someone who gains unauthorized access to computers and networks.
- Methods for gaining login names and passwords include eavesdropping, dumpster diving, social engineering, brute-force searches, and dictionary attacks.
Password Dos and Don'ts
- Avoid short, dictionary-based passwords.
- Do not reuse passwords.
- Utilize strong, complex passwords.
- Enable two-factor authentication when available.
- Have password recoveries sent to a secure email address.
Computer Fraud and Abuse Act
- Criminalizes various hacker activities, such as transmitting damaging code, gaining unauthorized access to computers, transmitting classified information, and trafficking in passwords.
- Maximum penalty includes 20 years in prison and a $250,000 fine.
Electronic Communications Privacy Act
- Illegal to intercept phone conversations, emails, or other data transmissions.
- Criminal to access stored email messages without authorization.
FBI and the Locked iPhone
- December 2015: Syed Farook and Tashfeen Malik killed and wounded people in California. FBI recovered an iPhone 5C from the perpetrator but it was encrypted.
- February 2016: FBI asked Apple to create a new version of iOS to disable passcode security features. Apple refused.
- FBI persuaded a US magistrate for an order.
- Apple argued that creating a "backdoor" for the FBI would harm the security of all iPhones.
Sidejacking
- Sidejacking is hijacking an open web session by capturing user cookies.
- Sidejacking is frequently achievable with unencrypted wireless networks.
- Internet security community long warned about this phenomenon, but ecommerce didn't act upon it for years.
Case Study: Firesheep
- October 2010: Eric Butler released a Firesheep Firefox extension.
- Firesheep allowed easy sidejacking of web sessions.
- In its first week, more than 500,000 downloads occurred.
- Firesheep brought media attention to security issues.
- Early 2011: Facebook and Twitter introduced new ways to increase site security.
Act Utilitarian Analysis for Firesheep
- Release of Firesheep helped focus media's attention on security.
- Benefits: improved security by prompting changes to Facebook and Twitter.
- Harms: minimal evidence suggesting Firesheep increased malicious activity in online theft.
- Conclusion: Releasing Firesheep, according to Act Utilitarianism, was likely a good act.
Virtue Ethics Analysis for Firesheep
- Butler's actions helped the public understand security issues on unencrypted networks.
- Butler's actions reflected an interest in protecting privacy and good.
- Butler's courage in taking responsibility for the program and the benevolence in making the software freely.
Kantian Analysis for Firesheep
- Accessing someone else's account is an invasion of privacy and therefore wrong.
- Butler created a tool for malicious activities; therefore, he had some moral responsibility for the misuse of Firesheep.
- Butler's hope that public pressure would prompt improvement of site security led to negative outcomes when he was willing to tolerate short-term increase in privacy violations.
- Treating victims as mere tools was ethically objectionable.
- Butler's release of Firesheep was wrong under a Kantian framework.
7.3 Malware
- Virus: A self-replicating code embedded within other programs (like documents or executables).
- Viruses are often included in downloaded software.
- Viruses are often associated with:
- Hard disks
- Floppy disks
- CDs/DVDs
- Email attachments
- Viruses spread via:
- Diskettes or CDs
- Email attachments
- Files downloaded from the Internet
Email Attachments with Possible Virus
- Email attachments can conceal viruses.
How an Email Virus Spreads
- Users open attachments containing viruses.
- The virus reads the user's address book.
- The virus sends emails with virus-containing attachments.
Antivirus Software Packages
- Antivirus software is used to detect and destroy viruses.
- Antivirus software needs to be kept up-to-date.
- Consumers need to be cautious of fake antivirus applications.
Worm
- Worm: A self-contained program that spreads through a computer network, often exploiting vulnerabilities.
- It spreads by exploiting security holes in interconnected computers.
- Examples include the:
- Internet Worm (Morris Worm)
- Sasser Worm
- Conficker Worm
- Other instant messaging worms
The Internet Worm
- Released by Robert Tappan Morris.
- Infected Unix computers.
- Led to widespread computer crashes.
- Resulted in significant penalties for Morris.
Ethical Evaluation of the Internet Worm
- Kantian evaluation— Morris used others by gaining access without authorization.
- Social contract theory evaluation – violated organizations’ property rights.
- Benefits—organizations learned about their security vulnerabilities.
- Harms—waste of time, unavailable computers, disrupted network traffic, and Morris's punishment.
- Virtue ethics evaluation— Morris misused the Internet and did not take responsibility for the consequences of his actions.
- Conclusion—Morris acted wrongly, exhibiting poor ethical character.
Sasser Worm
- Launched in 2004.
- Infected 18 million computers.
- Disrupted the operations of companies (Delta Airlines, European Commission, Australian railroads, British Coast Guard).
- German juvenile Sven Jaschan confessed and received 30 hours of community service.
Instant Messaging Worms (e.g., Choke and Hello, Kelvir, Palevo)
- Malware spreads through instant messaging services.
- Some required users to delete or downgrade their systems to remove the worms.
Conficker Worm
- 2008 Windows computer worm.
- Widely circulated among computers using older software.
- Often found in legacy systems of factories and healthcare facilities.
Cross-Site Scripting
- Downloading malware without knowing.
- Web sites used by others to view posted documents or comments used to inject malware.
- Victims download malicious code from web servers when clicking links or reading comments.
Drive-By Downloads
- Malware unknowingly downloaded by visiting a compromised website.
- Pop-up windows prompt users for consent and downloads.
- Google's search engine occasionally returns a malicious link resulting in drive-by-downloads.
Trojan Horses and Backdoor Trojans
- Trojan horse: A program with a benign capability that conceals a sinister purpose.
- Backdoor Trojan: A type of Trojan that grants attackers access to the victim's computer.
Ransomware
- Malware that extorts money from the victim, often by encrypting victims files and asking for payments to release them.
- Installed via:
- Drive-by downloads
- Trojan Horses
- Email attachments
- Other means.
Rootkits
- A set of programs that provides privileged access to the computer.
- Activated whenever the computer is started.
- Uses security privileges to prevent recognition by the user.
Spyware and Adware
- Spyware: Software communicating over the internet without user knowledge.
- Monitors web surfing.
- Logs keystrokes.
- Captures snapshots of the computer screen.
- Sends reports back to the host computer.
- Adware: displays pop-up advertisements.
- Backdoor Trojans sometimes used to install spyware/adware.
Bots
- Bots are Trojan backdoor programs that respond to commands from another computer.
- First bots involved in legitimate activities such as internet relay chat/multiplayer games.
- Later bots were also used for illegal activities such as distributing spam/collecting personal information for theft and denial of service attacks.
Bots and Botnets
- Bot: a backdoor Trojan program that responds to commands from another computer.
- Botnet: a collection of infected computers controlled by the same command-and-control software.
- Botnet herders distribute spam and launch distributed denial-of-service attacks.
Protecting Your Internet-Connected Devices
- Keep security patches up-to-date on systems.
- Install and maintain anti-malware.
- Examine manufacturer's precautions before purchasing an Internet-connected device.
- Change default passwords on devices immediately upon connection to the Internet.
- Never use the same password on multiple devices.
- If possible, replace insecure Internet-of-Things (IoT) devices.
Security Risks of "Bring Your Own Device"
- 87% of US companies rely on employees using their personal devices for work purposes.
- The advantages of BYOD include reduced investments in hardware.
- Productivity and employee job satisfaction also improve when employees are allowed to use their personal tech for work.
- The risks of BYOD include corporate data breaches, especially when devices are lost or stolen.
"Bring Your Own Device" Policy Questions
- The concerns related to this policy regarding the security of employed devices.
- The apps that employers permit employees to utilize on personal devices.
- The type of technical support the company offers.
- In case of data breaches, the company's control over personal worker data.
- Company procedure for removing company data from employee devices.
7.4 Cyber Crime & Cyberattacks
- Phishing: Large-scale efforts to acquire user information.
- Spear Phishing: A variant where targeted users are selected.
- SQL Injection: Attacks on improperly secured database-driven web applications.
- Denial-of-Service Attacks (DoS): Attacks disrupting computer services.
- Distributed Denial-of-Service Attacks (DDoS): Attacks from numerous computers.
Internet-of-Things Devices Co-opted for DDoS Attacks
- IoT devices like network routers, security cameras, baby monitors, are often vulnerable to use in DDoS attacks.
Cyber Espionage
- Large-scale government hacking. Hundreds of terabytes of stolen data, dozens of countries.
- People's Liberation Army suspected of involvement.
Anonymous
- Loosely organized hacktivism group with various political aims.
Actions Attributed to Anonymous
- Cyberattacks often related to protests or social/political issues.
Convictions of Anonymous Members
- Numerous people arrested and convicted for Anonymous-related cyber activities.
- Examples of specific individuals and prison sentences provided.
7.5 Online Voting
- The 2000 US Presidential election, particularly in Florida, highlights the issues with using traditional voting machines.
- Two voting irregularities included:
- Hanging chads
- The "Butterfly ballot" design
Benefits of Online Voting
- Increase voter participation - more people would participate at a quicker rate.
- Faster vote counting.
- Eliminates ambiguity present in traditional voting.
- Reduced costs.
- Eliminates ballot-box tampering and potential manipulation.
- Accurate vote counts through software protections against over/under-voting.
Risks of Online Voting
- Possible bias in digital voting since some may rely on home computers over others.
- Voter privacy is more threatened in electronic voting.
- More opportunities to sell votes.
- Online voting is often a target for attacks such as denial-of-service.
- Vulnerability to software and/or hard drive manipulation/hacks affecting votes.
- Lack of physical ballots for auditing or recounts.
Utilitarian Analysis of Online Voting
- Time savings from online voting is weighed against the increased risk of DDoS attacks.
- The probability of a successful attack that changes the outcome of the election needs a determination.
Kantian Analysis of Online Voting
- Voter's will to be reflected in their ballots - integrity of the votes is necessary.
- Recounts require the ability to verify votes – integrity is paramount.
- A paper record of each vote is crucial for auditing and recounting, protecting vote integrity.
- Electronic voting may decrease costs, but the lack of paper records means a loss of auditability, impinging upon vote integrity.
- Eliminating paper votes may seem cost-effective, but at the expense of vote integrity.
Summary of Cyber Security
- Cyber security issues highlight the trade-off between security and convenience.
- Individuals can become infected with malware in several ways.
- Internet-of-Things (IoT) devices are a new vector for cyberattacks.
- Issues need to be addressed regarding when cyberattacks become acts of war.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
This quiz covers key concepts related to computer viruses and worms, including how they spread, their characteristics, and notable historical events like the Internet worm. Test your knowledge on the ethical implications and consequences of these malicious programs.