Lecture 7 - Cybercrime and IS Security PDF
Document Details
Uploaded by BalancedLapisLazuli1665
King Saud University
Tags
Summary
This lecture discusses cybercrime and information system security. It details why computer incidents are prevalent, the types of cybercrimes and exploits, and prevention methods. The summary details the importance of information system security and strong measures to protect organizations, employees, customers, and business partners.
Full Transcript
Principles of Information Systems, Thirteenth Edition Chapter 13 Cybercrime and Information System Security © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as pe...
Principles of Information Systems, Thirteenth Edition Chapter 13 Cybercrime and Information System Security © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain 1 product or service or otherwise on a password-protected website for classroom use. Objectives After completing this chapter, you will be able to: Explain why computer incidents are so prevalent Identify and briefly describe the types of computer exploits and their impact © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. The Threat Landscape Number of cybercrimes are increasing Organizations are putting in place a range of countermeasures to combat cybercrime © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service 3 or otherwise on a password-protected website for classroom use. Why Computer Incidents Are So Prevalent Increasing Complexity Increases Vulnerability Cloud computing, networks, computers, mobile devices, virtualization, OS applications, websites, switches, routers, and gateways are interconnected and driven by millions of lines of code Expanding and Changing Systems Introduce New Risks It is difficult for IT organizations to keep up with the pace of technological change, successfully perform an ongoing assessment of new security risks, and implement approaches for dealing with them Increased Prevalence of Bring Your Own Device Policies Bring your own device (BYOD): a business policy that permits (encourages) employees to use their own mobile devices to access company computing resources and applications BYOD makes it difficult for IT organizations to adequately safeguard additional portable devices with various OSs and applications © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service 4 or otherwise on a password-protected website for classroom use. Why Computer Incidents Are So Prevalent Increasing Sophistication of Those Who Would Do Harm Today’s computer menace is organized and may be part of an organized group that has an agenda and targets specific organizations and Web sites © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service 5 or otherwise on a password-protected website for classroom use. Types of Exploits Common attacks include: Ransomware Viruses Worms Trojan horses Spam Distributed denial-of-service attacks Rootkits Phishing Identity theft © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service 6 or otherwise on a password-protected website for classroom use. Types of Exploits Ransomware Malware that stops you from using your computer or accessing your data until you meet certain demands such as paying a ransom to the attacker Viruses A piece of programming code (usually disguised as something else) that causes a computer to behave in an unexpected and undesirable manner Spread to other machines when a computer user shares an infected file (e.g., sends an email with a virus-infected MS Word file) Macro viruses have become a common and easily created form of virus Worms A harmful program that duplicates itself without human intervention Malware (malicious software) can fit into multiple categories. For example, it could be a worm and a ransomware at the same time © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service 7 or otherwise on a password-protected website for classroom use. Types of Exploits Trojan Horses A seemingly harmless program in which malicious code is hidden A victim on the receiving end is usually tricked into opening it because it appears to be useful software from a legitimate source Might be designed to enable the attacker to destroy hard drives, corrupt files, control the computer remotely, launch attacks against other computers, steal passwords or spy on users Android Trojan Horse - https://www.cse.wustl.edu/~jain/cse571-11/ftp/trojan/index.html - Capable of SMS scanning, password theft, GPS tracking, etc © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service 8 or otherwise on a password-protected website for classroom use. Types of Exploits Spam The use of email systems to send unwanted or unrequested email to large numbers of people Also an inexpensive method of marketing used by many legitimate organizations CAN-SPAM Act ( )قانون امريكيstates that it is legal to spam, provided the messages meet a few basic requirements - Spammers cannot disguise their identity by using a false return address - The email must include a label specifying that it is an ad or a solicitation - The email must include a way for recipients to opt out of future mass mailings © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service 9 or otherwise on a password-protected website for classroom use. Types of Exploits Spam CAPTCHA is software generates and grades tests that humans can pass but current computer programs cannot CAPTCHA is a defense mechanism used to mitigate against automated exploits, particularly those involving bots and spamming © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service 10 or otherwise on a password-protected website for classroom use. Types of Exploits An overview of CAPTCHAs (optional): https://www.youtube.com/watch?v=lUTvB1O8eEg&t=409s New types of CAPTCHAs: © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service 11 or otherwise on a password-protected website for classroom use. Types of Exploits Distributed Denial-of-Service Attacks An attack in which a malicious hacker takes over a large group of computers (botnet) via the Internet and instructs them to flood a target site with requests for data and other small tasks, leading to problems or slowdowns on the target site © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service 12 or otherwise on a password-protected website for classroom use. Types of Exploits Rootkit A set of programs that enables its user to gain administrator-level access to a computer without the end user’s consent or knowledge Phishing The act of fraudulently using email to try to get the recipient to reveal personal data One form of it: - Sending legitimate-looking emails urging recipients to take action to avoid a negative consequence or to receive a reward Spear-phishing is a variation of phishing where fraudulent emails are sent to a certain organization’s employees - Much more precise and narrow - Designed to look like they came from high-level executives within organization © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service 13 or otherwise on a password-protected website for classroom use. Types of Exploits © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service 14 or otherwise on a password-protected website for classroom use. Types of Exploits Identity Theft The theft of personal information and then used without their permission Data breach The unintended release of sensitive data or the access of sensitive data by unauthorized individuals - Often results in identity theft Most e-commerce websites use some form of encryption technology to protect information as it comes from the consumer. They employ various security measures, including: - Secure communication protocol (HTTPS) - Encryption of customer data © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service 15 or otherwise on a password-protected website for classroom use. Federal Laws for Prosecuting Computer Attacks⁺ © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service 16 or otherwise on a password-protected website for classroom use. Prevention Organizations should implement a layered security solution to make computer break-ins so difficult that an attacker gives up If an attacker breaks through one layer, another layer must then be overcome Next slides discuss the following layers of protective measures: Educating Employees and Contract Workers Implementing a Corporate Firewall Utilizing a Security Dashboard Installing Antivirus Software on Personal Computers Implementing Safeguards against Attacks by Malicious Insiders Addressing the Most Critical Internet Security Threats © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service 17 or otherwise on a password-protected website for classroom use. Educating Employees and Contract Workers Users can protect an organization’s information systems by: Guarding their passwords to protect against unauthorized access to their accounts Prohibiting others from using their passwords Applying strict access controls (file and directory permissions) to protect data from disclosure or destruction Reporting all unusual activity to the organization’s IT security group Protecting portable computers and data storage (hundreds of thousands of laptops are lost or stolen per year) © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service 18 or otherwise on a password-protected website for classroom use. Implementing a Corporate Firewall Firewall A system of software, hardware, or a combination of both that stands guard between an organization’s internal network and the Internet © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service 19 or otherwise on a password-protected website for classroom use. Utilizing a Security Dashboard Security dashboard software provides a comprehensive display of all vital data related to an organization’s security defenses © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service 20 or otherwise on a password-protected website for classroom use. Installing Antivirus Software on Personal Computers Antivirus software Scans for specific sequence of bytes, known as a virus signature, that indicates the presence of a specific virus If virus is found Antivirus software informs the user and may clean, delete, or quarantine any files, directories, or disks affected by the malicious code It is crucial that antivirus software be continually updated with the latest virus signatures © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service 21 or otherwise on a password-protected website for classroom use. Implementing Safeguards against Attacks by Malicious Insiders User accounts that remain active after employees leave a company are a potential security risk IS staff must promptly delete (or inactivate) computer accounts of departing employees Another safeguard Create roles and user accounts so that users have the authority to perform their responsibilities and nothing more © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service 22 or otherwise on a password-protected website for classroom use. Addressing the Most Critical Internet Security Threats Computer attackers Know that many organizations are slow to fix problems Scan the Internet for vulnerable systems US-CERT regularly updates a summary of the most frequent, high-impact vulnerabilities being reported Find it at https://www.cisa.gov/known-exploited-vulnerabilities-catalog Actions required to address these issues include installing a known patch to the software And keeping applications and OSs up-to-date © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service 23 or otherwise on a password-protected website for classroom use. Summary Computer crime is a serious and rapidly growing area of concern requiring management attention Organizations must take strong measures to ensure secure, private, and reliable computing experiences for their employees, customers, and business partners © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service 24 or otherwise on a password-protected website for classroom use.