chapter 1- introduction 1.1 the birth of computer security § data security requirements §the...

70
Chapter 1- Introduction

Post on 21-Dec-2015

221 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: Chapter 1- Introduction 1.1 The Birth of Computer Security § Data Security requirements §The Network Criminal §Hackers §Hacker’s Prey §Employee Passwords

Chapter 1- Introduction

Page 2: Chapter 1- Introduction 1.1 The Birth of Computer Security § Data Security requirements §The Network Criminal §Hackers §Hacker’s Prey §Employee Passwords

1.1 The Birth of Computer Security

Data Security requirementsThe Network CriminalHackersHacker’s PreyEmployee Passwords

Page 3: Chapter 1- Introduction 1.1 The Birth of Computer Security § Data Security requirements §The Network Criminal §Hackers §Hacker’s Prey §Employee Passwords

1.1.1 Data Security

Decentralized networks lend data vulnerable to intentional destruction, alteration, theft, and espionage.

Page 4: Chapter 1- Introduction 1.1 The Birth of Computer Security § Data Security requirements §The Network Criminal §Hackers §Hacker’s Prey §Employee Passwords

1.1.2 The Network Criminal

The people who attack the vulnerability of data systems possess significant computer expertise and/or have access to sensitive data.

Page 5: Chapter 1- Introduction 1.1 The Birth of Computer Security § Data Security requirements §The Network Criminal §Hackers §Hacker’s Prey §Employee Passwords

1.1.3 Hackers

Most computer system intruders are not teenagers.

Instead, most hackers are competitors who are stealing proprietary or sensitive government information.

Page 6: Chapter 1- Introduction 1.1 The Birth of Computer Security § Data Security requirements §The Network Criminal §Hackers §Hacker’s Prey §Employee Passwords

1.1.4 Hackers’ Prey

Hackers begin by persuading unsuspecting people to give away their passwords over the phone.

Employees should be alerted to such scams.

Page 7: Chapter 1- Introduction 1.1 The Birth of Computer Security § Data Security requirements §The Network Criminal §Hackers §Hacker’s Prey §Employee Passwords

1.1.5 Employee Passwords

Employees use passwords to work on computer systems.

Employers expect these passwords to be kept secret from others.

Page 8: Chapter 1- Introduction 1.1 The Birth of Computer Security § Data Security requirements §The Network Criminal §Hackers §Hacker’s Prey §Employee Passwords

1.2 Ways to Secure Employee Secrets

Avoid common namemix-n-match charactersstore passwords wiselychange password oftenavoid hackers scams

Page 9: Chapter 1- Introduction 1.1 The Birth of Computer Security § Data Security requirements §The Network Criminal §Hackers §Hacker’s Prey §Employee Passwords

1.2.1 Avoid Common Names

Common names associated with you are naturally easy for you to remember, but they are easily cracked.

Page 10: Chapter 1- Introduction 1.1 The Birth of Computer Security § Data Security requirements §The Network Criminal §Hackers §Hacker’s Prey §Employee Passwords

1.2.2 Mix-n-Match Characters

Make your password a mix of:

letters and numbersupper and lower casealphabetic and non-

alphabetic characters

not2hard

JUST4u

Han$on

Page 11: Chapter 1- Introduction 1.1 The Birth of Computer Security § Data Security requirements §The Network Criminal §Hackers §Hacker’s Prey §Employee Passwords

1.2.3 Store Passwords Wisely

Keep your password in your head or in a safe, not in an obvious location.

Page 12: Chapter 1- Introduction 1.1 The Birth of Computer Security § Data Security requirements §The Network Criminal §Hackers §Hacker’s Prey §Employee Passwords

1.2.4 Change Password Often

Changing your password should become a habit so that you lessen the chance of it becoming known to intruders.

Page 13: Chapter 1- Introduction 1.1 The Birth of Computer Security § Data Security requirements §The Network Criminal §Hackers §Hacker’s Prey §Employee Passwords

1.2.5 Avoid Hacker Scams

In these scams, the hacker poses as a person to whom you can confide your password.

Regardless of the ruse, the wise user will not give their password to anyone.

Page 14: Chapter 1- Introduction 1.1 The Birth of Computer Security § Data Security requirements §The Network Criminal §Hackers §Hacker’s Prey §Employee Passwords

1.3 Ways to Threaten Computer Security

Computer CrimeCredit Card FraudData Communication FraudUnauthorized AccessUnlawful copying

Page 15: Chapter 1- Introduction 1.1 The Birth of Computer Security § Data Security requirements §The Network Criminal §Hackers §Hacker’s Prey §Employee Passwords

Computer Crime

Computer crime includes:Credit card fraudData communications fraudUnauthorized accessUnlawful copying

Page 16: Chapter 1- Introduction 1.1 The Birth of Computer Security § Data Security requirements §The Network Criminal §Hackers §Hacker’s Prey §Employee Passwords

Credit Card Fraud

Credit card customer numbers pass between public and private networks.

Sometimes these numbers are captured by computer criminals and used to commit fraud.

Page 17: Chapter 1- Introduction 1.1 The Birth of Computer Security § Data Security requirements §The Network Criminal §Hackers §Hacker’s Prey §Employee Passwords

Data Communications Fraud

This form of fraud involves the interception of network passwords or packets of data passing through networks.

Page 18: Chapter 1- Introduction 1.1 The Birth of Computer Security § Data Security requirements §The Network Criminal §Hackers §Hacker’s Prey §Employee Passwords

Unauthorized Access

Hackers try to gain access to confidential employee records, company trade secrets and product pricing structures, and much more.

Page 19: Chapter 1- Introduction 1.1 The Birth of Computer Security § Data Security requirements §The Network Criminal §Hackers §Hacker’s Prey §Employee Passwords

Unlawful Copying

This category of computer crime results in major losses for computer vendors.

Page 20: Chapter 1- Introduction 1.1 The Birth of Computer Security § Data Security requirements §The Network Criminal §Hackers §Hacker’s Prey §Employee Passwords

1.4 Compromising Security

Without realizing it, employers and employees can compromise the security of their computer system.

Twelve examples are shown as follows:

Page 21: Chapter 1- Introduction 1.1 The Birth of Computer Security § Data Security requirements §The Network Criminal §Hackers §Hacker’s Prey §Employee Passwords

1.4.1 A Disgruntled or Militant Employee Could…

Sabotage equipment or programs

Hold data or programs hostage

Page 22: Chapter 1- Introduction 1.1 The Birth of Computer Security § Data Security requirements §The Network Criminal §Hackers §Hacker’s Prey §Employee Passwords

1.4.2 A Competitor Could…

Sabotage operationsEngage in espionageSteal data or programsPhotograph records,

documentation, or CRT screen displays

Page 23: Chapter 1- Introduction 1.1 The Birth of Computer Security § Data Security requirements §The Network Criminal §Hackers §Hacker’s Prey §Employee Passwords

1.4.3. A Data Control Worker Could…

Insert dataDelete dataBypass controlsSell Information

Page 24: Chapter 1- Introduction 1.1 The Birth of Computer Security § Data Security requirements §The Network Criminal §Hackers §Hacker’s Prey §Employee Passwords

1.4.4. A Clerk/Supervisor Could…

Forge or falsify dataEmbezzle fundsEngage in collusion with

people inside or outside the company

Page 25: Chapter 1- Introduction 1.1 The Birth of Computer Security § Data Security requirements §The Network Criminal §Hackers §Hacker’s Prey §Employee Passwords

1.4.5. A System User Could…

Sell data to competitors

Obtain unauthorized information

Page 26: Chapter 1- Introduction 1.1 The Birth of Computer Security § Data Security requirements §The Network Criminal §Hackers §Hacker’s Prey §Employee Passwords

1.4.6. An Operator Could…

Copy filesDestroy files

Page 27: Chapter 1- Introduction 1.1 The Birth of Computer Security § Data Security requirements §The Network Criminal §Hackers §Hacker’s Prey §Employee Passwords

1.4.7. A User Requesting Reports Could…

Sell information to competitors

Receive unauthorized information

Page 28: Chapter 1- Introduction 1.1 The Birth of Computer Security § Data Security requirements §The Network Criminal §Hackers §Hacker’s Prey §Employee Passwords

1.4.8. An Engineer Could…

Install “bugs”Sabotage the systemAccess security

information

Page 29: Chapter 1- Introduction 1.1 The Birth of Computer Security § Data Security requirements §The Network Criminal §Hackers §Hacker’s Prey §Employee Passwords

1.4.9. A Data Conversion Worker Could

Change codesInsert dataDelete data

Page 30: Chapter 1- Introduction 1.1 The Birth of Computer Security § Data Security requirements §The Network Criminal §Hackers §Hacker’s Prey §Employee Passwords

1.4.10. A Programmer Could…

Steal programs or data

Embezzle via programming

Bypass controls

Page 31: Chapter 1- Introduction 1.1 The Birth of Computer Security § Data Security requirements §The Network Criminal §Hackers §Hacker’s Prey §Employee Passwords

1.4.11. A Report Distribution Worker Could…

Examine confidential reports

Keep duplicates of reports

Page 32: Chapter 1- Introduction 1.1 The Birth of Computer Security § Data Security requirements §The Network Criminal §Hackers §Hacker’s Prey §Employee Passwords

1.4.12. A Trash Collector Could…

Sell reports or duplicates to competitors

Page 33: Chapter 1- Introduction 1.1 The Birth of Computer Security § Data Security requirements §The Network Criminal §Hackers §Hacker’s Prey §Employee Passwords

1.5 Ways To Prevent Computer Crimes

DetectingProsecutingSecurityAuthorised Access

Page 34: Chapter 1- Introduction 1.1 The Birth of Computer Security § Data Security requirements §The Network Criminal §Hackers §Hacker’s Prey §Employee Passwords

Detecting Computer Crime

Most cases are discovered by accident—by actions having nothing to do with computers.

The Computer Fraud and Abuse Act of 1986 has improved awareness of computer-related crimes in USA

In Hong Kong, all under Criminal Acts - theft

Page 35: Chapter 1- Introduction 1.1 The Birth of Computer Security § Data Security requirements §The Network Criminal §Hackers §Hacker’s Prey §Employee Passwords

Prosecuting Computer Crime

Eighty-five percent of detected computer crime is not reported.

Prosecution is further hampered by Prosecution is further hampered by law enforcement officers, attorneys, law enforcement officers, attorneys, and judges who do not fully and judges who do not fully understand the nature of the violation.understand the nature of the violation.

Page 36: Chapter 1- Introduction 1.1 The Birth of Computer Security § Data Security requirements §The Network Criminal §Hackers §Hacker’s Prey §Employee Passwords

Security

A system of safeguards is needed to protect a computer system and data from deliberant or accidental damage or access by unauthorized persons.

Page 37: Chapter 1- Introduction 1.1 The Birth of Computer Security § Data Security requirements §The Network Criminal §Hackers §Hacker’s Prey §Employee Passwords

Authorized Access

To assure that only the right person is accessing the right computer system, various means have been developed based on:

• What you doWhat you do• What you areWhat you are

• What you haveWhat you have• What you knowWhat you know

Page 38: Chapter 1- Introduction 1.1 The Birth of Computer Security § Data Security requirements §The Network Criminal §Hackers §Hacker’s Prey §Employee Passwords

What You HaveWhat You Have

This means of authentication is based on your having a physical thing.

It might be a key, badge, token, or plastic card.

Page 39: Chapter 1- Introduction 1.1 The Birth of Computer Security § Data Security requirements §The Network Criminal §Hackers §Hacker’s Prey §Employee Passwords

What You KnowWhat You Know

Many systems verify authorized access based on what you know.

This might be a password, identification number, or the correct combination of numbers on locks.

Page 40: Chapter 1- Introduction 1.1 The Birth of Computer Security § Data Security requirements §The Network Criminal §Hackers §Hacker’s Prey §Employee Passwords

What You DoWhat You Do

This mode of authorized access is based on something you do that is unique such as your signature.

Page 41: Chapter 1- Introduction 1.1 The Birth of Computer Security § Data Security requirements §The Network Criminal §Hackers §Hacker’s Prey §Employee Passwords

What You AreWhat You Are

This security system uses biometrics—the science of measuring individual body characteristics.

Fingerprints, retinal scans, and hand characteristics are examples of what you are.

Page 42: Chapter 1- Introduction 1.1 The Birth of Computer Security § Data Security requirements §The Network Criminal §Hackers §Hacker’s Prey §Employee Passwords

1.6 Compromised Systems

When a computer system has been compromised by a natural or man-made disaster, the resulting problems might include:

Loss of hardwareLoss of softwareLoss of data

Page 43: Chapter 1- Introduction 1.1 The Birth of Computer Security § Data Security requirements §The Network Criminal §Hackers §Hacker’s Prey §Employee Passwords

1.6.1 Recovery From Loss of Hardware

There are various approaches to restoring computer processing operations:

revert to manual services.temporarily use a service bureau.mutual aid from another company.pre-planned consortium facilities.

Page 44: Chapter 1- Introduction 1.1 The Birth of Computer Security § Data Security requirements §The Network Criminal §Hackers §Hacker’s Prey §Employee Passwords

1.6.2 Recovery From Loss of Software

Software security has been an industry concern for years.

At risk here is who owns custom-made software.

Page 45: Chapter 1- Introduction 1.1 The Birth of Computer Security § Data Security requirements §The Network Criminal §Hackers §Hacker’s Prey §Employee Passwords

Custom Software Ownership

Ownership depends on the programmer’s affiliation with the company whose software has been compromised.

Page 46: Chapter 1- Introduction 1.1 The Birth of Computer Security § Data Security requirements §The Network Criminal §Hackers §Hacker’s Prey §Employee Passwords

Company Ownership of Software

If the programmer was employed by the company for whom the software was written, then the company owns the software.

Page 47: Chapter 1- Introduction 1.1 The Birth of Computer Security § Data Security requirements §The Network Criminal §Hackers §Hacker’s Prey §Employee Passwords

Programmer Ownership of Custom Software

If the programmer was hired as a consultant, then ownership should have been addressed in the contract between the company and the programmer.

Page 48: Chapter 1- Introduction 1.1 The Birth of Computer Security § Data Security requirements §The Network Criminal §Hackers §Hacker’s Prey §Employee Passwords

1.6.3 Recovery From Loss of Data

To prevent theft or alteration of data, security techniques can include:

• PasswordsPasswords• Built-in software Built-in software protectionprotection• Backup systemsBackup systems

• Secured wasteSecured waste• Internal controlsInternal controls• Auditor checksAuditor checks• Applicant Applicant screeningscreening

Page 49: Chapter 1- Introduction 1.1 The Birth of Computer Security § Data Security requirements §The Network Criminal §Hackers §Hacker’s Prey §Employee Passwords

Secured Waste

Discarded printouts, printer ribbons, and the like can be sources of data leaks to unauthorized persons.

Paper shredders and locked trash barrels can secure these waste products.

Page 50: Chapter 1- Introduction 1.1 The Birth of Computer Security § Data Security requirements §The Network Criminal §Hackers §Hacker’s Prey §Employee Passwords

Internal Controls

These are controls that are planned as part of the computer system. The transaction log is an example.

This log records all successful or failed attempts to access certain data.

Page 51: Chapter 1- Introduction 1.1 The Birth of Computer Security § Data Security requirements §The Network Criminal §Hackers §Hacker’s Prey §Employee Passwords

Auditor Checks

Auditors not only go over the financial books of a company, but also review computer programs and data.

Discrepancies are noted and investigated.Discrepancies are noted and investigated.

Page 52: Chapter 1- Introduction 1.1 The Birth of Computer Security § Data Security requirements §The Network Criminal §Hackers §Hacker’s Prey §Employee Passwords

Applicant Screening

The people who will be working with the computer system should be honest employees.

Verifying an Verifying an applicant’s résumé applicant’s résumé can weed out can weed out dishonest employees dishonest employees before they are hired.before they are hired.

Page 53: Chapter 1- Introduction 1.1 The Birth of Computer Security § Data Security requirements §The Network Criminal §Hackers §Hacker’s Prey §Employee Passwords

Passwords

A password is a secret word, number, or combination of the two. It should not be divulged nor should it be so simple as to be easily cracked.

Page 54: Chapter 1- Introduction 1.1 The Birth of Computer Security § Data Security requirements §The Network Criminal §Hackers §Hacker’s Prey §Employee Passwords

Built-in Software Protection

Software can be built into operating systems in ways to restrict access to computer systems.

This kind of protection matches an authorized user with only the data that user should access.

Page 55: Chapter 1- Introduction 1.1 The Birth of Computer Security § Data Security requirements §The Network Criminal §Hackers §Hacker’s Prey §Employee Passwords

Backup Systems

Backing up files on a regular basis is a wise precaution—not only for big business, but for the consumer as well.

Page 56: Chapter 1- Introduction 1.1 The Birth of Computer Security § Data Security requirements §The Network Criminal §Hackers §Hacker’s Prey §Employee Passwords

1.7 Pest Programs

Not all programmers write useful or beneficial programs.

Some programmers write pest programs that can destroy data, or in the least, disrupt computer systems.

Page 57: Chapter 1- Introduction 1.1 The Birth of Computer Security § Data Security requirements §The Network Criminal §Hackers §Hacker’s Prey §Employee Passwords

1.7.1 Why Write Pest Programs?

Pest programs are written to show off programming prowess, revenge, sabotage, intellectual curiosity, or a desire for notoriety.

Pest programs include worms and viruses.

Page 58: Chapter 1- Introduction 1.1 The Birth of Computer Security § Data Security requirements §The Network Criminal §Hackers §Hacker’s Prey §Employee Passwords

Computer Worms

A worm is a program that transfers itself from computer to computer over a network.

At target computers, the worm At target computers, the worm creates a separate file for itself.creates a separate file for itself.

Page 59: Chapter 1- Introduction 1.1 The Birth of Computer Security § Data Security requirements §The Network Criminal §Hackers §Hacker’s Prey §Employee Passwords

Computer Virus

A computer virus is a set of illicit instructions that gets passed on to other programs or documents with which it comes in contact.

Viruses can change or delete files, display words, or produce bizarre screen effects.

Page 60: Chapter 1- Introduction 1.1 The Birth of Computer Security § Data Security requirements §The Network Criminal §Hackers §Hacker’s Prey §Employee Passwords

1.7.2 Transmission of Viruses

Viruses can be passed on via:

diskettesa LANe-mail attachmentsa WAN, including the

Internet

Page 61: Chapter 1- Introduction 1.1 The Birth of Computer Security § Data Security requirements §The Network Criminal §Hackers §Hacker’s Prey §Employee Passwords

1.7.3 Virus Vaccines

Since viruses are programs written by programmers, it takes another programmer to detect and remove the virus.

These anti-virus programs are These anti-virus programs are called vaccines.called vaccines.

Page 62: Chapter 1- Introduction 1.1 The Birth of Computer Security § Data Security requirements §The Network Criminal §Hackers §Hacker’s Prey §Employee Passwords

1.8 Your Personal Data

FACT: Computer data about you is bought, sold, and traded every day.

FACT: More often than not, the exchange of data about you occurs without your knowledge.

Page 63: Chapter 1- Introduction 1.1 The Birth of Computer Security § Data Security requirements §The Network Criminal §Hackers §Hacker’s Prey §Employee Passwords

Your Personal Privacy

The front line of defense in protecting your personal privacy begins with you.

All those forms, surveys, credit card All those forms, surveys, credit card transactions, etc. generate a vast transactions, etc. generate a vast amount of data about you.amount of data about you.

Page 64: Chapter 1- Introduction 1.1 The Birth of Computer Security § Data Security requirements §The Network Criminal §Hackers §Hacker’s Prey §Employee Passwords

1.9 Network Security

One or more of the following may be needed to keep data within a network secure:

FirewallsEncryptionSurveillance softwareAnonymity

Page 65: Chapter 1- Introduction 1.1 The Birth of Computer Security § Data Security requirements §The Network Criminal §Hackers §Hacker’s Prey §Employee Passwords

Firewalls

This is a simple method to prevent unauthorized access of a network from the outside.

Page 66: Chapter 1- Introduction 1.1 The Birth of Computer Security § Data Security requirements §The Network Criminal §Hackers §Hacker’s Prey §Employee Passwords

Encryption

Encryption is scrambling data into secret codes by using elaborate mathematical functions.

Intercepting scrambled data is of no use to computer criminals.

hiding data 4T*v@5 [8fW

Page 67: Chapter 1- Introduction 1.1 The Birth of Computer Security § Data Security requirements §The Network Criminal §Hackers §Hacker’s Prey §Employee Passwords

Surveillance Software

In addition to firewalls and encryption methods, employers might use software that monitors the activity of their workers.

Page 68: Chapter 1- Introduction 1.1 The Birth of Computer Security § Data Security requirements §The Network Criminal §Hackers §Hacker’s Prey §Employee Passwords

Anonymity

Network security can also include keeping the e-mail address identity of employees anonymous.

This measure reduces junk e-mailings This measure reduces junk e-mailings and protects the employee’s identity.and protects the employee’s identity.

Page 69: Chapter 1- Introduction 1.1 The Birth of Computer Security § Data Security requirements §The Network Criminal §Hackers §Hacker’s Prey §Employee Passwords

1.10 Conclusion

Security and privacy are important issues in the Information Age.

The computer industry as well as private citizens share responsibility in addressing these issues.

Page 70: Chapter 1- Introduction 1.1 The Birth of Computer Security § Data Security requirements §The Network Criminal §Hackers §Hacker’s Prey §Employee Passwords

Reference:

Chapter 8 H.L. Capron