CC101 Chapter 1 Malware and Computer Society CC101
CC101 Chapter 1 Malware and Computer Society CC101
Cybercrime
Online or Internet-based illegal acts
Hackers
• Typically, someone who access a computer or network
illegally.
• Has advanced computer and networking skills.
• Some are deliberately paid to test vulnerabilities in systems
and networks as part of cyber security consulting.
DIGITAL SECURITY RISK
Crackers
• Similar to hackers, someone who access a computer or
network illegally BUT has malicious intent (Destroying data
or Stealing information).
• Has advanced computer and networking skills.
• Same term applied to those who reverse engineer software
to modify it, e.g. to remove license restrictions.
DIGITAL SECURITY RISK
Script kiddies
• Same malicious intent as crackers -without the skills and
knowledge.
• Use prewritten scripts and programs instead.
• The focus is more on the ends than the means.
• Target vulnerable computers.
DIGITAL SECURITY RISK
Corporate spies
• Hired to steal sensitive and confidential company data and
information.
• Has advanced computer and networking skills.
DIGITAL SECURITY RISK
Unethical employees
• These are unauthorized employees who break into the
company's network to access other computers on the
network or the company's server.
• Reason: The challenge; Financial gains; Disgruntled
DIGITAL SECURITY RISK
Cyberextortionist
• uses the Internet to carry out their schemes
• A perpetrator sends threats to an individual or company to
seek demands (typically monetary in nature)
• Ransom -holding your information "captive" using high-
grade encryption.
DIGITAL SECURITY RISK
Cyberterrorists
• Uses the Internet or network to destroy or damage
computers
• For: A cause or belief; Political reasons
• Typically highly organized groups with funds and expertise
DIGITAL SECURITY RISK
15 COMMON CYBERSECURITY RISKS
1. Malware
We’ll start with the most prolific and common form of security threat:
malware. It’s been around since the internet’s inception and continues to remain a
consistent problem. Malware is when an unwanted piece of programming or
software installs itself on a target system, causing unusual behavior. This ranges
from denying access to programs, deleting files, stealing information, and spreading
itself to other systems.
1. Password Theft
We’ll start with the most prolific and common form of security threat:
malware. It’s been around since the internet’s inception and continues to remain a
consistent problem. Malware is when an unwanted piece of programming or
software installs itself on a target system, causing unusual behavior. This ranges
from denying access to programs, deleting files, stealing information, and spreading
itself to other systems.
2. Password Theft
4. Phishing Attacks
Phishing scams are an older attack method and rely on social engineering
to achieve its goal. Typically, an end user receives a message or email which
requests sensitive data, such as a password. Sometimes, the phishing message
appears official, using legitimate appearing addresses and media. This compels an
individual to click on links and accidentally give away sensitive information.
DIGITAL SECURITY RISK
15 COMMON CYBERSECURITY RISKS
5. Cross Site Attack
6. Zero-Day Exploits
Occurring after the discovery of a “zero-day vulnerability,” an exploit is a
targeted attack against a system, network, or software. This attack takes advantage
of an overlooked security problem, looking to cause unusual behavior, damage
data, and steal information.
DIGITAL SECURITY RISK
15 COMMON CYBERSECURITY RISKS
7. Zero-Day Exploits
12. Cryptojacking
Cryptojacking is an attempt to install malware which forces the infected
system to perform “crypto-mining,” a popular form of gaining crypto-currency. This,
like other viruses, can infect unprotected systems. It is deployed because the act of
crypto-mining is hardware intensive.
DIGITAL SECURITY RISK
15 COMMON CYBERSECURITY RISKS
13. Water Hole Attack
Generally used to target organizations, water hole attacks occur when a group
infects websites a particular organization frequently uses. The goal – much like a cross-
site attack – is to load a malicious payload from the infected sites.
Backup programs are available from many sources. Most operating systems include
a backup program. Backup devices, such as external disk drives, also include backup
programs. Numerous stand-alone backup tools exist. Cloud storage providers may offer
backup services. Users of a cloud backup service install software on their computers that
backs up files to the cloud as they are modified.
Business and home users can perform four types of backup: full, differential,
incremental, or selective. A fifth type, continuous data protection, often is used only by large
enterprises to back up data to an in-house network storage device purchased and maintained
by the enterprise. Cloud backup services, a sixth option, are providing continuous data
protection capabilities at a lower cost. Table 5-2 summarizes the purpose, advantages, and
disadvantages of each of these backup methods. Some users implement a three-generation
backup policy to preserve three copies of important files. The grandparent is the oldest copy
of the file. The parent is the second oldest copy of the file. The child is the most recent copy of
the file. When a new backup is performed, the child becomes the parent, the parent becomes
the grandparent, and the media on which the grandparent copy was stored may be erased
and reused for a future backup.
ETHICS AND SOCIETY
INFORMATION ACCURACY
Information accuracy today is a concern because many users
access information maintained by other people or companies, such as on
the Internet. Do not assume that because the information is on the Web
that it is correct. Users should evaluate the value of a Web page before
relying on its content. Be aware that the organization providing access to
the information may not be the creator of the information.
In addition to concerns about the accuracy of computer input, some
individuals and organizations raise questions about the ethics of using
computers to alter output, primarily graphical output such as
retouched photos. Using graphics equipment and software, users easily
can digitize photos and then add, change, or remove images.
ETHICS AND SOCIETY
INFORMATION ACCURACY
Information accuracy today is a concern because many users access information
maintained by other people or companies, such as on the Internet. Do not assume that
because the information is on the Web that it is correct. Users should evaluate the value of a
Web page before relying on its content. Be aware that the organization providing access to
the information may not be the creator of the information.
In addition to concerns about the accuracy of computer input, some individuals and
organizations raise questions about the ethics of using computers to alter output, primarily
graphical output such as
retouched photos. Using graphics equipment and software, users easily can digitize photos
and then add, change, or remove images.
One group that completely opposes any manipulation of an image is the National
Press Photographers Association. It believes that allowing even the slightest alteration could
lead to misrepresentative photos. Others believe that digital photo retouching is acceptable as
long as the significant content or meaning of the photo does not change. Digital retouching is
an area in which legal precedents so far have not been established.
ETHICS AND SOCIETY
CODES OF CONDUCT
A code of conduct is a written guideline that helps determine whether a
specification is ethical/unethical or allowed/not allowed. An IT code of conduct focuses on
acceptable use of technology. Employers and schools often specify standards for the
ethical use of technology in an IT code of conduct and then distribute these standards to
employees and students (Figure 10). You also may find codes of conduct online that
define acceptable forms of communications for websites where users post commentary
or other communications, such as blogs, wikis, online discussions, and so on.
ETHICS AND SOCIETY
GREEN COMPUTING
Green computing involves reducing the electricity and environmental waste while
using a computer. People use, and often waste, resources such as electricity and paper
while using a computer. The United States government developed the ENERGY STAR
program to help reduce the amount of electricity used by computers and related devices.
This program encourages manufacturers to create energy-efficient devices that require
little power when they are not in use. Computers and devices that meet the ENERGY
STAR guidelines display an ENERGY STAR label.
Users should not store obsolete computers and devices in their basement,
storage room, attic, warehouse, or any other location. Computers, monitors, and other
equipment contain toxic materials and potentially dangerous elements including lead,
mercury, and flame retardants. In a landfill, these materials release into the environment.
Recycling and refurbishing old equipment are much safer alternatives for the
environment.
ETHICS AND SOCIETY
GREEN COMPUTING
Experts estimate that more than 700 million personal computers are obsolete.
Because of the huge volumes of electronic waste, the U.S. federal government has
proposed a bill that would require computer recycling across the country. Many state and
local governments have methods in place to make it easy for consumers to recycle this
type of equipment.
To reduce the environmental impact of computing further, users simply can alter
a few habits. To learn more about green computing, complete the Green Computing
exercise on the Web Research page in each chapter of this book.
INFORMATION PRIVACY
GREEN COMPUTING
When you fill out a printed form, such as a magazine subscription or contest
entry, or an online form to sign up for a service, create a profile on an online social
network, or register a product warranty, the merchant that receives the form usually
stores the information you provide in a database. Likewise, every time you tap or click an
advertisement on the web or perform a search online, your information and preferences
enter a database. Some merchants may sell or share the contents of their databases with
national marketing firms and Internet advertising firms. By combining this data with
information from public records, such as driver’s licenses and vehicle registrations, these
firms can create an electronic profile of individuals. Electronic profiles may include
personal details, such as your age, address, phone number, marital status, number and
ages of dependents, interests, and spending habits.
INFORMATION PRIVACY
COOKIES
A cookie is a small text file that a web server stores on your computer. Cookie files
typically contain data about you, such as your user name, postal code, or viewing
preferences. Websites use cookies for a variety of purposes:
• Most websites that allow for personalization use cookies to track user preferences.
These cookies may obtain their values when a user fills in an online form requesting
personal information. Some websites, for example, store user names in cookies in
order to display a personalized greeting that welcomes the user, by name, back to the
website. Other websites allow users to customize their viewing experience with
preferences, such as local news headlines, the local weather forecast, or stock
quotes.
• Some websites use cookies to store user names and/or passwords, so that users do
not need to enter this information every time they sign in to the website.
INFORMATION PRIVACY
COOKIES
• Online shopping sites generally use a session cookie to keep track of items in a user’s
shopping cart. This way, users can start an order during one web session and finish it
on another day in another session. Session cookies usually expire after a certain time,
such as a week or a month.
• Some websites use cookies to track how often users visit a site and the webpages
they visit while at the website.
• Websites may use cookies to target advertisements. These websites store a user’s
interests and browsing habits in the cookie.
INFORMATION PRIVACY
COOKIES
Do websites ever sell information stored in cookies?
Some websites sell or trade information stored in your cookies to advertisers — a
practice many believe to be unethical. If you do not want personal information distributed, you
should limit the amount of information you provide to a website or adjust how your browser
handles cookies. You can regularly clear cookies or set your browser to accept cookies
automatically, prompt if you want to accept a cookie, or disable all cookie use. Keep in mind if
you disable cookie use, you may not be able to use some e-commerce websites. As an
alternative, you can purchase software that selectively blocks cookies.
Many commercial websites send a cookie to your browser; your computer’s hard
drive then stores the cookie. The next time you visit the website, your browser retrieves the
cookie from your hard drive and sends the data in the cookie to the website. Figure 14
illustrates how websites work with cookies. A website can read data only from its own cookie
file stored on your hard drive. That is, it cannot access or view any other data on your hard
drive — including another cookie file.
INFORMATION PRIVACY
PHISHING
Phishing is a scam in which a perpetrator sends an official looking email
message that attempts to obtain your personal and/or financial information. These
messages look legitimate and request that you update credit card numbers, Social
Security numbers, bank account numbers, passwords, or other private information.
Clickjacking is yet another similar scam. With clickjacking, an object that can be
tapped or clicked — such as a button, image, or link — on a website, pop-up ad, pop-
under ad, or in an email message or text message contains a malicious program. When a
user taps or clicks the disguised object, a variety of nefarious events may occur. For
example, the user may be redirected to a phony website that requests personal
information, or a virus may download to the computer or mobile device. Browsers
typically include clickjacking protection.
INFORMATION PRIVACY
SOCIAL ENGINEERING
As related to the use of technology, social engineering is defined as gaining
unauthorized access to or obtaining confidential information by taking advantage of the
trusting human nature of some victims and the naivety of others. Some social engineers
trick their victims into revealing confidential information, such as user names and
passwords, on the phone, in person, or on the Internet. Techniques they use include
pretending to be an administrator or other authoritative figure, feigning an emergency
situation, or impersonating an acquaintance. Social engineers also obtain information
from users who do not destroy or conceal information properly. These perpetrators sift
through company dumpsters, watch or film people dialing phone numbers or using ATMs,
and snoop around computers or mobile devices looking for openly displayed confidential
information.
INFORMATION PRIVACY
SOCIAL ENGINEERING
To protect yourself from social engineering scams, follow these tips:
• Verify the identity of any person or organization requesting personal or confidential
information.
• When relaying personal or confidential information, ensure that only authorized people
can hear your conversation.
• When personal or confidential information appears on a computer or mobile device,
ensure that only authorized people can see your screen.
• Shred all sensitive or confidential documents.
• After using a public computer, clear the cache in its browser.
• Avoid using public computers to conduct banking or other sensitive transactions.
INFORMATION PRIVACY
PRIVACY LAWS
The concern about privacy has led to the enactment of federal and state laws
regarding the storage and disclosure of personal data, some of which are shown in the
table below. Common points in some of these laws are as follows:
1. Information collected and stored about individuals should be limited to what is necessary to
carry out the function of the business or government agency collecting the data.
2. Once collected, provisions should be made to protect the data so that only those
employees within the organization who need access to it to perform their job duties have
access to it.
3. Personal information should be released outside the organization collecting the data only
when the person has agreed to its disclosure.
4. When information is collected about an individual, the individual should know that the data
is being collected and have the opportunity to determine the accuracy of the data.
INFORMATION PRIVACY
PRIVACY LAWS
INFORMATION PRIVACY
EMPLOYEE MONITORING
Employee monitoring involves the use of computers, mobile devices, or
cameras to observe, record, and review an employee’s use of a technology, including
communications such as email messages, keyboard activity (used to measure
productivity), and websites visited. Many programs exist that easily allow employers to
monitor employees. Further, it is legal for employers to use these programs.
INFORMATION PRIVACY
CONTENT FILTERING
One of the more controversial issues that surround the Internet is its widespread
availability of objectionable material, such as prejudiced literature, violence, and obscene
photos. Some believe that such materials should be banned . Others believe that the
materials should be filtered, that is, restricted.
Content filtering is the process of restricting access to certain material. Many
businesses use content filtering to limit employees’ web access. These businesses argue
that employees are unproductive when visiting inappropriate or objectionable websites.
Some schools, libraries, and parents use content filtering to restrict access to minors.
Content filtering opponents argue that banning any materials violates constitutional
guarantees of free speech and personal rights.
INFORMATION PRIVACY
CONTENT FILTERING
Web filtering software is a program that restricts access to specified websites.
Some also filter sites that use specific words (Figure 5). Others allow you to filter email
messages, chat rooms, and programs. Many Internet security programs include a
firewall, antivirus program, and filtering capabilities combined. Browsers also often
include content filtering capabilities.
END!