Chapter 8 (Mis)
Chapter 8 (Mis)
(programming errors,
SYSTEM
installation errors,
VULNERABILITY AND
unauthorized changes)
ABUSE
Disasters
Security: Use of
networks/computers
Policies, procedures and outside of firm’s
technical measures used to control
prevent unauthorized access, Loss and theft of
alteration, theft, or physical portable devices
damage to information
systems. CONTEMPORARY
SECURITY
Controls: CHALLENGES AND
Methods, policies, and VULNERABILITIES
organizational procedures that
ensure safety of
organization’s assets;
accuracy and reliability of its
accounting records; and
operational adherence to
management standards.
Accessibility of
networks
Hardware problems
(breakdowns,
configuration errors,
damage from
improper use or crime)
The architecture of a Web- Wireless security challenges
based application typically
includes a Web client, a Radio frequency
server, and corporate bands easy to scan
information systems linked to SSIDs (service set
databases. Each of these identifiers)
components presents security Identify access
challenges and vulnerabilities. points
Floods, fires, power failures, Broadcast
and other electrical problems multiple times
can cause disruptions at any War driving:
point in the network. Eavesdroppers
drive by
Internet vulnerabilities buildings and
try to detect
Network open to
SSID and gain
anyone
access to
Size of Internet means network and
abuses can have wide resources
impact
WEP (Wired
Use of fixed Internet Equivalent Privacy)
addresses with cable Security
or DSL modems standard for
creates fixed targets 802.11; use is
hackers optional
Unencrypted VOIP Uses shared
E-mail, P2P, IM password for
* Interception both users and
*Attachments with access point
malicious software Users often fail
*Transmitting trade to implement
secrets WEP or
stronger
systems
SYSTEM Trojan horses:
VULNERABILITY AND Software program that
ABUSE appears to be benign
but then does
something other than
expected.
SQL injection attacks:
Hackers submit data to
Web forms that
exploits site’s
unprotected software
and sends rogue SQL
query to database.
Many Wi-Fi networks can be Spyware: Small
penetrated easily by intruders programs install
using sniffer programs to themselves
obtain an address to access surreptitiously on
the resources of a network computers to monitor
without authorization. user Web surfing
activity and serve up
Malware (malicious advertising.
software) Key loggers: Record
every keystroke on
Viruses: Rogue
computer to steal
software program that
serial numbers,
attaches itself to other
passwords, launch
software programs or
Internet attacks.
data files in order to
be executed Hackers and computer
Worms: Independent crime
computer programs
that copy themselves Hackers vs. crackers
from one computer to Activities include
other computers over a System
network. intrusion
System Denial-of-service attacks
damage (DoS)
Cybervandalis
m • Flooding server with
Intentional thousands of false requests to
disruption, crash the network.
defacement, Distributed denial-of-service
destruction of attacks (DDoS)
Web site or
corporate • Use of numerous computers
information to launch a DoS
system
• Botnets
Spoofing
Networks of “zombie”
• Misrepresenting oneself by PCs infiltrated by bot
using fake e-mail addresses or malware
masquerading as someone Worldwide, 6 - 24
else million computers
serve as zombie PCs
• Redirecting Web link to in thousands of
address different from botnets
intended one, with site
masquerading as intended Computer crime
destination
• Defined as “any violations
Sniffer of criminal law that involve a
knowledge of computer
• Eavesdropping program that technology for their
monitors information perpetration, investigation, or
traveling over network prosecution”
• Enables hackers to steal • Computer may be target of
proprietary information such crime, e.g.:
as e-mail, company files, etc.
Breaching
confidentiality of
protected Click fraud: Occurs when
computerized data individual or computer
Accessing a computer program fraudulently clicks
system without on online ad without any
authority intention of learning more
about the advertiser or
• Computer may be making a purchase.
instrument of crime, e.g.:
Cyberterrorism and
Theft of trade secrets Cyberwarfare
Using e-mail for
threats or harassment Software vulnerability
MIS audit
Identity management
software
• Authenticates users,
protecting identities,
controlling access
Authentication
Password systems
Tokens The firewall is placed
Smart cards between the firm’s private
Biometric network and the public
authentication Internet or another distrusted
network to protect against
Firewall: unauthorized traffic.
• Combination of hardware
and software that prevents
unauthorized users from Intrusion detection systems:
accessing private networks
• Technologies include:
• Monitor hot spots on o Continually changing
corporate networks to detect keys
and deter intruders o Encrypted
authentication system
• Examines events as they are with central server
happening to discover attacks
in progress Encryption:
Digital certificate:
o Number of
transactions
o Online response time
o Payroll checks printed
per hour
o Known bugs per
hundred lines of code
• Walkthrough: Review of
specification or design
document by small group of
qualified people
• Debugging: Process by
which errors are eliminated