Module 4
Module 4
Module 4
BotNet
It is a group of compromised computers or mobile
devices connected to a network.
–A compromised computer or device is known as
a zombie
DoS
A denial of service attack (DoS attack) disrupts
computer access to an Internet service
–Distributed DoS attack (DDoS attack)
Internet and Network Attacks
Backdoor
It is a program or set of instructions in a program that
allow users to bypass security controls
Spoofing
It is a technique intruders use to make their network or
Internet transmission appear legitimate.
6
Internet and Network Attacks
VIRUS
1. Vital Information Resource Under Siege
2. A program which can replicate itself
without infecting any host program.
3. A program that duplicates itself by infecting
other programs.
8
Worms – similar to a rogue software except that it
replicates as a separate program rather than infecting and
hiding in other programs. A worm is common in network
installations where it can attach to several computers
connected to the network.
Viruses – are created by very good programmers and this
may make you wonder why people with such talent create
a destructive program like a virus. Two main reasons: For
revenge and for fame.
9
Randomly-triggered – viruses are designed to attack at
random. E.g. Ambulance Car Virus.
Date-activated – viruses wait for a pre-defined date before
it strikes. E.g. Michael Angelo – March 6
Boot-count – viruses will count the number of times the
computer is booted. E.g. Telecom Virus
Time-since – viruses attacks after the computer is left
open for a specified period of time. E.g. Jerusalem.
Keystroke-triggered – viruses will activate itself after a
predefined number of keystrokes. E.g. Finger Virus.
10
System Slowdown
Unexpected display of messages
Unexpected graphics on screen
Unexpected file date or time change
Unexpected music
Corruption of system and data files.
11
12
Organizations take several measures to help prevent
unauthorized access and use
–Acceptable use policy
–Disable file and printer sharing
13
Access controls define who can access a computer,
device, or network; when they can access it; and
what actions they can take while accessing it.
14
A passphrase is a private combination of words,
often containing mixed capitalization and
punctuation, associated with a user name that allows
access to certain computer resources.
15
A possessed object is any item that you must
possess, or carry with you, in order to gain access to
a computer or computer facility.
16
17
Two-step verification uses two separate methods, one
after the next, to verify the identity of a use
18
Digital forensics is the discovery, collection, and analysis of
evidence found on computers and networks
19
Software theft occurs when someone:
20
Many manufacturers incorporate an activation
process into their programs to ensure the software
is not installed on more computers than legally
licensed
21
A license agreement is the right to use software
22
Information theft occurs when someone steals
personal or confidential information
23
24
A digital signature is an encrypted code that a
person, website, or organization attaches to an
electronic message to verify the identity of the
message sender
25
A digital certificate is a notice that guarantees a
user or a website is legitimate
26
27
28
29
A backup is a duplicate of a file, program, or media that
can be used if the original is lost, damaged, or destroyed
30
Wireless access poses
additional security risks.
Others connect to a
network through an
unsecured wireless access
point (WAP) or combination
router/WAP
31
Wireless access poses
additional security risks.
Others connect to a
network through an
unsecured wireless access
point (WAP) or combination
router/WAP
32
Wireless access poses
additional security risks.
Others connect to a
network through an
unsecured wireless access
point (WAP) or combination
router/WAP
33
Spyware blockers
Pop-up blockers
Secure e-mail
Anonymous remailers
Anonymous surfing
Cookie managers
Disk/file erasing programs
Policy generators
Public key encryption
34
35
Operating system security enhancements
Upgrades, patches
Anti-virus software
Easiest and least expensive way to prevent threats to system
integrity
Requires daily updates
36
Know the computer that you are using.
Keep your password secured.
Avoid just letting anyone use your computer.
Check storage devices such as diskettes, flash drives,
memory cards before using them.
Use an anti-virus
Update your computer
Routinely scan your system and connected devices
37
Ethics
Define ETHICS
Privacy
“the right to be left alone when you want
to be”
Information privacy
“right to be forgotten”
Threats to privacy
oPersonal information collected by commercial Web sites
oPersonal information collected by government authorities
oImpact of mobile devices
oTracking people's locations and movements
oTracking personal behavior
Information Privacy
A cookie is a small text file that a web server stores on your
computer
Smartphone apps
Profiling
Creation of digital images that characterize online
individual and group behavior
Anonymous profiles
Personal profiles
Advertising networks
Track consumer and browsing behavior on Web
Dynamically adjust what user sees on screen
Build and refresh profiles of consumers
Profiling and Behavioral Targeting
Business perspective:
Increases effectiveness of advertising, subsidizing free
content
Enables sensing of demand for new products and services
Critics' perspective:
Undermines expectation of anonymity and privacy
Legal Protections
DRM.jpg
Business Models
Spotify operates under a freemium business
model (basic services are free, while additional
features are offered via paid subscriptions).
Purpose
Ensure consumer gets what is paid for/expected to receive
Protect owner against piracy and misappropriation
Infringement
Market confusion
Bad faith
Dilution
Behavior that weakens connection between trademark and product
Copyright – The legal right granted to an author,
composer, playwright, publisher, or distributor to
exclusive publication, production, sale, or distribution of
a literary, musical, dramatic, or artistic work.
67
Software Licenses
Shrink-Wrap
Shareware
Freeware
Public-Domain Software
Open-Source
68
This license usually includes terms that (1)prohibit making
unauthorized copies, (2) prohibit any modification, (3)
prohibit resale, (4) limit use to one or a
specified number of computers, (5) limit publisher's liability.
The legal implications of a shrink wrap license are still
controversial and far from being standardized.
69
The term shareware (also known as trialware or demoware) refers
to proprietary software that is provided to users without payment
on a trial basis and is often limited by any combination
of functionality, availability, or convenience.
70
It is a computer software that is available for use at no cost or for
an optional fee, but usually with one or more restricted usage
rights.
71
Public domain software is software that has been placed in
the public domain, in other words there is absolutely no
ownership (such as copyright) of the intellectual property that
the software represents.
72
Open-source software (OSS) is computer software that is
available in source code form: the source code and certain
other rights normally reserved for copyright holders are
provided under a software license that permits users to study,
change, improve and at times also to distribute the software.
E.g. Open Source Software like Ubuntu, Linux, etc.
73
Ten Commandments for Computer Ethics
77