Introduction To Computing Chapter 5
Introduction To Computing Chapter 5
Chapter 5
Internet Security
Introduction
As more people today are engage on using the internet, the number of people who is vulnerable
in threats could also grow. In Philippines alone, an average Filipino spend 10 hours or more each
day online. Sharing, storing, and gathering information through the internet is crucial that the
user must take measures to protect their private and important data.
To understand the risk and threats concerning the internet, this module will discuss it thoroughly.
Varied activities are also provided at the end.
Specific Objectives
Duration
Information transmitted over networks has a higher degree of security risk than information kept
on an organization’s premises. In an organization, network administrators usually take measures
to protect a network from security risks. On the Internet, where no central administrator is
present, the security risk is greater. Internet and network attacks that jeopardize security include
computer viruses, worms, Trojan horses, and rootkits; botnets; denial of service attacks; back
doors; and spoofing. The following sections address these computer security risks and suggest
measures organizations and individuals can take to protect their computers while on the Internet
or connected to a network.
● Computer Viruses, Worms, Trojan Horses, and Rootkits Every unprotected computer
is susceptible to the first type of computer security risk — a computer virus, worm,
Trojan horse, and/or rootkit.
• A Trojan horse (named after the Greek myth) is a program that hides within or looks
like a legitimate program. A certain condition or action usually triggers the Trojan horse.
Unlike a virus or worm, a Trojan horse does not replicate itself to other computers.
• A rootkit is a program that hides in a computer and allows someone from a remote
location to take full control of the computer. Once the rootkit is installed, the rootkit
author can execute programs, change settings, monitor activity, and access files on the
remote computer.
Computer viruses, worms, Trojan horses, and rootkits are classified as malware (short for
malicious software), which are programs that act without a user’s knowledge and
deliberately alter the computer’s operations. Unscrupulous programmers write malware
and then test it to ensure it can deliver its payload. The payload is the destructive event or
prank the program is intended to deliver. A computer infected by a virus, worm, Trojan
horse, or rootkit often has one or more of the following symptoms:
Using an antivirus is essential when trying to keep your computer healthy and free from
viruses. Computers are an incredible technology that many of us use every day of our
lives. However, they’re prone to viruses and malware that could harm our files and steal
our personal data, such as banking details and social security information. If you’re in the
market for some extra security, here are 8 ways to protect your computer from viruses.
1. Install an Antivirus
There are many antivirus programs available, all ranging in price as the level of security
increases. Installing the best antivirus is no easy task, and sometimes it may be safer for
us to download more than one if they each cover different security aspects.
It can be said that there’s no need for antivirus as long as we don’t access the internet
from our PC. This is, however, not necessarily true, as we can carry viruses between
systems on USB sticks. It’s crucial to remember that you don’t have to spend a lot
money, or any money at all, to have a safe and secure computer.
We need to ensure that updates are notified or set to download and install automatically.
Be warned, these installations can be time-consuming, especially if there are significant
changes and security measures that change how the system handles various data.
Without a backup, there’s no way to recover any lost data. This is even more critical
since hard drives may accidentally corrupt themselves and cost us our files. However, a
backup that contains the virus and malicious code will only repeat the issues we’ve
experienced until we don’t back up the malware.
There are three basic options for storing your backup: external hard drives, online
storage, and cloud storage. Sites such as Google Drive offer free cloud storage for a
limited amount of space.
A strong password is complex and often does not relate to ourselves in any way. The
most common passwords that are easily guessed are “password,” 123456, and 12345678.
Using the same login details for every website or app leaves us vulnerable to an attack
even if just one account is illegally accessed.
6. Install an Ad-block
Online pop-up advertisements can often lead to sketchy websites that steal our data and
install viruses. It’s often easier said than done when trying to avoid these, unless we
download a reliable ad-blocker that stops us from seeing them all together.
It’s easy to find find free ad-blockers and various paid ones. The difference in price
generally relates to how well it functions. We should be careful when browsing the web
even if we have an active ad-block on since many sites prevent entry unless the extension
or app is disabled.
● Botnets
● Back Doors
A back door is a program or set of instructions in a program that allow users to bypass
security controls when accessing a program, computer, or network. Once perpetrators
gain access to unsecure computers, they often install a back door or modify an existing
program to include a back door, which allows them to continue to access the computer
remotely without the user’s knowledge.
● Spoofing
To defend against botnets, DoS attacks, improper use of back doors, and spoofing, users
can implement firewall solutions and install intrusion detection software. The following
sections discuss these safeguards.
A firewall is hardware and/or software that protects a network’s resources from intrusion
by users on another network such as the Internet. All networked and online computer
users should implement a firewall solution.
Figure This figure shows how firewall works in your computer.
To provide extra protection against hackers and other intruders, large organizations
sometimes use intrusion detection software to identify possible security breaches.
Intrusion detection software automatically analyzes all network traffic, assesses system
vulnerabilities, identifies any unauthorized access (intrusions), and notifies network
administrators of suspicious behavior patterns or system breaches. To utilize intrusion
detection software requires the expertise of a network administrator because the programs
are complex and difficult to use and interpret. These programs also are quite expensive.
Another type of computer security risk is unauthorized access and use. Unauthorized access is
the use of a computer or network without permission. Unauthorized use is the use of a computer
or its data for unapproved or possibly illegal activities. Unauthorized use includes a variety of
activities: an employee using an organization’s computer to send personal e-mail messages, an
employee using the organization’s word processing software to track his or her child’s soccer
league scores, or someone gaining access to a bank computer and performing an unauthorized
transfer.
Organizations take several measures to help prevent unauthorized access and use. At a
minimum, they should have a written acceptable use policy (AUP) that outlines the
computer activities for which the computer and network may and may not be used. An
organization’s AUP should specify the acceptable use of computers by employees for
personal reasons. Some organizations prohibit such use entirely. Others allow personal
use on the employee’s own time such as a lunch hour.
Other measures that safeguard against unauthorized access and use include firewalls and
intrusion detection software, which were discussed in the previous section, and
identifying and authenticating users.
Many organizations use access controls to minimize the chance that a perpetrator
intentionally may access or an employee accidentally may access confidential
information on a computer. An access control is a security measure that defines who can
access a computer, when they can access it, and what actions they can take while
accessing the computer. In addition, the computer should maintain an audit trail that
records in a file both successful and unsuccessful access attempts. An unsuccessful
access attempt could result from a user mistyping his or her password, or it could result
from a hacker trying thousands of passwords.
Many systems implement access controls using a two-phase process called identification
and authentication. Identification verifies that an individual is a valid user. Authentication
verifies that the individual is the person he or she claims to be. Three methods of
identification and authentication include user names and passwords, possessed objects,
and biometric devices. The technique(s) an organization uses should correspond to the
degree of risk associated with the unauthorized access.
Possessed Objects
A possessed object is any item that you must carry to gain access to a computer or
computer facility. Examples of possessed objects are badges, cards, smart cards, and
keys. The card you use in an automated teller machine (ATM) is a possessed object that
allows access to your bank account.
Possessed objects often are used in combination with personal identification numbers. A
personal identification number (PIN) is a numeric password, either assigned by a
company or selected by a user. PINs provide an additional level of security. An ATM
card typically requires a four-digit PIN. PINs are passwords. Select them carefully and
protect them as you do any other password.
Biometric Devices
Digital Forensics
Hardware theft and vandalism are other types of computer security risks. Hardware theft
is the act of stealing computer equipment. Hardware vandalism is the act of defacing or
destroying computer equipment. Hardware vandalism takes many forms, from someone
cutting a computer cable to individuals breaking into a business or school computer lab
and aimlessly smashing computers. Companies, schools, and other organizations that
house many computers are at risk of hardware theft and vandalism, especially those that
have smaller system units that easily can fit in a backpack or briefcase. Mobile users also
are susceptible to hardware theft. It is estimated that more than 600,000 notebook
computers are stolen each year. The size and weight of these computers, especially
netbooks, make them easy to steal.
To help reduce the chances of theft, companies and schools use a variety of security
measures. Physical access controls, such as locked doors and windows, usually are
adequate to protect the equipment. Many businesses, schools, and some homeowners
install alarm systems for additional security. School computer labs and other areas with a
large number of semifrequent users often attach additional physical security devices such
as cables that lock the equipment to a desk (Figure 10-9), cabinet, or floor. Small locking
devices also exist that require a key to access a hard disk or optical disc drive.
Some businesses use a real time location system (RTLS) to track and identify the location
of high-risk or high-value items. One implementation of RTLS places RFID tags in items
to be tracked.
Mobile computer users must take special care to protect their equipment. Some users
attach a physical device such as a cable to lock a mobile computer temporarily to a
stationary object. Other mobile users install a mini-security system in the notebook
computer. Some of these security systems shut down the computer and sound an alarm if
the computer moves outside a specified distance. Others can be configured to photograph
the thieves when they use the computer. Notebook computer security systems and
tracking software also can track the location of a stolen notebook computer.
Some notebook computers use passwords, possessed objects, and biometrics as methods
of security. When you start these computers, you must enter a password, slide a card in a
card reader, or press your finger on a fingerprint reader before the hard disk unlocks. This
type of security does not prevent theft, but it renders the computer useless if it is stolen.
Software Theft
Another type of computer security risk is software theft. Software theft occurs when
someone steals software media, intentionally erases programs, illegally copies a program,
or illegally registers and/or activates a program. One form of software theft involves
someone physically stealing the media that contain the software or the hardware that
contains the media, as described in the previous section. Another form of software theft
occurs when software is stolen from software manufacturers. This type of theft, called
piracy, is by far the most common form of software theft. Software piracy is the
unauthorized and illegal duplication of copyrighted software. A related form of software
theft involves users illegally obtaining registration numbers and/or activation codes.
To protect software media from being stolen, owners should keep original software boxes
and media in a secure location. All computer users should back up their files and disks
regularly, in the event of theft.
To protect themselves from software piracy, software manufacturers issue users license
agreements. A license agreement is the right to use the software. That is, you do not own
the software. The license agreement provides specific conditions for use of the software,
which a user must accept before using the software (Figure 10-10). These terms usually
are displayed when you install the software
The most common type of license included with software purchased by individual users
is a single-user license agreement, also called an end-user license agreement (EULA). A
single-user license agreement typically includes many of the following conditions that
specify a user’s responsibility upon acceptance of the agreement.
• Install the software on only one computer. (Some license agreements allow users to
install the software on one desktop computer and one notebook computer.)
• Make one copy of the software as a backup.
• Give or sell the software to another individual, but only if the software is removed from
the user’s computer first. Users are not permitted to:
• Install the software on a network, such as a school computer lab.
• Give copies to friends and colleagues, while continuing to use the software.
• Export the software.
• Rent or lease the software.
Unless otherwise specified by a license agreement, you do not have the right to copy,
loan, borrow, rent, or in any way distribute software. Doing so is a violation of copyright
law. It also is a federal crime. Despite this, some experts estimate for every authorized
copy of software in use, at least one unauthorized copy exists. Read Ethics & Issues 10-1
for a related discussion.
If you are not completely familiar with your school or employer’s policies governing
installation of software, check with the information technology department or your
school’s technology coordinator
Software Theft
Information theft is yet another type of computer security risk. Information theft occurs
when someone steals personal or confidential information. An unethical company
executive may steal or buy stolen information to learn about a competitor. A corrupt
individual may steal credit card numbers to make fraudulent purchases.
● Encryption
Security failure
A security breach is any incident that results in unauthorized access to computer data,
applications, networks or devices. It results in information being accessed without authorization.
Typically, it occurs when an intruder is able to bypass security mechanisms.
Data breaches can be far more than a temporary terror — they may change the course of
your life. Businesses, governments, and individuals alike can experience huge complications
from having sensitive information exposed. Whether you are offline or online, hackers can get to
you through the internet, Bluetooth, text messages, or the online services that you use.
Anyone can be at risk of a data breach — from individuals to high-level enterprises and
governments. More importantly, anyone can put others at risk if they are not protected.
● Technology
● User behavior
The assumption is that a data breach is caused by an outside hacker, but that's not always true.
Reasons for how data breaches happen might sometimes be traced back to intentional attacks.
However, it can just as easily result from a simple oversight by individuals or flaws in a
company’s infrastructure.
● A Malicious Insider. This person purposely accesses and/or shares data with the intent of
causing harm to an individual or company. The malicious insider may have legitimate
authorization to use the data, but the intent is to use the information in nefarious ways.
● Malicious Outside Criminals. These are hackers who use various attack vectors to gather
information from a network or an individual.
Phishing
These social engineering attacks are designed to fool you into causing a data breach.
Phishing attackers pose as people or organizations you trust to easily deceive you. Criminals of
this nature try to coax you into handing over access to sensitive data or provide the data itself.
Brute force attacks. In a more brash approach, hackers might enlist software tools to guess your
passwords.
For business organizations: a data breach can have a devastating effect on an organization's
reputation and financial bottom line. Organizations such as Equifax, Target, and Yahoo, for
example, have been the victims of a data breach. And today, many people associate/remember
those companies for the data breach incident itself, rather than their actual business operations.
For individuals: identity theft is a major threat to data breach victims. Data leaks can reveal
everything from social security numbers to banking information. Once a criminal has these
details, they can engage in all types of fraud under your name. Theft of your identity can ruin
your credit, pin you with legal issues, and it is difficult to fight back against.
Wireless Security
Wireless network security primarily protects a wireless network from unauthorized and
malicious access attempts. Typically, wireless network security is delivered through wireless
devices (usually a wireless router/switch) that encrypts and secures all wireless communication
by default. Even if the wireless network security is compromised, the hacker is not able to view
the content of the traffic/packet in transit. Moreover, wireless intrusion detection and prevention
systems also enable protection of a wireless network by alerting the wireless network
administrator in case of a security breach.
Some of the common algorithms and standards to ensure wireless network security are Wired
Equivalent Policy (WEP) and Wireless Protected Access (WPA).
WEP uses a data encryption scheme that is based on a combination of user- and system-
generated key values. However, it is widely known that WEP is the least secure network type as
hackers have developed tactics of reverse-engineering and cracking the encryption system.
Wi-Fi Protected Access (WPA) was developed to deal with the flaws that were found
with the WEP protocol. WPA offers features such as the Temporal Key Integrity Protocol
(TKIP) which was a dynamic 128-bit key that was harder to break into than WEP’s static,
unchanging key.
It also introduced the Message Integrity Check, which scanned for any altered packets sent by
hackers, the Temporal Key Integrity Protocol (TKIP), and the pre-shared key (PSK), among
others, for encryption.
In 2004, WPA2 brought significant changes and more features to the wireless security
gambit. WPA2 replaced TKIP with the Counter Mode Cipher Block Chaining Message
Authentication Code Protocol (CCMP) which is a far superior encryption tool.
WPA2 has been the industry standard since its inception, on March 13, 2006, the Wi-Fi Alliance
stated that all future devices with the Wi-Fi trademark had to use WPA2.
WPA2-PSK
WPA2-PSK (Pre-Shared Key) requires a single password to get on the wireless network.
It’s generally accepted that a single password to access Wi-Fi is safe but only as much as you
trust those using it. A major vulnerability comes from the potential damage done when login
credentials get placed in the wrong hands. That is why this protocol is most often used for a
residential or open Wi-Fi network.
To encrypt a network with WPA2-PSK you provide your router not with an encryption key, but
rather with a plain-English passphrase between 8 and 63 characters long. Using CCMP, that
passphrase, along with the network SSID, is used to generate unique encryption keys for each
wireless client. And those encryption keys are constantly changed. Although WEP also supports
passphrases, it does so only as a way to more easily create static keys, which are usually
composed of the hex characters 0-9 and A-F.
WPA2-Enterprise
WPA2-Enterprise requires a RADIUS server, which handles the task of authenticating
network user’s access. The actual authentication process is based on the 802.1X policy and
comes in several different systems labeled EAP.
There are just a few components that are needed to make WPA2-Enterprise work. Realistically,
if you already have access points and some spare server space, you possess all the hardware
needed to make it happen.
WPA3-PSK
It is important to know the threats that are most prevalent in order to be able to implement the
proper security measures.
MAN-IN-THE-MIDDLE ATTACKS
A man-in-the-middle (MITM) attack is an incredibly dangerous type of cyber-attack that
involves a hacker infiltrating a private network by impersonating a rogue access point and
acquiring login credentials.
The attacker sets up hardware pretending to be a trusted network, namely Wi-Fi, in order
to trick unsuspecting victims into connecting to it and sending over their credentials. MITM
attacks can happen anywhere, as devices connect to the network with the strongest signal, and
will connect to any SSID name they remember.
Computer Ethics
The Ten Commandments of computer ethics have been defined by the Computer Ethics
Institute.
1) Thou shalt not use a computer to harm other people:
2) Thou shalt not interfere with other people's computer work:
3) Thou shalt not snoop around in other people's files:
4) Thou shalt not use a computer to steal:
5) Thou shalt not use a computer to bear false witness:
6) Thou shalt not use or copy software for which you have not paid:
7) Thou shalt not use other people's computer resources without authorization:
8) Thou shalt not appropriate other people's intellectual output:
9) Thou shalt think about the social consequences of the program you write:
10) Thou shalt use a computer in ways that show consideration and respect:
Cybersecurity
Cybersecurity is the state or process of protecting and recovering computer systems,
networks, devices, and programs from any type of cyber-attack. Cyber-attacks are an
increasingly sophisticated and evolving danger to your sensitive data, as attackers employ new
methods powered by social engineering and artificial intelligence to circumvent traditional data
security controls.
The fact of the matter is the world is increasingly reliant on technology and this reliance will
continue as we introduce the next generation of new technology that will have access to our
connected devices via Bluetooth and Wi-Fi.
To keep customer data protected while embracing new technology, intelligent cloud security
solutions should be implemented to prevent unauthorized access and encourage the use of strong
passwords.
The fact of the matter is whether you are an individual, small business or large multinational, you
rely on computer systems every day. Pair this with the rise in cloud services, poor cloud service
security, smartphones and the Internet of Things (IoT) and we have a myriad of cybersecurity
threats that didn't exist a few decades ago. We need to understand the difference between
cybersecurity and information security, even though the skillsets are becoming more similar.
Governments around the world are bringing more attention to cybercrimes. GDPR is a great
example. It has increased the reputational damage of data breaches by forcing all organizations
that operate in the EU to:
California was the first state to regulate data breach disclosures in 2003, requiring persons or
businesses to notify those affected "without reasonable delay" and "immediately following
discovery". Victims can sue for up to $750 and companies can be fined up to $7,500 per victim.
This has driven standards boards like the National Institute of Standards and Technology (NIST)
to release frameworks to help organizations understand their security risks, improve
cybersecurity measures, and prevent cyber-attacks.
But it's not the only target. Industrial controls that manage power grids and other infrastructure
can be disrupted or destroyed. And identity theft isn't the only goal, cyber-attacks may aim to
compromise data integrity (destroy or change data) to breed distrust in an organization or
government.
Cybercriminals are becoming more sophisticated, changing what they target, how they affect
organizations and their methods of attack for different security systems.
Social engineering remains the easiest form of cyber-attack with ransomware, phishing, and
spyware being the easiest form of entry. Third-party and fourth-party vendors who process your
data and have poor cybersecurity practices are another common attack vector, making vendor
risk management and third-party risk management all the more important.
According to the Ninth Annual Cost of Cybercrime Study from Accenture and the Ponemon
Institute, the average cost of cybercrime for an organization has increased by $1.4 million over
the last year to $13.0 million and the average number of data breaches rose by 11 percent to 145.
Information risk management has never been more important.
Data breaches can involve financial information like credit card numbers or bank account details,
protected health information (PHI), personally identifiable information (PII), trade secrets,
intellectual property and other targets of industrial espionage. Other terms for data breaches
include unintentional information disclosure, data leak, cloud leak, information leakage or a data
spill.
Economic costs
Theft of intellectual property, corporate information, disruption in trading and the cost of
repairing damaged systems
Reputational cost
Loss of consumer trust, loss of current and future customers to competitors and poor media
coverage
Regulatory costs
GDPR and other data breach laws mean that your organization could suffer from
regulatory fines or sanctions as a result of cybercrimes
All businesses, regardless of the size, must ensure all staff understand cybersecurity threats and
how to mitigate them. This should include regular training and a framework to work with to that
aims to reduce the risk of data leaks or data breaches.
Given the nature of cybercrime and how difficult it can be to detect, it is difficult to understand
the direct and indirect costs of many security breaches. This doesn't mean the reputational
damage of even a small data breach or other security event is not large. If anything, consumers
expect increasingly sophisticated cybersecurity measures as time goes on.
Information Privacy
Information privacy is the privacy of personal information and usually relates to personal
data stored on computer systems.
The need to maintain information privacy is applicable to collected personal information,
such as medical records, financial data, criminal records, political records, business related
information or website data. Information privacy is also known as data privacy.
Data privacy, also called information privacy, is the aspect of information technology
(IT) that deals with the ability an organization or individual has to determine what data in a
computer system can be shared with third parties.
Integrity
Consistency includes protection against unauthorized changes (additions, deletions,
alterations, etc.) to data. The principle of integrity ensures that data is accurate and reliable and is
not modified incorrectly, whether accidentally or maliciously.
Availability
Availability is the protection of a system’s ability to make software systems and data
fully available when a user needs it (or at a specified time). The purpose of availability is to
make the technology infrastructure, the applications and the data available when they are needed
for an organizational process or for an organization’s customers.
Information security differs from cybersecurity in both scope and purpose. The two terms
are often used interchangeably, but more accurately, cybersecurity is a subcategory of
information security. Information security is a broad field that covers many areas such as
physical security, endpoint security, data encryption, and network security. It is also closely
related to information assurance, which protects information from threats such as natural
disasters and server failures.
Cybersecurity primarily addresses technology-related threats, with practices and tools
that can prevent or mitigate them. Another related category is data security, which focuses on
protecting an organization’s data from accidental or malicious exposure to unauthorized parties.
Social Engineering
Social engineering involves attackers sending emails and messages that trick users into
performing actions that may compromise their security or divulge private information. Attackers
manipulate users using psychological triggers like curiosity, urgency or fear.
Because the source of a social engineering message appears to be trusted, people are more likely
to comply, for example by clicking a link that installs malware on their device, or by providing
personal information, credentials, or financial details.
Organizations can mitigate social engineering by making users aware of its dangers and training
them to identify and avoid suspected social engineering messages. In addition, technological
systems can be used to block social engineering at its source, or prevent users from performing
dangerous actions such as clicking on unknown links or downloading unknown attachments.
Malware on Endpoints
Organizational users work with a large variety of endpoint devices, including desktop
computers, laptops, tablets, and mobile phones, many of which are privately owned and not
under the organization’s control, and all of which connect regularly to the Internet.
A primary threat on all these endpoints is malware, which can be transmitted by a variety of
means, can result in compromise of the endpoint itself, and can also lead to privilege escalation
to other organizational systems.
Traditional antivirus software is insufficient to block all modern forms of malware, and more
advanced approaches are developing to securing endpoints, such as endpoint detection and
response (EDR).
Lack of Encryption
Encryption processes encode data so that it can only be decoded by users with secret
keys. It is very effective in preventing data loss or corruption in case of equipment loss or theft,
or in case organizational systems are compromised by attackers.
Unfortunately, this measure is often overlooked due to its complexity and lack of legal
obligations associated with proper implementation. Organizations are increasingly adopting
encryption, by purchasing storage devices or using cloud services that support encryption, or
using dedicated security tools.
Security Misconfiguration
Modern organizations use a huge number of technological platforms and tools, in
particular web applications, databases, and Software as a Service (SaaS) applications, or
Infrastructure as a Service (IaaS) from providers like Amazon Web Services.
Enterprise grade platforms and cloud services have security features, but these must be
configured by the organization. Security misconfiguration due to negligence or human error can
result in a security breach. Another problem is “configuration drift”, where correct security
configuration can quickly become out of date and make a system vulnerable, unbeknownst to IT
or security staff.
Organizations can mitigate security misconfiguration using technological platforms that
continuously monitor systems, identify configuration gaps, and alert or even automatically
remediate configuration issues that make systems vulnerable.
Active Attack
An active attack involves intercepting a communication or message and altering it for malicious
effect. There are three common variants of an active attacks:
Passive Attack
In a passive attack, an attacker
monitors, monitors a system and
illicitly copies information without
altering it. They then use this
information to disrupt networks or
compromise target systems.
The attackers do not make any
change to the communication or
the target systems. This makes it
more difficult to detect. However,
encryption can help prevent
passive attacks because it
obfuscates the data, making it
more difficult for attackers to
make use of it.