Computer Security and Safety, Ethics, and Privacy
Computer Security and Safety, Ethics, and Privacy
Companies and individuals requiring assistance or information about Internet security braches can contact or visit the Web site for the Computer Emergency Response Team Coordination Center, or CERT/CC, which is a federally funded Internet security research and development center.
Infected computers can suffer from one or more of the following symptoms:
OS running slower Less available memory Corrupted files Unusual messages or images Unusual sounds playing Existing programs and files disappear Programs or files not working properly Unusual programs or files appear OS does not start up or unexpectedly shuts down
Methods that guarantee a computer or network is safe from computer viruses and other malware simply do not exist. Do not start a computer with removable media inserted in the drives.
If you must start the computer with removable media, be certain it is from a trusted source, which is an organization or person you believe will not send a virus.
Never open an e-mail attachment unless you are expecting the attachment and it is from a trusted source.
In extreme cases, you may need to reformat the hard disk to remove malware from an infected computer. Stay informed about new virus alerts and virus hoaxes. A virus hoax is an e-mail message that warns users of a nonexistent virus or other malware.
They come in the form of chain mail and inform users to delete an important system file claiming it is malware.
Botnets
A botnet is a group of compromised computers connected to a network such as the Internet that are used as part of a network that attacks other networks. A compromised computer, known as a zombie, is one whose owner is unaware the computer is being controlled remotely by an outsider. A bot is a program that performs a repetitive task on a network. Cybercriminals install malicious bots on unprotected computers to create a botnet, also called a zombie army.
A denial of service attack, or DoS attack, is an assault whose purpose is to disrupt computer access to an Internet service such as the Web or e-mail. This is done by flooding a victim computer with confusing data messages, thus making it unresponsive. A DDoS (distributed DoS) attack, is more devastating, in which a zombie army is used to attack computers or computer networks.
Back Doors
A back door is a program or set of instructions in a program that allow users to bypass security controls when accessing a program, computer, or network. Some malware will install a back door once it infects the victim computer.
Spoofing
Spoofing is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network. E-mail spoofing occurs when the senders address or other components of the e-mail header are altered so that it appears the e-mail originated from a different sender. IP spoofing occurs when an intruder computer fools a network into believing its IP address is associated with a trusted source.
Some of the latest antivirus programs include provisions to protect a computer form DoS and DDoS attacks. Users can also implement firewall solutions, install intrusion detection software, and set up honeypots.
Firewalls
A firewall is a hardware and/or software that protects a networks resources from intrusion by users on another network such as the Internet. A proxy server is a server outside the organizations network that controls which communications pass into the organizations network. A personal firewall is a utility program that detects and protects a personal computer and its data from unauthorized intrusions.
Intrusion detection software automatically analyzes all network traffic, assesses system vulnerabilities, identifies any unauthorized intrustions, and notifies network admins.
Honeypots
A honeypot is a vulnerable computer that is set up to entice an intruder to break into it. They appear real to the intruder but are separated from the organizations network. They are used to learn how intruders are exploiting their network.
Unauthorized access is the use of a computer or network without permission. Unauthorized use is the use of a computer or its data for unapproved or possibly illegal activities. At a minimum, organizations should have a written acceptable use policy (AUP) that outlines the computer activities for which the computer and network may and may not be used.
Possessed Objects
A possessed object is any item that you must carry to gain access to a computer or computer facility (badges, cards, keys). A personal identification number (PIN) is a numeric password, either assigned by a company or selected by a user.
Biometric Devices
A biometric device authenticates a persons identity by translating a personal characteristic, such as a fingerprint, into digital code that is compared with a digital code stored in the computer verifying a physical or behavioral characteristic.
Ex. Biometric payment is used, where a customers fingerprint is read and their account is charged.
Digital Forensics
Digital forensics, also called computer forensics, network forensics, or cyberforensics, is the discovery, collection, and analysis of evidence found on computers and networks.
Software Theft
Software theft occurs when someone steals software media, intentionally erases programs, illegally copies a program, or illegally registers and/or activates a program. Software piracy is the unauthorized and illegal duplication of copyrighted software. Illegally obtaining registration numbers can be done with keygens, short for key generators.
All owned software media should be stored securely. A license agreement is the right to use the software: you do not own it, you have the right to use it. A single-user license agreement, also called a end-user license agreement (EULA) is the most common license.
Install on one computer, make one backup copy, sell it if it is removed from the computer it is on.
During product activation, which is conducted either online or by telephone, users provide the software products identification number to receive an installation identification number unique to the computer on which the software is installed.
Information Theft
Information theft occurs when someone steals personal or confidential information. It has potential of causing more damage than hardware or software theft. Information transmitted over networks offers a higher degree of risk.
Most organizations attempt to prevent information theft by implementing the user identification and authentication controls discussed earlier.
Encryption
Encryption is a process of converting readable data into unreadable characters to prevent unauthorized access. It is treated like any other data (it can be stored, sent, etc.) To read the data, the recipient must decrypt, or decipher, it into a readable form.
Encryption
The unencrypted, readable data is called plaintext. The encrypted (scrambled) data is called ciphertext. An encryption algorithm, or cypher, is a set of steps that can convert readable plaintext into unreadable ciphertext.
Encryption
An encryption key is a set of characters that the originator of the data uses to encrypt the plaintext and the recipient of the data uses to decrypt the ciphertext. With private key encryption, also called symmetric key encryption, both the originator and the recipient use the same secret key to encrypt and decrypt the data. Public key encryption, also called asymmetric key encryption, uses two encryption keys, a public and a private.
A message generated with a public key can be decrypted only with the private key.
Encryption
Some operating systems and e-mail programs allow you to encrypt the contents of files. Programs such as pretty Good Privacy (PGP) can be used as well. A digital signature is an encrypted code that a person, Web site, or organization attaches to an electronic message to verify the identity of the message sender. It consists of the users name and a hash of all or part of the message, which is a mathematical formula that generates a code from the contents of the message.
Encryption
Many Web browsers offer 40-bit, 128bit, and even 1024-bit encryption, which are even higher levels of protection since they have longer keys. A Web site that uses encryption techniques is known as a secure site, which use digital certificates along with a security protocol.
Digital Certificates
A digital certificate is a notice that guarantees a user or a Web site is legitimate. A certificate authority (CA) is an authorized person or company that issues and verifies digital certificates.
Secure HTTP
Secure HTTP (S-HTTP) allows users to choose an encryption scheme for data that passes between a client and server. It is more difficult than TLS to use, but it is also more secure.
VPN
When a mobile user connects to a main office using a standard Internet connection, a virtual private network (VPN) provides the mobile user with a secure connection to the company network server, as if the user has a private line. They help ensure that data is safe from being intercepted by unauthorized people by encrypting.