Csi 12
Csi 12
Csi 12
SECURITY AND
ETHICAL ISSUES
Subtitle
Content
12.1 Introduction
12.2 Confidentiality
12.3 Ethical Principles
12.4 Privacy
12.5 Hackers
Objectives
Define a database and a database management system (DBMS) and describe the components of a DBMS.
Define the three traditional database models: hierarchical, networking, and relational.
Define ERM and E-R diagrams and explain the entities and relationships in this model.
Define the hierarchical levels of normalization and understand the rationale for normalizing the relations.
We are living in the information age. We need to keep information about every
aspect of our lives. In other words, information is an asset that has a value like any
other asset. As an asset, information needs to be secured from attacks.
To be secure, information needs
to be hidden from unauthorized access (confidentiality),
protected from unauthorized change (integrity),
and available to an authorized entity when it is needed (availability).
2. Security goals
ITU-T defines some security services to achieve security goals and prevent attacks.
Each of these services is designed to prevent one or more attacks while maintaining
security goals. Two techniques are below
Cryptography (general) Steganography (specific)
Although in the past cryptography referred The word steganography, with origins in
only to the encryption and decryption of Greek, means ‘covered writing’, in
messages using secret keys.
contrast to cryptography, which means
‘secret writing’..
2- CONFIDENTIALITY
1. Symmetric-key ciphers
A symmetric-key cipher uses the same key for both encryption and decryption, and
the key can be used for bidirectional communication, which is why it is called
symmetric. Figure 16.2 shows the general idea behind a symmetric-key cipher.
Symmetric- and asymmetric-key ciphers will exist in parallel and continue to serve
the community.
In symmetric-key cryptography, the secret must be shared between two persons. In
asymmetric-key cryptography, the secret is personal (unshared); each person
creates and keeps his or her own secret.
Compare between two system :
And
3. General idea
Figure 12.3 shows the general idea of asymmetric-key cryptography as used for
encipherment.
One of the ways to evaluate our responsibility towards the rest of the world when using a computer is to
base our decisions on ethics.
Ethics is a very complex subject that would take several books to describe in detail. In this chapter, we
discuss only three principles that can be related to our goal, shown in Figure 12.5.
The second theory of ethics is related to the consequences of the act. An act is
ethical if it results in consequences which are useful for society.
Example: If a person accesses a bank’s computer and erases customer records, is
this act useful for society? Since this action may damage the financial status of the
bank’s customer, it is detrimental to society. It does not bring about a good result.
It is not ethical.
4. Social contract
Today, a large amount of personal information about a citizen is collected by private and public
agencies. Although in many cases the collection of this information is necessary, it may also pose
some risks.
Some of the information collected by government or private companies can be used commercially. In
many countries, a citizen’s right to privacy is, directly or indirectly, mentioned in the nation’s
constitution.
Codes of ethics related to the use of computers to collect data, as shown below:
The word hacker today has a different meaning than when it was used in the past.
Previously, a hacker was a person with a lot of knowledge who could improve a
system and increase its capability.
Today, a hacker is someone who gains unauthorized access to a computer
belonging to someone else in order to copy secret information.
Black Hat Hacker Basically, these are the “bad guys”. They are the types of hackers who
break into computer networks with purely negative motives such as monetary gain or
reputation.
White Hat Hacker As opposed to the black hat, these are the “good guys”. They are
ethical hackers who create algorithms to break existing internet networks so as to solve
the loopholes in them.
Grey Hat Hacker Basically, these are hackers who exploit the internet systems only to
make public, certain vast datasets of information that would be of benefit to everyone.
Blue Hat Hacker In one word, this is the amateur. Usually, their techniques are deployed
out of ill motives such as revenge attacks.
Red Hat Hacker The objective of a red hat hacker is to find black hat hackers, intercept
and destroy their schemes.
Green Hat Hacker This is the set of individuals who simply want to observe and learn
about the world of hacking. It comprises those who join learning communities to watch
videos and tutorials about hacking.
3. Common types of hacking
Hacking for financial gain Lone black hat hackers as well as hacking collectives are
typically thieves. Their cybercrimes are targeted at either directly stealing money,
enabling later theft via data hijacking, or selling the acquired data to other
cybercriminals.
Corporate espionage With so many industries as cutthroat as they are, it’s
unsurprising that companies are often willing to get dirty to triumph over the
competition. Corporate (or industrial) espionage is the commercial application of
hacking, malware, phishing, and other unsavory spying techniques to obtain privileged
insider information from a business competitor — aka information hacking.
State-sponsored hacking The potential rewards from security hacking can be so great,
even governments want to get in on the party. Countries all across the world are
constantly playing games of cat-and-mouse cyber warfare with one another. Everyone
knows that everyone else is doing it, and everyone acts surprised and offended when
they get caught.