Lecture 3b Security
Lecture 3b Security
Company data
Personal information in company files
Computer Crime
Social engineering
Con artist – persuade others to give away their
passwords over the phone
Electronic pickpockets
Use computers to transfer or change assets to their
advantage
Computer Crime
Frequently Reported Crimes
• Credit-card fraud
– Numbers captured and used fraudulently
• Data communications fraud
– Piggyback on someone else’s network
– Office network for personal purposes
– Computer-directed diversion of funds
• Unauthorized access to computer files
– Accessing confidential employee records
– Theft of trade secrets and product pricing
• Unlawful copying of copyrighted software
– Casual sharing of copyrighted software
– Assembly-line copying
Computer Crimes
• Bomb
– Program to trigger damage
– Scheduled to run at a later date
– May be found in software for general public, especially shareware
• Data diddling
– Changing data before or as it enters the system
• Denial of service attack (DOS)
– Hackers bombard a site with more request for service than it can
possible handle
– Prevents legitimate users from accessing the site
– Appearance of requests coming from many different sites
simultaneously
Computer Crimes
• Piggybacking
– Original user does not sign off properly
– Intruder gains accesses to files via the original user id
• Salami technique
– Embezzlement
• Scavenging
– Search garbage and recycling bins for personal information
Computer Crimes
• Trapdoor
– Illicit program left within a completed legitimate program
– Permits unauthorized and unknown entry to the program
• Trojan horse
– Illegal instructions placed inside a legitimate program
– Program does something useful and destructive at the same time
• Zapping
– Software to bypass security systems
Computer Crimes
• Discovery
– Difficult
– Accidental
– 85% of computer crimes are never reported
• Prosecution
– Legal representatives lack technical knowledge
to understand the crime
Computer Crime
Discovery and Prosecution
Computer Forensics
Uncovering computer-stored information suitable for legal use
Security
System of safeguards designed to protect a computer
system and data from deliberate or accidental damage
What You Do
• Verify signature – software verifies scanned and
online signatures
Security
Identification and Access
What You Are
• Biometrics – science of measuring individual
body characteristics
• Fingerprints
• Voice pattern
• Retina of the eye
• Entire face
Security
Identification and Access
• Internal controls
– Transaction log
• Auditor checks
– Who has accessed data during periods when that data is
not usually used?
– Off-the-shelf software to access the validity and
accuracy of the system’s operations and output
Security
Identification and Access
• Secured waste
– Shredders
– Locked trash barrels
• Applicant screening
– Verify the facts on a resume
– Background checks
• Built-in software protection
– Record unauthorized access attempts
– User profile
Security
Software Security
Ownership
• Company if programmer is employee
• Contractual agreement if the programmer is not an
employee
• Software can be copyrighted
Security
The Internet
Firewall
Dedicated computer that
governs interaction
between internal network
and the Internet
Encryption
Data Encryption Standard
(DES)
Security
Personal Computers
• Physical security with locks and cables
• Surge protector
• Uninterruptible power supply (UPS)
• Backup files regularly and systematically
Disaster Recovery
Hardware loss
• Can be replaced
• Temporarily diminished processing ability
Software loss
• Industry standard – make backups of program files
Disaster Recovery
Data loss
• Reassemble records
– Customer information
– Accounting data
– Design information
• Major costs and time
Disaster Recovery Plan
Methods Media
Full backup Diskette
Differential backup Tape
Zip disk
Incremental backup CD-R / CR-RW
DVD-RAM
Mirrored hard drive
Pests
• Rare
• Transfers over a network
• Plants as a separate file on the target’s
computer
Viruses
• Digital vandalism
Viruses
Vaccine or antivirus
• Stops the spread of and eradicates the virus
• Install software
• Download signature files regularly
Viruses
• Retrovirus
– Fights the vaccine and may delete the antivirus
software
• Costs
– Billions of dollars a year
– Aggravation to individual users
Virus Transmission
Networks
Diskettes
Virus
Getting Infected
• Executing the virus program
• Booting from a diskette containing an infected boot
sector including accidentally leaving a “non-system
disk” in the floppy drive
• Downloading an infected file and executing it
• Opening an infected e-mail attachment
• By viewing e-mail in some versions of Microsoft
Outlook
Virus
Precautions
• Be wary of free software from the Internet or friends
• Only install programs from diskettes in sealed
packages
• Use virus-scanning software to check any file or
document before loading it onto your hard disk
Privacy
• Where is my data?
• How is it used?
• Who sees it?
• Is anything private anymore?
P3P
Platform for Privacy Preference Project
• Standards proposed by the World Wide Web
Consortium (W3C)
– User sets privacy preferences
– Web server transmits privacy policies
– Software determines if web site meets users’
requirements
• Participation by web site is voluntary
Junk e-mail