1 / 46

Chapter 6: Computer and Network Security

Chapter 6: Computer and Network Security. Ethics for the Information Age BA 28. Chapter Overview. Introduction Viruses, worms, and Trojan horses Phreaks and hackers Denial-of-service attacks Online voting. 6.2 Viruses, Worms, and Trojan Horses. Viruses.

annettes
Download Presentation

Chapter 6: Computer and Network Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Chapter 6: Computer and Network Security Ethics for the Information Age BA 28

  2. Chapter Overview Introduction Viruses, worms, and Trojan horses Phreaks and hackers Denial-of-service attacks Online voting

  3. 6.2 Viruses, Worms, and Trojan Horses

  4. Viruses Virus: piece of self-replicating code embedded within another program (host) Viruses associated with program files Hard disks, floppy disks, CD-ROMS Email attachments How viruses spread Diskettes or CDs Email Files downloaded from Internet

  5. How a Virus Replicates

  6. Email Attachment with Possible Virus

  7. How an Email Virus Spreads

  8. History of Viruses Well-known viruses Brain Michelangelo Melissa Love Bug Viruses today Good news: Commercial antivirus software Bad news: Few people keep up-to-date. It can be costly for upgrading and time consuming for disk cleanup.

  9. Worms Worm Self-contained program Spreads through a computer network Exploits security holes in networked computers Famous worms WANK Code Red Sapphire (Slammer) Blaster Sasser

  10. How a Worm Spreads

  11. Three Kinds of Buffer Overflow Attack

  12. Conficker (Downadup) Worm Appeared on Windows computers in November 2008 Uses a buffer overflow attack to spread to new computers Particularly difficult to eradicate Rate of new infections roughly the same as rate of eradications

  13. The Internet Worm Robert Tappan Morris, Jr. Graduate student at Cornell Released worm onto Internet from MIT computer Effect of worm Spread to 6,000 Unix computers Infected computers kept crashing or became unresponsive Took a day for fixes to be published Impact on Morris Suspended from Cornell 3 years’ probation + 400 hours community service $150,000 in legal fees and fines

  14. Ethical Evaluation Kantian evaluation Morris used others by gaining access to their computers without permission Social contract theory evaluation Morris violated property rights of organizations Utilitarian evaluation Benefits: Organizations learned of security flaws Harms: Time spent by those fighting worm, unavailable computers, disrupted network traffic, Morris’s punishments Morris was wrong to have released the Internet worm

  15. Trojan Horses Trojan horse: program with benign capability that masks a sinister purpose Remote access Trojan: Trojan horse that gives attack access to victim’s computer Back Orifice SubSeven RAT servers often found within files downloaded from erotica/porn Usenet sites

  16. Bot Networks Bot: A software program that responds to commands from a program on another computer Some bots support legitimate activities Internet Relay Chat Multiplayer Internet games Other bots support illegitimate activities Distributing spam Collecting person information for ID theft Distributed denial-of-service attacks

  17. Defensive Measures System administrators play key role Authorization: determining that a user has permission to perform a particular action Authentication: determining that people are who they claim to be Firewall: a computer monitoring packets entering and leaving a local area network

  18. 6.3 Phreaks and Hackers

  19. Hackers (original meaning) Original meaning of Hackers: Explorer Risk-taker Technical virtuoso What is the Hacker ethic? (In a nutshell) Hands-on imperative Free exchange of information Mistrust of authority Value skill above all else Optimistic view of technology

  20. Steve Russell Invented First Video Game, Then Gave It Away Steve Russell was a “hacker” in every sense of the word. He was considered a “hero” of the Computer Revolution, Stewart Nelson was also considered a “hero hacker” for his role in modifying the hardware of the PDP-1. But were either of these men ethical in their actions? Did they start a firestorm? Computer History Museum

  21. Hackers (Evolved meaning) Meaning of “hacker” changed Movie WarGames Teenagers accessing corporate or government computers Dumpster diving Social engineering Malicious acts Destroying databases Stealing confidential personal information

  22. Phone Phreaking Phone phreak: someone who manipulates phone system to make free calls Most popular methods Steal long-distance telephone access codes Guess long-distance telephone access codes Use a “blue box” to get free access to long-distance lines Access codes posted on “pirate boards”

  23. U.S. v. Riggs Riggs and Neidorf arrested Charged with wire fraud Interstate transportation of stolen property valued at $79,449 Computer fraud Riggs pleaded guilty to wire fraud; went to federal prison Neidorf pleaded not guilty Defense showed similar info being sold for < $25 Prosecution moved to dismiss charges

  24. Steve Jackson Games Steve Jackson Games (SJG) published role-playing games and operated BBS Loyd Blankenship Key SJG employee LOD member Published E911 document on his own BBS Secret Service raided SJG and seized computers, looking for copy of E911 Document Led to creation of Electronic Frontier Foundation (EFF) EFF backed successful SJG lawsuit of Secret Service

  25. Retrospective Parallels between hackers and those who download MP3 files Establishment overvalues intellectual property Use of technology as a “joy ride” Breaking certain laws considered not that big a deal Parallels between response of Secret Service and response of RIAA Cyberspace is real Those who break the law can be identified Illegal actions can have severe consequences

  26. Penalties for Hacking Examples of illegal activities Accessing without authorization any Internet computer Transmitting a virus or worm Trafficking in computer passwords Intercepting a telephone conversation, email, or any other data transmission Accessing stored email messages without authorization Adopting another identity to carry out an illegal activity Maximum penalty: 20 years in prison + $250,000 fine Question: Is it worth it????

  27. 6.4 Denial-of-Service Attacks Denial-of-service attack: an intentional action designed to prevent legitimate users from making use of a computer service Goal of attack: disrupt a server’s ability to respond to its clients About 4,000 Web sites attacked each week Asymmetrical attack that may prove popular with terrorists

  28. Attacks that Consume Scarce Resources SYN flood attack Smurf attack Fill target computer’s hard disk Email bombing Worm Break-in followed by file copying

  29. How a SYN Flood Attack Works

  30. How a Smurf Attack Works

  31. Defensive Measures Physical security of server Benchmarking Disk quota systems Disabling unused network services Turning off routers’ amplifier network capability

  32. Distributed Denial-of-Service Attacks Attacker gains access to thousands of computers Launches simultaneous attack on target servers Defensive measures Secure computers to prevent hijackings Check for forged IP addresses

  33. The Rise and Fall of Blue Security Part I: The Rise Blue Security: An Israeli company selling a spam deterrence system Blue Frog bot would automatically respond to each spam message with an opt-out message Spammers started receiving hundreds of thousands of opt-out messages, disrupting their operations 6 of 10 of world’s top spammers agreed to stop sending spam to users of Blue Frog

  34. The Rise and Fall of Blue Security Part II: The Fall One spammer (PharmaMaster) started sending Blue Frog users 10-20 times more spam PharmaMaster then launched DDoS attacks on Blue Security and its business customers Blue Security could not protect its customers from DDoS attacks and virus-laced emails Blue Security reluctantly terminated its anti-spam activities

  35. Fourth of July Attacks 4th of July weekend in 2009: DDoS attack on governmental agencies and commercial Web sites in United States and South Korea Attack may have been launched by North Korea in retaliation for United Nations sanctions

  36. Attacks on Twitter and Other Social Networking Sites Massive DDoS attack made Twitter service unavailable for several hours on August 6, 2009 Three other sites attacked at same time: Facebook, LiveJournal, and Google All sites used by a political blogger from the Republic of Georgia Attacks occurred on first anniversary of war between Georgia and Russia over South Ossetia

  37. SATAN Security Administrator Tool for Analyzing Networks (SATAN) Allows administrators to test their systems Could be used to probe other computers Critics worried SATAN would turn unskilled teenagers into hackers That never happened

  38. 6.5 Online Voting

  39. Motivation for Online Voting 2000 U.S. Presidential election closely contested Florida pivotal state Most Florida counties used keypunch voting machines Two voting irregularities traced to these machines Hanging chad “Butterfly ballot” in Palm Beach County

  40. The Infamous “Butterfly Ballot” AP/Wideworld Photos

  41. Benefits of Online Voting More people would vote Votes would be counted more quickly No ambiguity with electronic votes Cost less money Eliminate ballot box tampering Software can prevent accidental over-voting Software can prevent under-voting

  42. The following are REAL issues that surround the on-line voting debate.

  43. Risks of Online Voting Gives unfair advantage to those with home computers More difficult to preserve voter privacy More opportunities for vote selling Obvious target for a DDoS attack Security of election depends on security of home computers Susceptible to vote-changing virus or RAT Susceptible to phony vote servers No paper copies of ballots for auditing or recounts

  44. Utilitarian Analysis Suppose online voting replaced traditional voting Benefit: Time savings Assume 50% of adults actually vote Suppose voter saves 1 hour by voting online Average pay in U.S. is $18.00 / hour Time savings worth $9 per adult American Harm of DDoS attack difficult to determine What is probability of a DDoS attack? What is the probability an attack would succeed? What is the probability a successful attack would change the outcome of the election?

  45. Kantian Analysis The will of each voter should be reflected in that voter’s ballot The integrity of each ballot is paramount Ability to do a recount necessary to guarantee integrity of each ballot There should be a paper record of every vote Eliminating paper records to save time and/or money is wrong

  46. Conclusions Existing systems are highly localized Widespread tainting more possible with online system No paper records with online system Evidence of tampering with online elections Relying on security of home computers means system vulnerable to fraud Strong case for not allowing online voting

More Related