Combinepdf 16
Combinepdf 16
-Crime committed using a computer and the internet to steal a person’s identity or illegal imports or
malicious programs.
-Cyber security refers to the technologies and processes designed to protect computers, networks and
data from unauthorized access and attacks delivered via the internet by
cyber criminals.
Categories of Cyber Crime
The computer as a target: Using a computer to attacks other computer (Hacking, Virus/Worms attacks, DoS
attack etc.
The computer as a weapon: Using a computer to commit real world crime e.g. credit card fraud etc.
Why Computer Incidents Are So Prevalent?
• Increasing Complexity Increases Vulnerability
Bring your own device (BYOD) is a business policy that permits, and in some cases encourages, employees
to use their own mobile devices.
In computing, an exploit is an attack on an information system that takes advantage of a particular system
vulnerability.
Why Computer Incidents Are So Prevalent?
•Growing Reliance on Commercial Software with Known Vulnerabilities
-In computing, an exploit is an attack on an information system that takes advantage of a particular system
vulnerability.
-Often this attack is due to poor system design or implementation.
-Once the vulnerability is discovered, software developers create and issue a ―fix,‖ or patch, to eliminate the
problem.
-Previously, the stereotype of a computer troublemaker was that of an introverted ―geek‖ working on his or her
own and motivated by the desire to gain some degree of notoriety.
Why Computer Incidents Are So Prevalent?
• Virus is a piece of programming code, usually disguised as something else, that causes a computer to
behave in an unexpected and usually undesirable manner.
• Worm is a harmful program that resides in the active memory of the computer and duplicates itself.
• Email spam is the use of email systems to send unsolicited email to large numbers of people.
The Controlling the Assault of Non-Solicited Pornography and Marketing (CAN-SPAM) Act states that it is
legal to spam, provided the messages meet a few basic requirement.
CAPTCHA (Completely Automated Public Turing Test to Tell Computers and Humans Apart) software
generates and grades tests that humans can pass and all but the most sophisticated computer programs
cannot.
Types of Exploits
• Distributed denial-of-service (DDoS) attack is one in which a malicious hacker takes over computers via
the Internet and causes them to flood a target site with demands for data and other small tasks.
• Rootkit is a set of programs that enables its user to gain administrator-level access to a computer without
the end user’s consent or knowledge.
• Advanced persistent threat (APT) is a network attack in which an intruder gains access to a network and
stays there—undetected—with the intention of stealing data over a long period of time (weeks or even
months).
Types of Exploits
• Phishing is the act of fraudulently using email to try to get the recipient to reveal personal data.
Spear phishing is a variation of phishing in which the phisher sends fraudulent emails to a certain
organization’s employees.
• Vishing is similar to smishing except that the victims receive a voice-mail message telling them to call a
phone number or access a website.
Types of Exploits
• Cyberespionage involves the deployment of malware that secretly steals data in the computer systems of
organizations, such as government agencies, military contractors, political organizations, and manufacturing
firms.
The Department of Homeland Security (DHS) is a large federal agency with more than 240,000 employees
and a budget of almost $65 billion whose goal is to provide for a ―safer, more secure America, which is resilient
against terrorism and other potential
threats.‖
Common Types of Cybersecurity
Network Security protects network traffic by controlling incoming and outgoing connections to prevent threats
from entering or spreading on the network.
Data Loss Prevention (DLP) protects data by focusing on the location, classification and monitoring of
information at rest, in use and in motion.
Cloud Security provides protection for data used in cloud-based services and applications.
Intrusion Detection Systems (IDS) or Intrusion Prevention Systems (IPS) work to identify potentially hostile
cyber activity.
Common Types of Cybersecurity
Intrusion Detection Systems (IDS) or Intrusion Prevention Systems (IPS) work to identify potentially hostile
cyber activity.
Identity and Access Management (IAM) use authentication services to limit and track employee access to
protect internal systems from malicious entities.
Encryption is the process of encoding data to render it unintelligible, and is often used during data transfer to
prevent theft in transit.
Antivirus/anti-malware solutions scan computer systems for known threats. Modern solutions are even able to
detect previously unknown threats based on their behavior.
Advantage of Cybersecurity
• It will defend us from hacks and virus. It helps us to browse the safe website.
• Internet Security process all the incoming and outgoing data on our computer.
• The application of cyber security used in our PC needs update every week.
• The security developers will update their database every week once.
Module 5B
–Know the actions must be taken in the event of a successful security intrusion.
The CIA Security TRIAD
•The IT security practices of organizations worldwide are focused on ensuring confidentiality, maintaining
integrity, and guaranteeing the availability of systems and data.
•Confidentiality ensures that only those individuals with the proper authority can
access sensitive data such as employee personal data, customer and product sales data, and new product and
advertising plans.
•Integrity ensures that data can only be changed by authorized individuals so that the accuracy, consistency,
and trustworthiness of data are guaranteed.
• Availability ensures that the data can be accessed when and where needed, including during times of both
normal and disaster recovery
operations.
•Confidentiality, integrity, and availability are referred to as the CIA security triad.
Implementing CIA at the Organization Level
•Implementing CIA begins at the organization level with the definition of an overall security strategy,
performance of a risk assessment, laying out plans for disaster recovery, setting security policies, conducting
security audits, ensuring regulatory standards compliance, and creating a security dashboard.
-Security Strategy
•Implementing CIA security at the organization level requires a risk-based security strategy with an active
governance process to minimize the potential impact of any security incident and to ensure business continuity
in the event of a cyberattack.
• Creating such a strategy typically begins with performing a risk assessment to identify and prioritize the threats
that the organization faces.
• The security strategy must define a disaster recovery plan that ensures the availability of key data and
information technology assets.
Implementing CIA at the Organization Level
-Risk assessment
•is the process of assessing security-related risks to an organization’s computers and networks from both
internal and external threats.
• Such threats can prevent an organization from meeting its key business objectives.
•The goal of risk assessment is to identify which investments of time and resources will best protect the
organization from its most likely and serious threats.
-Disaster Recovery
•Data availability requires implementing products, services, policies, and procedures that ensure that data are
accessible even during disaster recovery operations.
•To accomplish this goal, organizations typically implement a disaster recovery plan, which is a documented
process for recovering an organization’s business information system assets—including hardware, software,
data, networks, and facilities—in the event of a disaster.
Implementing CIA at the Organization Level
-Security Policies
•A security policy defines an organization’s security requirements, as well as the controls and sanctions needed
to meet those requirements. A good security policy delineates responsibilities and the behavior expected of
members of the organization.
• A security policy outlines what needs to be done but not how to do it. The details of how to accomplish the
goals of the policy are typically provided in separate documents and procedure guidelines.
•Another important prevention tool is a security audit that evaluates whether an organization has a well-
considered security policy in place and if it is being followed.
•For example, if a policy says that all users must change their passwords every 30 days, the audit must check
how well that policy is being implemented.
• The audit should also review who has access to particular systems and data and what level of authority each
user has.
•In addition to the requirement to comply with your own security program, your organization may also be
required to comply with one or more standards defined by external parties.
•In that case, your organization’s security program must include a definition of what
those standards are and how the organization will comply.
Implementing CIA at the Organization Level
-Security Dashboard
•Many organizations use security dashboard software to provide a comprehensive display of all key
performance indicators related to an organization’s security defenses, including threats, exposures, policy
compliance, and incident alerts.
•The purpose of a security dashboard is to reduce the effort required to monitor and identify threats in time to
take action.
Implementing CIA at the Network Level
•The Internet provides a wide-open and well-travelled pathway for anyone in the world to reach your
organization’s network.
• As a result, organizations are continuing to move more of their business processes to the Internet to better
serve customers, suppliers, employees, investors, and business partners.
-Authentication Methods
To maintain a secure network, an organization must authenticate users attempting to access the network by
requiring them to enter a username and password; inserting a smart card and entering the associated PIN; or
providing a fingerprint, voice pattern sample, or retina scan
Implementing CIA at the Network Level
-Firewall
•Installation of a corporate firewall is the most common security precaution taken by businesses.
•A firewall is a system of software, hardware, or a combination of both that stands guard between an
organization’s internal network and the Internet and limits network access based on the organization’s access
policy.
•A next-generation firewall (NGFW) is a hardware- or software-based network security system that is able to
detect and block sophisticated attacks by filtering network traffic dependent on the packet contents.
Implementing CIA at the Network Level
-Routers
•A router is a networking device that connects multiple networks together and forwards data packets from one
network to another.
• Often, an ISP installs a router in a subscriber’s home to connect the ISP’s network to the network within the
home.
•Routers enable you to create a secure network by assigning it a passphrase so that only individuals who have
the passphrase can connect to your network.
Implementing CIA at the Network Level
•- Encryption
•Encryption is the process of scrambling messages or data in such a way that only authorized parties can read
it.
• It is used to protect billions of online transactions each day, enabling consumers to order more than $300
billion in merchandise online and banks to route some $40 trillion in financial transactions each year.
•An encryption key is a value that is applied (using an algorithm) to a set of unencrypted text (plaintext) to
produce encrypted text that appears as a series of seemingly random characters (ciphertext) that is unreadable
by those without the encryption key needed to decipher it.
•There are two types of encryption algorithms: symmetric and asymmetric. Symmetric algorithms use the
same key for both encryption and decryption.
•Asymmetric algorithms use one key for encryption and a different key for decryption.
Implementing CIA at the Network Level
-Proxy Servers and Virtual Private Networks
•A proxy server serves as an intermediary between a web browser and another server on the Internet that
makes requests to websites, servers, and services on the Internet for you.
•When you enter the URL for a website, the request is forwarded to the proxy server, which relays the request to
the server where the website is hosted. The homepage of the website is returned to the proxy server, which then
passes it on to you.
Implementing CIA at the Network Level
-Intrusion Detection System
•An intrusion detection system (IDS) is software and/or hardware that monitors system and network resources
and activities and notifies network security personnel when it detects network traffic that attempts to circumvent
the security measures of a networked computer environment.
Implementing CIA at the Network Level
-Authentication Methods
•For many applications, users are required to enter a username and password to gain access.
•Two-factor authentication requires the user to provide two types of credential before being able to access an
account; the two credentials can be any of the following:
•Another important safeguard at the application level is the creation of roles and user accounts so that once
users are authenticated, they have the authority to perform their responsibilities and nothing more.
Data Encryption
•Major enterprise systems such as enterprise resource planning (ERP), customer relationship management
(CRM), and product lifecycle management (PLM) access sensitive data residing on data storage devices
located in data centers, in the cloud, or at third-party locations.
Implementing CIA at the End-User Level
-Security Education
•Creating and enhancing user awareness of security policies is an ongoing security priority for companies.
Authentication Methods
•End users should be required to implement a security passcode that must be entered before their
computing/communications device accepts further input.
Implementing CIA at the End-User Level
-Antivirus Software
•Antivirus software should be installed on each user’s personal computer to scan a computer’s memory and
disk drives regularly for viruses.
• Antivirus software scans for a specific sequence of bytes, known as a virus signature, that indicates the
presence of a specific virus.
-Data Encryption
•While you should already have a login password for your mobile computing device or workstation, those
measures won’t protect your data if someone steals your device
Response to Cyberattack
-Incident Notification
•A key element of any response plan is to define who to notify and who not to notify in the event of a computer
security incident.
An organization should document all details of a security incident as it works to resolve the incident.
-Incident Containment
The incident response plan should clearly define the process for deciding if an attack is dangerous enough to
warrant shutting down or disconnecting critical systems from the network.
Response to Cyberattack
-Eradication
Before the IT security group begins the eradication effort, it must collect and log all possible criminal evidence
from the system and then verify that all necessary backups are current, complete, and free of any malware.
-Incident Follow-Up
-An essential part of follow-up is to determine how the organization’s security was compromised so that it does
not happen again.
References
Blundell, B. (2020). Ethics in Computing, Science, and Engineering: A Student’s Guide to Doing Things Right 1st
ed. 2020 Edition: Springer.
Hauptman, R. (2019). The Scope of Information Ethics: Challenges in Education, Technology, Communications,
Medicine and Other Domains: McFarland.
Kizza, J.M. (2019). Ethical and Secure Computing: A Concise Module (Undergraduate Topics in Computer
Science) 2nd ed.:Springer.
Kizza, J.M (2017).Ethical and Social Issues in the Information Age 6th ed: Springer.
.
SOCIAL AND PROFESSIONAL ISSUES
Computer Liability
Intended Learning Outcomes
–Discuss the hardware and software risks involved in the use of computers in society;
• time of failure,
2. Emotional barriers
3. Identity barriers
4. Semantic barriers
5. Accessibility barriers
6. Attention barriers
Based on the data on recent failures of critical systems, the following can be
concluded
• Failures become more and more distributed and often nation-wide (e.g.
commercial systems like credit card denial of authorization).
• The source of failure is more rarely in hardware (physical faults), and more
frequently in system design or end-user operation / interaction (software).
Values in Design
-Solutions to Software Development Problems
Solid Requirements
Clear, complete, detailed, cohesive, attainable, testable requirements that are
agreed to by all players.
Realistic Schedules
Allow adequate time for planning, design, testing, bug fixing, re-testing, changes,
and documentation.
Adequate Testing
Start testing early on, re-test after fixes or changes, plan for adequate time for
testing and bug-fixing.
Values in Design
-Solutions to Software Development Problems
Communication
Require walkthroughs and inspections when appropriate; make extensive use of
group communication tools – groupware, wiki‟s, bug-tracking tools and change
management tools, intranet capabilities
Values in Design
-Solutions to Software Development Problems
Communication
–Discuss the ethical, legal and social issues regarding the risk and responsibility for
public information.
Responsibilities of computing professionals
toward society
• Understand what success means
• Include users (such as medical staff, technicians, pilots, office workers) in the
design and testing stages to provide safe and useful systems
• Do a thorough, careful job when planning and scheduling a project and when
writing bids or contracts
• Whereas a sales clerk should try to satisfy the customer‟s desires, the
professional should try to meet the client‟s needs (consistent with the welfare of
the client and the public).
• Computing professionals usually learn this knowledge and acquire these skills
by earning a baccalaureate degree in computer science, computer engineering,
information systems, or a related field.
Ethics and Professional Responsibility in
Computing
What Is Moral Responsibility in Computing? -In the early 1980s, Atomic
Energy of Canada Limited (AECL) manufactured and sold a cancer radiation
treatment machine called the Therac-25, which relied on computer software to
control its operation. Between 1985 and 1987, the Therac-25 caused the deaths
of three patients and serious injuries to three others.
We can use the Therac-25 case to distinguish between four different kinds of
Responsibility.
Causal responsibility
Responsibility can be attributed to causes: for example, “the tornado was
responsible for damaging the house.” In the Therac-25 case, the proximate
cause of each accident was the operator, who started the radiation treatment.
Ethics and Professional Responsibility in
Computing
Role responsibility
An individual who is assigned a task or function is considered the responsible
person for that role. In this sense, a foreman in a chemical plant may be
responsible for disposing of drums of toxic waste, even if a forklift operator
actually transfers the drums from the plant to the truck.
Legal responsibility
An individual or an organization can be legally responsible, or liable, for a
problem. That is, the individual could be charged with a crime, or the
organization 5 could be liable for damages in a civil lawsuit.
Moral responsibility
Causal, role, and legal responsibilities tend to be exclusive: if one individual is
responsible, then another is not.
Ethics and Professional Responsibility in
Computing
What Are the Responsibilities of Computing Professionals?
Ethical Decisions in
Software Development
Module 7
Module 7A
Software Quality
Intended Learning Outcomes
Software defect
-is any error that, if not removed, could cause a software system
to fail to meet its users’ needs.
Software quality
- the degree to which a software product meets the needs of its
users.
Strategies for Engineering Quality Software
Quality management
-focuses on defining, measuring, and refining the quality of the development
process and the products developed during its various stages.
-A primary cause of poor software quality is that many developers do not know
how to design quality into software from the very start; some simply do not take the
time to do so.
-To develop high-quality software, developers must define and follow a set of
rigorous software engineering principles and be committed to learning from past
mistakes.
The Importance of Software Quality
-A business information system is a set of interrelated components—including
hardware, software, databases, networks, people, and procedures—that collects
and processes data
and disseminates the output.
-Software is also used to control the operation of many industrial and consumer
products.
-As a result of the increasing use of computers and software in business, many
companies are now in the software business whether they like it or not.
Software Product Liability
-The liability of manufacturers, sellers, lessors, and others for injuries caused by
defective products is commonly referred to as product liability.
-If a software defect causes injury or loss to purchasers, lessees, or users of the
product, the injured parties may be able to sue as a result.
-Software product liability claims are typically based on strict liability, negligence,
breach of warranty, or misrepresentation—sometimes in combination with one
another.
-Strict liability means that the defendant is held responsible for injuring another
person, regardless of negligence or intent.
Software Product Liability
-Negligence is the failure to do what a reasonable person would do, or doing
something that a reasonable person would not do.
-If the product fails to meet the terms of its warranty, the buyer or lessee can sue for
breach of warranty.
-Software suppliers frequently write warranties to attempt to limit their liability in the
event of nonperformance.
Quality assurance (QA) - refers to methods within the development process that are designed to guarantee reliable
operation of a product.
Software Testing
-Software is developed in units called subroutines or programs.
-One approach to QA is to test the code for a completed unit of software by actually
entering test data and comparing the results to the expected results in a process
called dynamic testing.
• Black-box testing involves viewing the software unit as a device that has
expected input and output behaviors but whose internal workings are unknown
(a black box).
• White-box testing treats the software unit as a device that has expected input
and output behaviors.
Software Testing
Types of Software Testing
-Safety-critical system is one whose failure may cause human injury or death.
-The key to ensuring that these additional tasks are completed is to appoint a
system safety engineer, who has explicit responsibility for the system’s safety.
Key Issues in Software Development
-The hazard log is used at each stage of the software development process to
assess how it has accounted for detected hazards.
-However, the safety engineer must keep in mind that his or her role is not simply
to produce a hazard log but rather to influence the design of the system to
ensure that it operates safely when put into use.
Key Issues in Software Development
• a risk event
• the probability of the event happening
• the impact (positive or negative) on the business outcome if the risk does
actually occur
1. Acceptance - When the cost of avoiding a risk outweighs the potential loss of a
risk, an organization will likely accept the risk.
3. Mitigation - Risk mitigation involves the reduction in either the likelihood or the
impact of the occurrence of a risk.
Key Issues in Software Development
-ISO 9001 family of standards serves as a guide to quality products, services, and
management.
-Over 1 million organizations in more than 175 countries have ISO 9001
certification.
Quality Management Standards
• Prove to an auditor that it has fulfilled the first two requirements; this proof can
require observation of actual work practices and interviews with customers,
suppliers, and employees.
Quality Management Standards
-Failure mode and effects analysis (FMEA) is an important technique used to
develop ISO 9001-compliant quality systems by both evaluating reliability and
determining the effects of system and equipment failures.
-Failure mode describes how a product or process could fail to perform the desired
functions described by the customer.
References
Blundell, B. (2020). Ethics in Computing, Science, and Engineering: A Student’s Guide to Doing Things
Right 1st ed. 2020 Edition: Springer.
Kizza, J.M. (2019). Ethical and Secure Computing: A Concise Module (Undergraduate Topics in
Computer Science) 2nd ed.:Springer.
Kizza, J.M (2017).Ethical and Social Issues in the Information Age 6th ed: Springer.
Whitmant, M. Mattord, H. (2017). Principles of Information Security 6th Edition: Cengage Learning.
.