Title: ISYS123
1ISYS123
- Security
- Stair Reynolds Chapter 14
2On-line OutlawsComputer Crime
- Computers are used to break laws as well as
uphold them
Some will rob you with a six gun, and some with
a fountain pen. Woody Guthrie
- Computer crime involves
- Theft by computer
- Software piracy and intellectual property laws
- Software sabotage
- Hacking and electronic trespassing
3The Computer Crime Dossier
- Computer crime is defined as any crime
accomplished through knowledge or use of computer
technology - The typical computer criminal is a trusted
employee with no criminal record
4The Computer Crime Dossier
- According to the FBI
- Financial losses topped 120 million in 1999
- More than 60 percentof corporate,
university,and government sitesreport at least
one break-in per year
5Cybercrime Doubles in Three Years
-
- Computer crime in Australia has doubled in
three years and now outstrips the United States - The Australian IT, 21 May 2002
6Reported Cybercrime in Australia
Australian Computer Crime and Security Survey
2002 2002 93 respondents/98
7Theft by Computer
- Theft is the most common form of computer crime
- Computers are usedto steal
- Money
- Goods
- Information
- Computer resources
8Software Sabotage
Sabotage of software can include a Trojan horse,
virus, or worm
- Trojan horse performs a useful task while also
being secretly destructive time bombs are an
example - Virus spreads by making copies of itself from
program to program or disk to disk - Worm a program that travels independently over
computer networks, seeking uninfected sites
Often, all of these are referred to as a virus
9Could I have a Virus?
- Typical symptoms
- Change in file size
- Change in file contents
- Less RAM available
- Unexpected behaviour
- How cant I catch a virus?
- How can I catch a virus?
10Virus Detection Software
- Virus detection software can find and remove most
viruses
- These programs need to be frequently revised
- More than 200 new virus appear each month!
11How does Anti-Virus Software Work?
- Signatures built into the infected file
- The anti-virus trail
- Collect suspicious files
- Identify similar cases
- Work out what the virus does
- Develop disinfection programs
- Add to repertoire
12Hacking and Electronic Trespassing
- In the late 1970s, hackers were people who
enjoyed learning the details of computer systems - Today, hackers (or crackers) refers to people who
break into computer systems - Webjackers hijack Web pages and redirect users to
other sites
13Hacking and Electronic Trespassing
Electronic trespassing
- Breaking into other computer systems is called
electronic trespassing - Electronic crime rings focus on stealing credit
card numbers and other valuable information
14Computer Security Reducing Risks
- Computer crime has led to a need to protect
computer systems - Computer security attemptsto protect computers
and the information they contain - Computer security protectsagainst unwanted
access,damage, modification, or destruction
15Computer Security
A variety of security techniques are used to
protect computer systems
- Physical Access Restrictions
- Passwords
- Firewalls, Encryptions, and Audits
- Backups
- Law, Management, and Ethics
16Physical Access Restrictions
- Physical access restrictions are based on
- Something you have, such as a key, ID card with
photo, or a smart card - Something you know, such as a password, an ID
number, or a piece of personal history - Something you do, such as your signature or your
typing speed and error patterns
17Physical Access Restrictions
- Something about you, such as voice print,
fingerprints, retinal scans, or other
measurements of individual body characteristics
(biometrics)
18Passwords
- Passwords are the most common tool for
restricting access to computer system
- Effective passwords are
- Not real words
- Not names
- Changed frequently
- Kept secret
- A mix of alphabet letters and numbers
19Firewalls, Encryption,and Audits
- These security systems reduce or prohibit the
interception of messages between computers
- Firewalls are like gateways with a lock
- Codes protect transmitted information and take a
special key to decode - Shields are specially developed machines that
prevent unwanted interception
20Firewalls
- The computer serves as a firewall by scanning
every message for security risks before allowing
it to pass into or out of the LAN
Firewall
21Encryption
- To make a message secure from outsiders requires
encryption software - Encryption software scrambles the sent message
using a key - A different key is needed to unscramble the
received message
22Encryption
23Cryptography
- Means of mathematical encoding that converts
messages into a form that is unreadable - An effort to maintain confidentiality of data
24Basic Cryptography
Plain Text
Encryption Algorithm
Key
Cipher Text
Decryption Algorithm
Key
Plain Text
25Symmetric Key Cryptography
- Same key used for
- Encryption
- Decryption
- Key a secret shared by sender and recipient
- Efficient
- Key distribution problem
26Public (Asymmetric) Key Cryptography
- There are two keys
- Public key
- Private key
- Public keys are published
- Private keys are kept secret (you keep your own
private key) - Solves key distribution problem but less
efficient than symmetric cryptography
27Public Key Cryptography
- Example of message encryption
- Adam encrypts the message using Beths public key
- Beth decrypts the message using her private key
- PGP (Pretty Good Privacy) is a popular email
encryption system - http//www.pgp.com/products/freeware/default.asp
28Who Knows The Key
- For symmetric cryptography both participants know
the key
KAB
KAB
B
A
29For asymmetric cryptography
- Each secret key is known only by its owner
- The public keys are known by everybody
KPRIV-B KPUB-A KPUB-b
KPRIV-A KPUB-A KPUB-b
A
B
30Integrity
- Is the message received the one that was sent?
- Checked by
- Do a calculation on message
- Send message and result of calculation
- Recipient redoes calculation
- See if their result matches the one they were
sent - Calculation often done using cryptography
31Digital Signatures
- Part of the point of public key cryptography is
- Tell everyone your public key
- Anyone can encrypt a message to you using that
key - But only you can decrypt it (using private key)
- What if you encrypt something using your private
key? - Well, anyone could decrypt it, so no privacy
32But
- if you send the message and the encryption of it
using your private key - A recipient would know you must have done the
encryption, because nobody else could have - No-one else knows your private key
- This is a digital signature
33Audit-Control Software
- Audit-control software monitors and records
computer activity
- Effective audit-control software forces every
user to leave a trail of electronic footprints
34Backups, Security
- Without backups, there is no security
- What is a backup?
- What do you call it?
- Where do you put it?
- How often do you do it?
35Making Backups
- The best and most widely used method to recover
data is a routine for making regular backups - Many computer systemsare backed up at theend of
each work day
36Human Security Controls
- Security measuresprevent crime, but can also
pose threats to personal privacy - Managers must make employees aware of security
issues and risks
37Security, Privacy, Freedom, Ethics The
Delicate Balance
In this age of advanced technology, thick walls
and locked doors cannot guard our privacy or
safeguard our personal freedom. Lyndon B.
Johnson
38Security, Privacy, Freedom, Ethics The
Delicate Balance
- Active badges can simultaneously improve security
and threaten privacy by
- identifying who enters a door or logs onto
amachine - finding an employees location or where theyhave
been throughout the day
39Rules of ThumbSafe Computing
- Share with care
- Beware of BBS risks
- Dont pirate software
- Disinfect regularly
- Treat diskettes withcare
- Take your password seriously
- Lock sensitive data
- Use backup systems
- Consider encryptionfor Internet activities
- Prepare for the worst
40Security and Reliability
- Computer security involves more than protection
from trespassing, sabotage, and other crimes - Software errors and hardware glitches account for
some of the most important security issues, such
as - Bugs and Breakdowns
- Computers at War
41Bugs and Breakdowns
- Software bugs do more damage than viruses and
computer burglars combined.
- Facts about software engineering
- It is impossible to eliminate all bugs.
- Even programs that appear to work can contain
dangerous bugs. - The bigger the system,the bigger the problem.
42Bugs and Breakdowns
- Computer breakdowns pose a risk to the public and
the incidence doubles every two years. - Hardware problemsare rare whencompared
withsoftware failures
43Computers at War
- Smart weapons are missiles that use computerized
guidance systems to locate their targets. - An autonomous system is a complex system that can
assume almost complete responsibility for a task
without human input.