Unit - 5 (CS)
Unit - 5 (CS)
UNIT
In this chapter we study human controls applicable to computer security: the
legal system and ethics. The legal system has adapted quite well to computer
technology by reusing some old forms of legal protection (copyrights and
patents) and creating laws where no adequate ones existed (malicious access).
Still, the courts are not a perfect form of protection for computer resources, for
two reasons. First, the courts tend to be reactive instead of proactive. That is,
we have to wait for a transgression to occur and then adjudicate it, rather than
try to prevent it in the first place. Second, fixing a problem through the courts
can be time consuming (sometimes taking years) and expensive; the latter
characteristic prevents all but the wealthy from addressing most security issues.
On the other hand, ethics has not had to change, because ethics is more
situational and personal than the law. For example, the privacy of personal
information is becoming an important part of computer security. And although
technically this issue is just an aspect of confidentiality, practically it has a long
history in both law and ethics. The purpose of this chapter is to round out our
study of protection for computing systems by understanding the context in
which security is assessed and applied.
Not always are conflicts resolved pleasantly. Some people will think that they
have been treated unfairly, and some people do indeed act unfairly. In some
countries, a citizen reacts to a wrongful act by going to court. The courts are
seen as the ultimate arbiters and enforcers of fairness. But, as most lawyers will
tell you, the courts' definition of fair may not coincide with yours. Even if you
could be sure the courts would side with you, a legal battle can be emotionally
draining. Our purpose in this section is not only to understand how the legal
UNIT - V 1
[CYBER SECURITY]
system helps protect computer security but also to know how and when to use
the legal system wisely.
Law and computer security are related in several ways. First, international,
national, state, and city laws can affect privacy and secrecy. These statutes often
apply to the rights of individuals to keep personal matters private. Second, laws
regulate the use, development, and ownership of data and programs. Patents,
copyrights, and trade secrets are legal devices to protect the rights of developers
and owners of programs and data. Similarly, one aspect of computer security is
controlling access to programs and data; that access control is supported by
these mechanisms of the law. Third, laws affect actions that can be taken to
protect the secrecy, integrity, and availability of computer information and
service. These basic concerns in computer security are both strengthened and
constrained by applicable laws. Thus, legal means interact with other controls
to establish computer security.
However, the law does not always provide an adequate control. When computer
systems are concerned, the law is slowly evolving because the issues are similar
to but not the same as those for property rights. Computers are new, compared
to houses, land, horses, or money. As a consequence, the place of computer
systems in law is not yet firmly established. As statutes are written and cases
decided, the roles of computers and the people, data, and processes involved
are becoming more defined in the law. However, laws do not yet address all
improper acts committed with computers. Finally, some judges, lawyers, and
police officers do not understand computing, so they cannot determine how
computing relates to other, more established, parts of the law.
The laws dealing with computer security affect programmers, designers, users,
and maintainers of computing systems and computerized data banks. These
laws protect, but they also regulate the behavior of people who use computers.
Furthermore, computer professionals are among the best-qualified advocates
for changing old laws and creating new ones regarding computers. Before
recommending change, however, professionals must understand the current
state of computers and the law. Therefore, we have three motivations for
studying the legal section of this chapter:
to know what protection the law provides for computers and data
UNIT - V 2
[CYBER SECURITY]
Protecting code and data. Copyrights, patents, and trade secrets are all forms
of legal protection that can be applied to programs and, sometimes, data.
However, we must understand the fundamental differences between the
kind of protection these three provide and the methods of obtaining that
protection.
Protecting users of programs. When you buy a program, you expect it to work
properly. If it doesn't, you want the legal system to protect your rights as a
consumer. This section surveys the legal recourse you have to address
faulty programs.
Computer law is complex and emerging rather rapidly as it tries to keep up with
the rapid technological advances in and enabled by computing. We present the
fundamentals in this book not in their full detail as you would expect by
someone with a law degree, but as a situational analysis to heighten the
UNIT - V 3
[CYBER SECURITY]
awareness of those who are not lawyers but who must deal with the law's
implications. You should consult a lawyer who understands and specializes in
computer law in order to apply the material of this section to any specific case.
And, as most lawyers will advise, ensuring legal protection by doing things
correctly from the beginning is far easierand cheaperthan hiring a lawyer to sort
out a web of conflict after things have gone wrong.
UNIT - V 4
[CYBER SECURITY]
are different according to the country and jurisdiction, restitution ranges from
fines to imprisonment, and enforcement is challenging.
Cyberlaw offers legal protections for people who are using the Internet as well
as running an online business. It is most important for Internet users to know
about the local area and cyber law of their country by which they could know
what activities are legal or not on the network. Also, they can prevent ourselves
from unauthorized activities.
The Computer Fraud and Abuse Act was the first cyber law, called CFFA, that
was enacted in 1986. This law was helpful in preventing unauthorized access to
computers. And it also provided a description of the stages of punishment for
breaking that law or performing any illegal activity.
There are many security issues with using the Internet and also available
different malicious people who try to unauthorized access your computer
system to perform potential fraud. Therefore, similarly, any law, cyber law is
created to protect online organizations and people on the network from
unauthorized access and malicious people. If someone does any illegal activity
or breaks the cyber rule, it offers people or organizations to have that persons
sentenced to punishment or take action against them.
If anyone breaks a cyber law, the action would be taken against that person on
the basis of the type of cyberlaw he broke, where he lives, and where he broke
the law. There are many situations like if you break the law on a website, your
account will be banned or suspended and blocked your IP (Internet
Protocol) address. Furthermore, if any person performs a very serious illegal
activity, such as causing another person or company distress, hacking, attacking
another person or website, advance action can be taken against that person.
Cyber laws are formed to punish people who perform any illegal activities
online. They are important to punish related to these types of issues such as
online harassment, attacking another website or individual, data theft,
disrupting the online workflow of any enterprise and other illegal activities.
UNIT - V 5
[CYBER SECURITY]
If anyone breaks a cyber law, the action would be taken against that person on
the basis of the type of cyberlaw he broke, where he lives, and where he broke
the law. It is most important to punish the criminals or to bring them to behind
bars, as most of the cybercrimes cross the limit of crime that cannot be
considered as a common crime.
These crimes may be very harmful for losing the reliability and confidentiality of
personal information or a nation. Therefore, these issues must be handled
according to the laws.
o When users apply transactions on the Internet, cyber law covers every
transaction and protect them.
o It touches every reaction and action in cyberspace.
o It captures all activities on the Internet.
These laws deal with multiple activities and areas that occur online and serve
several purposes. Some laws are formed to describe the policies for using the
Internet and the computer in an organization, and some are formed to offer
people security from unauthorized users and malicious activities. There are
various broad categories that come under cyber laws; some are as follows:
Fraud
Cyber laws are formed to prevent financial crimes such as identity theft, credit
card theft and other that occurring online. A person may face confederate or
state criminal charges if he commits any type of identity theft. These laws have
explained strict policies to prosecute and defend against allegations of using the
internet.
Copyrighting Issues
The Internet is the source that contains different types of data, which can be
accessed anytime, anywhere. But it is the authority of anyone to copy the
content of any other person. The strict rules are defined in the cyber laws if
anyone goes against copyright that protects the creative work of individuals and
companies.
UNIT - V 6
[CYBER SECURITY]
Scam/ Treachery
There are different frauds and scams available on the Internet that can be
personally harmful to any company or an individual. Cyber laws offer many ways
to protect people and prevent any identity theft and financial crimes that
happen online.
There are multiple online social media platforms that are the best resources to
share your mind with anyone freely. But there are some rules in cyber laws if
you speak and defaming someone online. Cyber laws address and deal with
many issues, such as racism, online insults, gender targets to protect a person's
reputation.
Data Protection
People using the internet depends on cyber laws and policies to protect their
personal information. Companies or organizations are also relying on cyber laws
to protect the data of their users as well as maintain the confidentiality of their
data.
When you are visiting a website, you click a button that gives a message to ask
you to agree for terms and conditions; if you agree with it, that ensures you have
used cyber law. For every website, there are terms and conditions available that
are associated with privacy concerns.
Trade Secrets
There are many organizations that are doing online businesses, which are often
relying on cyber laws to protect their trade secrets. For example, online search
engines like Google spend much time to develop the algorithms that generate a
search result. They also spend lots of time developing other features such as
intelligent assistance, flight search services, to name a few and maps. Cyber laws
UNIT - V 7
[CYBER SECURITY]
When you are sending any confidential information, such as debit card numbers,
credit card numbers, usernames, or passwords, send these types of information
securely. In Internet browsers, look for a small lock (Internet browser security
lock) to verify this; an icon will be shown in the right corner of the bottom of the
browser address bar or browser Window. If you see the icon, it should be in a
locked condition and not in an unlocked position. Also, make sure the URL starts
with https (Hypertext Transfer Protocol Secure), as displaying in the below
screenshot:
UNIT - V 8
[CYBER SECURITY]
If the lock icon is in the locked position and data is intercepted, the data is
encrypted that helps to keep secure your data and prevent others to understand
it. The data can be read by anyone if the lock is in the unlocked position or no
lock is visible because all information will be in the form of plain text. For
example, an online forum is not secure, use a password, but you will not use the
password with protected sites like an online banking website.
Like online bank site or other websites that contain confidential information,
need to use very strong passwords, it is also recommended; you must use the
different and strong password for all websites that require login id and
password. You could use a password manager if you required help to remember
your password.
You can use the two-factor authentication feature to make more secure your
accounts, like Gmail or others that require a login and contain your private data.
It offers advanced protection by adding an additional step in verifying you at the
time of login. If you enable two-factor authentication and the service does not
verify your computer or other devices after authenticating your password, it
sends a text message with a verification code on your cell phone. It includes
more powerful security; for example, if someone knows your password of any
account and tries to access your account, but he does not have your phone, he
cannot access your account even with a valid password.
UNIT - V 9
[CYBER SECURITY]
The email attachments and hyperlinks sent through email are the most common
resources to spread viruses and malware. It is recommended to always be
extremely cautious to open any attachments and hyperlinks, which you have
received through email from others, even if they have sent by friend or family.
There are many phishing scams and techniques that can be more harmful in
respect to losing your secret information. Therefore, it is necessary to familiarize
yourself with these types of techniques. Hackers mainly target websites that
need a login, such as PayPal, eBay, Amazon, online banking sites, and other
popular sites.
For protecting your systems, Internet browsers also play an important role. For
example, earlier versions of Internet Explorer are not more secure. If you are
using a lass secure browser in terms of your browser like Internet Explorer, you
should switch to another browser like Mozilla Firefox or Google Chrome. Also, if
you are using Microsoft Windows 10 operating system on your computer and
want to stay to use a Microsoft Internet browser, you can switch to the
Microsoft Edge rather than Internet Explorer that is more secure in terms of
protecting your systems.
When you are indicated to install an add-on or any program, before clicking on
the Ok button, you need to read and understand the agreement carefully. If you
do not understand the agreement or feel it is not necessary to install, you should
not install this kind of program, cancel or close the window, which may be
harmful for you.
Also, when you are installing an add-on or any program, you need to care about
any check box that asks if this third-party program will be ok to install. These
UNIT - V 10
[CYBER SECURITY]
often cause more issues and leave these boxes unchecked because these are
never required.
Business
If you are working in any organization, your place of work can monitor your
computer by installing key loggers or use other methods. In this case, someone
can collect usernames and passwords and read these logs if he has access to this
information. It can be more harmful to lose your personal information.
Additionally, if your computer is shared with other co-workers, do not store any
passwords in your browser.
Wireless network
When you are using a wireless network, you must be careful that all the
information sent from your computer and to your computer can be read and
intercepted by any unauthorized person. You can log in to the network securely
with the help of using WPA or WEP and prevent losing your secret information.
Furthermore, make sure the network is secure if it is a home wireless network.
Friend's house
Sometimes, you may use your friend's computer and log in to your account on
that computer, which may not be fully secure. Intentionally or unintentionally,
you can enter your username and password on your friend's computer or the
computer with whom you are not familiar. Finally, never save the password
information on your friend's computer browser when you are logging into any
site on a friend's computer.
There are many social media sites, such as Instagram, Facebook, that enable you
to make online friends and connect with them. The networking sites are also the
best place to share your personal information with your friends, family or others.
When you share something on social networking sites or the Internet, make sure
you are not sending any information that can be harmful to you if everyone sees
it. The sent information on the social network or the Internet should be public.
Also, make sure you are sharing such something that will not offend anyone or
embarrass you, and you must not be uploaded on the Internet.
UNIT - V 11
[CYBER SECURITY]
You should update Internet browser plugins or install the latest plugins to
protect yourself while online on the computer. Due to browser plugins like
Adobe Flash, attackers may find some easiness or security vulnerabilities to hack
any system. Therefore, you need to check out regularly that all your installed
Internet plug-ins are up-to-date.
If you are working on the computer at any public area, school, library and more,
make sure anyone is not looking at your screen, as there will be many people
around you. On the other hand, it can be cautious if anyone is looking at your
system screen that is called shoulder surfing. If you are required to system
screen private, you can use a privacy filter for the display.
There are many users that are habitual to save login information and password
on the system, but it can be insecure. Therefore, make sure you are storing your
personal details, such as credit card detail and account passwords, in a secure
area. It is recommended for everyone to use a password manager to save your
passwords.
A password manager is a software that holds all securely encrypts and login
information, and password protects that information. If you save a password in
a browser and anyone has access to your Internet browser, the password
information may be seen by that person. For instance, in the Firefox Internet
browser, anyone can see all stored passwords if you do not set up a master
password.
UNIT - V 12
[CYBER SECURITY]
Employment Contracts
In Cyprus, contracts are binding whether they are written agreements or not.
However, employers must provide details of the terms of employment within a
month of the commencement date. It needn't be a formal employment contract
either. Any document, contract, or letter of appointment that outlines the terms
of employment and is signed by the employer will do.
It's important to note that statutory and common law rights and obligations
apply to all employment contracts. This is irrespective of them being mentioned
in the agreement or not. Some employee rights include the following:
A working week, including or excluding overtime, cannot exceed 48 hours.
Parents are entitled to maternity and parental leave.
A minimum of 20 weeks should be available for maternity leave.
All employees have the right to be paid equally for equal work done.
The minimum wage is guaranteed for employees in specific industries.
UNIT - V 13
[CYBER SECURITY]
Minimum Wage
For most employment agreements, the employer and employee agree upon a
salary through negotiation. However, certain occupations have a guaranteed
minimum wage. The amount is set yearly by the Ministerial Council's order,
which sits annually on the 1st of April. The minimum wage statutes cover the
following workers:
Shop assistants
Clerks
School assistants
Security guards
Nursing assistants
Assistant baby and childminders
UNIT - V 15
[CYBER SECURITY]
Discrimination
Employment and labour law in Cyprus protects employees against all forms of
discrimination (age, gender, language, race, ethnicity, nationality, religion,
sexual orientation, or political beliefs). Unequal pay based on sex is prohibited
explicitly in Cyprus, where workers are entitled to equal compensation for equal
work.
The law also protects employees who file sexual harassment complaints. Sexual
harassment complaints should be investigated by a Gender Equality Inspector
or the Ombudsman.
In the event of unfairness, employees have two options. They may file a civil
claim or file a complaint to the relevant authorities depending on the nature of
discrimination. If the discrimination claim is successful, employees are entitled
to claim damages, reinstatement, and attorney's fees.
Part-time and fix-time employees should also be treated equally. Part-time
workers are entitled to the same salary and benefits as full-time employees
fulfilling the same duties. Employers should pay part-time workers pro-rata to
the number of hours worked.
Working Hours
Employees working a five-day week should not exceed 48 hours per week or
eight hours a day. This restriction includes overtime. There are circumstances
where different limitations apply. The hotel industry is one example. Shift
workers also have other limits. Employees are also entitled to a minimum of 11
continuous hours of rest every 24 hours. Also, they have the right to a constant
24-hour rest period each week. Furthermore, employees are entitled to either
two consecutive days off with a 14-day cycle.
But the situation with software is very different. To be fair, an operating system
is a great deal more complex than many consumer products, and more
opportunities for failure exist. For this reason, this section addresses three
questions:
• What are the legal issues in selling correct and usable software?
• What are the moral or ethical issues in producing correct and usable
software?
• What are the moral or ethical issues in finding, reporting, publicizing, and
fixing flaws?
In some ways, the legal issues are evolving. Everyone acknowledges that all
vendors should produce good software, but that does not always happen. The
more difficult concerns arise in the development and maintenance communities
about what to do when faults are discovered.
UNIT - V 17
[CYBER SECURITY]
them in court if necessary. You may have three reactions if you find something
wrong with the radio: You want your money back, you want a different (not
faulty) radio, or you want someone to fix your radio. With software you have
the same three possibilities, and we consider each one in turn.
To consider our alternatives with software, we must first investigate the nature
of the faulty code. Why was the software bad? One possibility is that it was
presented on a defective medium. For example, the CD may have had a flaw and
you could not load the software on your computer. In this case, almost any
merchant will exchange the faulty copy with a new one with little argument. The
second possibility is that the software worked properly, but you don't like it
when you try it out. It may not do all it was advertised to do. Or you don't like
the "look and feel," or it is slower than you expected it to be, or it works only
with European phone numbers, not the phone scheme in your country. The
bottom line is that there is some attribute of the software that disappoints you,
and you do not want this software.
The final possibility is that the software malfunctions, so you cannot use it with
your computer system. Here, too, you do not want the software and hope to
return it.
I Want a Refund
If the item were a radio, you would have the opportunity to look at it and listen
to it in the shop, to assess its sound quality, measure its size (if it is to fit in a
particular space), and inspect it for flaws. Do you have that opportunity with a
program? Probably not.
The U.S. Uniform Commercial Code (UCC) governs transactions between buyers
and sellers in the United States. Section 2-601 says that "if the goods or the
tender of delivery fail in any respect to conform to the contract, the buyer may
reject them." You may have had no opportunity to try out the software before
purchase, particularly on your computer. Your inspection often could not occur
in the store (stores tend to frown on your bringing your own computer, opening
their shrink-wrapped software, installing the software on your machine, and
checking the features). Even if you could have tried the software in the store,
you may not have been able to assess how it works with the other applications
with which it must interface. So you take home the software, only to find that it
is free from flaws but does not fit your needs. You are entitled to a reasonable
period to inspect the software, long enough to try out its features. If you decide
within a reasonably short period of time that the product is not for you, you can
cite UCC §2-601 to obtain a refund.
UNIT - V 18
[CYBER SECURITY]
More often, though, the reason you want to return the software is because it
simply is not of high enough quality. Unfortunately, correctness of software is
more difficult to enforce legally.
I Want It to Be Good
Quality demands for mass market software are usually outside the range of legal
enforcement for several reasons.
Thus, legal remedies are most appropriate only for a large complaint, such as
one from a government or one representing a large class of dissatisfied and vocal
users. The "fit for use" provision of the UCC dictates that the product must be
usable for its intended purpose; software that doesn't work is clearly not usable.
The UCC may help you get your money back, but you may not necessarily end
up with working software.
Some manufacturers are very attentive to their customers. When flaws are
discovered, the manufacturers promptly investigate the problems and fix
serious ones immediately, perhaps holding smaller corrections for a later
release. These companies are motivated more by public image or moral
obligation than by legal requirement.
UNIT - V 19
[CYBER SECURITY]
will contact affected parties with patches and work-arounds. Now, a maker is
potentially liable for all possible failings, and a major security-critical flaw could
be very costly. Trope's approach limits the exposure to addressing known
defects reasonably promptly.
COMPUTER CRIME
Computer crime is an act that describes a large category of offenses, which is
also known as hi-tech crime, e-crime, cybercrime, or electronic crime. It is
performed by a computer user who has great knowledge about hacking. The
hacker tries to gain unauthorized access to any particular account, personal
information or steals a company's or individual's private information. In some
cases, hackers can corrupt the computer or data files that can be very harmful
to you.
On the basis of the person, situation, and individual frame of reference, the term
computer crime has different meanings. For example, there are different
communities like network administrators, private security, law enforcement, or
prosecutors, but the investigation of computer crime does not need these
communities. However, conventional or physical borders do not restrict
computer crime as it is by its very nature.
The first definitional categories for computer crime are presented by Donn
Parke, who is generally cited as the author. A higher-level definition to the term
computer abuse was described by him, computer crime can be any event
involving an planned act where a unauthorize person or offender wants to gain
related to computers, but a victim suffered or could have suffered a loss.
some information or data, which data is further used for any illegal
activity. For case, a computer system can be used by a hacker to steal
personal information, which can be used for the criminal objective.
3. The computer as incidental to a crime: The computer may be incidental
to a crime that means it can only facilitate the crime but may not the
primary instrument of it. For example, the trading of child pornography
and money laundering.
4. Crimes associated with the prevalence of computers: This category
comprises of the actions such as software piracy, intellectual property
theft, and other crimes against the computer industry.
In modern times, there are various kinds of computer crime available, which are
discussed below:
UNIT - V 21
[CYBER SECURITY]
UNIT - V 22
[CYBER SECURITY]
o Identity theft: Identity theft is an act to be a person you are not that one.
In this category, attackers try to gain information illegally about someone
else. Attackers or thieves can try to information such as phone number,
credit card numbers, full name, maiden name, social security number,
passwords, etc.
o Illegal sales: It is an act of purchasing or selling illicit goods online, such as
psychotropic substances, drugs, guns, and more.
o Intellectual property theft: It is a category of property where a human
creates something by using their own mind. In this case, if anyone steals
practical or conceptual information that is created by other persons or
organizations, it comes under intellectual property theft, which is known
as a crime. Trade secrets, copyrights, trademarks, and patents are well-
known types of intellectual property.
o Phishing or vishing: It is a term that is used to deceive individuals or
groups to obtain secret information about that person. For that, they
create web pages designed to gather personal information like a credit
card, online bank, password, or other private information. They also do so
with the help of sending emails.
o Salami slicing: Generally, it can be defined as stealing small amounts of
money from each transaction that builds into a large sum of illegally
gained money.
o Scam: A scam is a term that is used to trick people into believing
something, which is not actually true. For example, people start a fraud
scheme or business through which they gain money from an unsuspecting
person. Online scams have increased because the world is more
connected to the network. And, it depends on you to keep careful yourself
from these kinds of online scams
o Slander: A slander is an act of posting libel against another organization
or person.
o Software piracy: Generally, it describes illegally copying, distributing, or
using software without ownership or legal rights. Today, most of the
software may have installed on one computer to use as it is purchased as
a single-user license. If you share that software with anyone or copy it on
multiple computer devices without purchasing multiple licenses, it is
illegal and comes under software piracy.
UNIT - V 23
[CYBER SECURITY]
The online use of computers is very much involved in fraud or computer crimes.
You must be careful at the time of sharing your important personal information
over the internet. This information can be in terms of your social security
numbers, account id, password, credit card number, etc.
UNIT - V 24
[CYBER SECURITY]
Also, use a difficult password to take basic precautions for keeping your data
private and change the password frequently that would be made hacking
difficult. Make sure you are not doing financial transactions over unprotected
networks or on public computers. A good anti-virus program also helps to
prevent these crimes; so, you should install anti-virus on your system and
update it regularly. Furthermore, there are various websites that can have
viruses, spyware, or other malware; therefore, be careful when you are
downloading software from these kinds of websites.
There are some important key points that can help you protect against
computer crimes:
o Use strong passwords: Always use a strong, unique password and change
your password frequently. Also, the repeated password is not beneficial;
so, do not keep the same passwords on different sites. And you should
always try to password with the combination of at least 10 -14 letters that
have symbols, special characters, and numbers, which means create a
complex password. A complex password cannot be hacked easily like
"123456" or "another simple password."
o Keep your software updated: Especially, it is most important with your
internet security software; because attackers always try to gain access to
your system by using flaws or known exploits. Therefore, you should keep
your software up to date, which helps to patch those exploits and flaws,
which led to a decrease in the chances of becoming a victim of cybercrime.
o Be careful about using public Wi-Fi: It is very easy for hackers to connect
with public Wi-Fi. That means they can see your history what you're doing
on the internet, such as watching a movie, including they can see your
account information, password, or other personal sensitive information
you are logging on the device. To protect yourself against crime, do not
enter your secret information while using public Wi-Fi, and when you are
on public Wi-Fi, use apps that need a password to access.
o Manage your social media settings: Make sure your private and personal
information is locked. As you mostly share your pictures or other data on
social media sites publicly, which can be hacked by social engineering
cybercriminals. So, it would be better for you to less share your personal
information on social media.
UNIT - V 25
[CYBER SECURITY]
On the one hand, we seem to have little choice in the matter. Most people’s
lives don’t revolve around virus signatures and threat vectors; most of us use
computers and smartphones and networks to do other things, so we have to
entrust our security to the experts. However, we should understand that
cybersecurity experts face special ethical issues that the rest of us may not ever
deal with.
Confidentiality
Security
Security is another ethical issue, which may sound redundant when speaking of
a cybersecruity professional, but think of it this way: If we’re all responsible for
following appropriate cybersecurity procedures in our own lives, take your
personal level of responsibility and multiply it by 100. That’s the security
responsibility of a cybersecurity professional. If most people leave their
computer unattended or neglect to perform a scheduled update, it may not be
a big deal; but for a cybersecurity expert, that could be a severe ethical lapse.
They, more than anyone, are obliged to keep devices, data and networks secure.
Let’s say you work for a company that mostly does good work, but one business
unit is involved in something you think is ethically wrong. If you steal electronic
UNIT - V 26
[CYBER SECURITY]
Threats to Privacy
UNIT - V 27
[CYBER SECURITY]
stole classified files from the NSA and provided them to the public is that he felt
the agency was collecting too much information on the wrong people. In other
words, he believed that the NSA was violating the privacy of law-abiding
Americans for no good reason.
How do we balance the need to be secure with the need to protect our privacy?
How do we determine the extent of an organization’s ethical responsibility to
safeguard our information or respect our privacy—and how do we hold them
accountable? The first step we all need to take is to value privacy as a worthy
end in itself. The notion that people are entitled to privacy stems from the
ethical idea that humans have intrinsic worth and dignity. Beings with dignity
are entitled to privacy, both in person and online. To behave or believe
otherwise would violate our most deeply held ethical principles.
That’s the starting point for a set of ethical debates that we have to have. We
may never arrive at a solution that pleases everyone, but at least we’ll be asking
the right questions and moving in the right direction: greater safety, security and
privacy for us all.
UNIT - V 28
[CYBER SECURITY]
How can management infuse the highest of cybersecurity ethical standards and
intrinsic values? If your organization has not done so already, you should
strongly consider implementing an ethical practice policy, guidelines and/or
code of conduct for your IT and security staff to follow. Review this policy
regularly in the context of available industry guidelines and best practices. After
formulating a clear policy, be sure to engage your employees in the ethics
conversation by offering training and guidance.
Even the most ethical and highly technical of cybersecurity teams cannot
prevent the most determined attackers. It is wise, therefore, to thoroughly
prepare for cybersecurity incidents. This requires a well-prepped incident
response plan that encompasses the technical details, practical instructions for
executive and legal teams, and any key ethical considerations.
Harrowing Headlines
Aside from their employees, businesses themselves must fulfill certain ethical
and legal obligations in the event of a security incident, particularly a data
breach. Time is undoubtedly a key factor in responding to cyberattacks.
However, notifying customers and clients about any serious, immediate
implications, such as stolen data and credentials, is also an integral part of the
incident response process. When a company leaves the public in the dark after
a catastrophic breach, customers remain vulnerable.
UNIT - V 29
[CYBER SECURITY]
White hats work with sensitive data, come across company secrets and wield
great power over computer networks, applications and systems. How an
individual manages this authority comes down to his or her own ethical
yardstick, which is why organizations must carefully select security experts who
exhibit sufficient standards and technical competency. But is this enough? Can
we trust our respected practitioners?
Even the lines between the different shades of the hacker spectrum — white
hat, gray hat, black hat, etc. — can be blurry. In fact, black- and white-hat
hackers often use the same tools and methods to achieve vastly different ends.
This muddies the ethical waters of cybersecurity even more, making it difficult
to determine exactly where the moral line falls when it comes to producing
fruitful, legitimate and ethically sound security research.
While legal, medical, accounting and other established professions have legally
binding codes of conduct overseen by longstanding regulatory bodies, IT
security professionals have yet to establish formal guidance or universal checks
and balances. The industry lacks an independent register to determine who can
practice ethical hacking or security research.
UNIT - V 30
[CYBER SECURITY]
Several associations, such as ISSA, ISC2 and SANS, have volunteered to tackle
governing ethical issues in IT and cybersecurity. However, industry professionals
are rarely required to subscribe to these bodies or adhere to their codes of
conduct.
In this pivotal moment of the show, Elliot can choose to either delete the file
(the ethical decision) or leave it on the client’s server. Intrigued, Elliot acts
unethically and leaves the file on the server without notifying his incident
response team, management or the server owner. This decision is the catalyst
upon which the whole story arc hinges, leading to the protagonist’s involvement
with the enigmatic illegal cybercrime gang fsociety and a massive data breach
for the important client.
UNIT - V 31
[CYBER SECURITY]
Security researcher and One World Labs founder Chris Roberts made
controversial headlines in 2015 after tweeting that he was considering doing a
live penetration test of his domestic United Airlines flight to Syracuse, New York.
Roberts, who was the subject of an FBI affidavit, allegedly commandeered a
Boeing aircraft by tampering with the thrust management computer via its in-
flight entertainment system, causing “one of the airplane engines to climb,
resulting in a lateral or sideways movement” of the aircraft, Wired reported.
It’s unlikely Roberts intended to threaten or harm himself, airline staff or the
other passengers onboard. Despite apparent white-hat intentions, however, the
consequences of Roberts’ alleged actions against such critical systems could
have been grave.
UNIT - V 32
[CYBER SECURITY]
Who’s to Blame?
Young rogue hackers often fall into the hands of law enforcement when
conducting activities against legitimate, unsuspecting targets. Many plead
ignorance, asserting that they did not realize the activities were illegal.
On the other hand, many hackers have knowingly crossed ethical boundaries
with ignorance falling short as a defense. If a young cybersecurity enthusiast
behaved unethically in his or her juvenile hacking past but shows a promising
future, can he or she be trusted by a potential employer? Despite the noted
demand for cybersecurity professionals, organizations are usually hesitant to
hire talented ex-black hats.
As part of our outreach and awareness initiatives in the IBM Ireland Lab, my
colleagues and I on the IBM Ethical Hacking team occasionally run cybersecurity
workshops with third-level computer science students across Ireland and the
U.K. These workshops are designed to give soon-to-be graduates a brief
introduction to cybersecurity and the skills required to work in the industry. In
this capacity, my team serves the critical role of educators and role models. This
requires very careful consideration.
exceptional duty that comes with having much-touted hacking skills. As the
saying goes, with great power comes great responsibility.
A thing in the internet of things can be a person with a heart monitor implant, a
farm animal with a biochip transponder, an automobile that has built-
in sensors to alert the driver when tire pressure is low or any other natural or
man-made object that can be assigned an Internet Protocol (IP) address and is
able to transfer data over a network.
UNIT - V 34
[CYBER SECURITY]
IoT can also make use of artificial intelligence (AI) and machine learning to aid in
making data collecting processes easier and more dynamic.
An
example of how an IoT system works from collecting data to taking action
Why is IoT important?
The internet of things helps people live and work smarter, as well as gain
complete control over their lives. In addition to offering smart devices to
automate homes, IoT is essential to business. IoT provides businesses with a
real-time look into how their systems really work, delivering insights into
everything from the performance of machines to supply chain and logistics
operations.
IoT enables companies to automate processes and reduce labor costs. It also
cuts down on waste and improves service delivery, making it less expensive to
manufacture and deliver goods, as well as offering transparency into customer
transactions.
UNIT - V 35
[CYBER SECURITY]
As such, IoT is one of the most important technologies of everyday life, and it
will continue to pick up steam as more businesses realize the potential of
connected devices to keep them competitive.
IoT encourages companies to rethink the ways they approach their businesses
and gives them the tools to improve their business strategies.
IoT can benefit farmers in agriculture by making their job easier. Sensors can
collect data on rainfall, humidity, temperature and soil content, as well as other
factors, that would help automate farming techniques.
UNIT - V 36
[CYBER SECURITY]
changes within structural buildings, bridges and other infrastructure. This brings
benefits with it, such as cost saving, saved time, quality-of-life workflow changes
and paperless workflow.
UNIT - V 37
[CYBER SECURITY]
UNIT - V 38
[CYBER SECURITY]
Amazon Web Services (AWS) IoT is a cloud computing platform for IoT
released by Amazon. This framework is designed to enable smart
devices to easily connect and securely interact with the AWS cloud and
other connected devices.
Arm Mbed IoT is a platform to develop apps for IoT based on Arm
microcontrollers. The goal of the Arm Mbed IoT platform is to provide
a scalable, connected and secure environment for IoT devices by
integrating Mbed tools and services.
Microsoft's Azure IoT Suite is a platform that consists of a set of
services that enables users to interact with and receive data from their
IoT devices, as well as perform various operations over data, such as
multidimensional analysis, transformation and aggregation, and
visualize those operations in a way that's suitable for business.
Google's Brillo/Weave is a platform for the rapid implementation of
IoT applications. The platform consists of two main backbones: Brillo,
an Android-based OS for the development of embedded low-power
devices, and Weave, an IoT-oriented communication protocol that
serves as the communication language between the device and the
cloud.
Calvin is an open source IoT platform released by Ericsson designed
for building and managing distributed applications that enable devices
UNIT - V 39
[CYBER SECURITY]
In the consumer segment, for example, smart homes that are equipped with
smart thermostats, smart appliances and connected heating, lighting and
electronic devices can be controlled remotely via computers and smartphones.
Wearable devices with sensors and software can collect and analyze user data,
sending messages to other technologies about the users with the aim of making
users' lives easier and more comfortable. Wearable devices are also used for
public safety -- for example, improving first responders' response times during
emergencies by providing optimized routes to a location or by tracking
construction workers' or firefighters' vital signs at life-threatening sites.
In healthcare, IoT offers many benefits, including the ability to monitor patients
more closely using an analysis of the data that's generated. Hospitals often use
IoT systems to complete tasks such as inventory management for both
pharmaceuticals and medical instruments.
Smart buildings can, for instance, reduce energy costs using sensors that detect
how many occupants are in a room. The temperature can adjust automatically -
- for example, turning the air conditioner on if sensors detect a conference room
is full or turning the heat down if everyone in the office has gone home.
In agriculture, IoT-based smart farming systems can help monitor, for instance,
light, temperature, humidity and soil moisture of crop fields using connected
sensors. IoT is also instrumental in automating irrigation systems.
UNIT - V 40
[CYBER SECURITY]
In a smart city, IoT sensors and deployments, such as smart streetlights and
smart meters, can help alleviate traffic, conserve energy, monitor and address
environmental concerns, and improve sanitation.
In 2016, one of the most notorious recent IoT attacks was Mirai, a botnet that
infiltrated domain name server provider Dyn and took down many websites for
an extended period of time in one of the biggest distributed denial-of-service
(DDoS) attacks ever seen. Attackers gained access to the network by exploiting
poorly secured IoT devices.
Because IoT devices are closely connected, all a hacker has to do is exploit one
vulnerability to manipulate all the data, rendering it unusable. Manufacturers
that don't update their devices regularly -- or at all -- leave them vulnerable to
cybercriminals.
Hackers aren't the only threat to the internet of things; privacy is another major
concern for IoT users. For instance, companies that make and distribute
consumer IoT devices could use those devices to obtain and sell users' personal
data.
Beyond leaking personal data, IoT poses a risk to critical infrastructure, including
electricity, transportation and inancial services.
UNIT - V 41
[CYBER SECURITY]
Although Ashton's was the first mention of the internet of things, the idea of
connected devices has been around since the 1970s, under the
monikers embedded internet and pervasive computing.
The first internet appliance, for example, was a Coke machine at Carnegie
Mellon University in the early 1980s. Using the web, programmers could check
the status of the machine and determine whether there would be a cold drink
awaiting them, should they decide to make the trip to the machine.
IoT evolved from M2M communication, i.e., machines connecting to each other
via a network without human interaction. M2M refers to connecting a device to
the cloud, managing it and collecting data.
Taking M2M to the next level, IoT is a sensor network of billions of smart devices
that connect people, systems and other applications to collect and share data.
As its foundation, M2M offers the connectivity that enables IoT.
The internet of things is also a natural extension of supervisory control and data
acquisition (SCADA), a category of software application programs for process
UNIT - V 42
[CYBER SECURITY]
control, the gathering of data in real time from remote locations to control
equipment and conditions. SCADA systems include hardware and software
components. The hardware gathers and feeds data into a computer that has
SCADA software installed, where it is then processed and presented in a timely
manner. The evolution of SCADA is such that late-generation SCADA systems
developed into first-generation IoT systems.
The concept of the IoT ecosystem, however, didn't really come into its own until
the middle of 2010 when, in part, the government of China said it would make
IoT a strategic priority in its five-year plan.
ECONOMICS
This economics course provides an introduction to the field of cybersecurity
through the lens of economic principles. Delivered by four leading research
teams, it will provide you with the economic concepts, measurement
approaches and data analytics to make better security and IT decisions, as well
as understand the forces that shape the security decisions of other actors in the
ecosystem of information goods and services.
Systems often fail because the organizations that defend them do not bear the
full costs of failure. In order to solve the problems of growing vulnerability to
computer hackers and increasing crime, solutions must coherently allocate
responsibilities and liabilities so that the parties in a position to fix problems
have an incentive to do so. This requires a technical comprehension of security
threats combined with an economic perspective to uncover the strategies
employed by cyber hackers, attackers and defenders.
The course covers five main areas:
1. Introduction to key concepts in security economics. Here, we provide
an overview of how information security is shaped by economic
mechanisms, such as misaligned incentives, information asymmetry,
and externalities.
2. Measuring cybersecurity. We introduce state of the art security and IT
metrics and conceptualize the characteristics of a security metric, its
challenges and advantages.
UNIT - V 43
[CYBER SECURITY]
COMPUTERIZED ELECTIONS
Election cyber security is one of the hottest topics in the country today. It
dominated both the 2016 and 2020 Presidential elections, and most likely will
continue to do so until state and local governments can demonstrate that their
voting infrastructure and solutions are as secure and tamper-proof as possible.
When voters go to the polls, they might not realize the complex blend of
components that power today's democratic system. Secure these, and you
stand a much better chance of mitigating the threat from external actors.
UNIT - V 44
[CYBER SECURITY]
Fortunately, there are technologies that can go a long way toward providing
protections—starting with private network solutions.
CISA is tasked with ensuring free and fair elections and divides electronic voting
infrastructure into several main elements:
UNIT - V 45
[CYBER SECURITY]
Tabulation: The machines and processes that tally the votes cast at the
voting machines. This can occur at the precinct level or in more
centralized locations.
Websites: Official election sites that convey information such as how
to register and how to vote, as well as election results.
Should hackers cause disruption, reporting delays or even data theft, this could
undermine voter confidence in election results. Election cyber attacks could
have a dangerous, long-term impact on voter turnout and polarization of the
electorate.
Local and state governments are already taking the following steps:
UNIT - V 46
[CYBER SECURITY]
CYBER WARFARE
Cyber warfare is usually defined as a cyber attack or series of attacks that target
a country. It has the potential to wreak havoc on government and civilian
infrastructure and disrupt critical systems, resulting in damage to the state and
even loss of life.
There is, however, a debate among cyber security experts as to what kind of
activity constitutes cyber warfare. The US Department of Defense (DoD)
recognizes the threat to national security posed by the malicious use of the
Internet but doesn’t provide a clearer definition of cyber warfare. Some consider
cyber warfare to be a cyber attack that can result in death.
Espionage
Refers to monitoring other countries to steal secrets. In cyber warfare, this can
involve using botnets or spear phishing attacks to compromise sensitive
computer systems before exfiltrating sensitive information.
Sabotage
DoS attacks prevent legitimate users from accessing a website by flooding it with
fake requests and forcing the website to handle these requests. This type of
attack can be used to disrupt critical operations and systems and block access to
sensitive websites by civilians, military and security personnel, or research
bodies.
UNIT - V 48
[CYBER SECURITY]
Attacking the power grid allows attackers to disable critical systems, disrupt
infrastructure, and potentially result in bodily harm. Attacks on the power grid
can also disrupt communications and render services such as text messages and
communications unusable.
Propaganda Attacks
Attempts to control the minds and thoughts of people living in or fighting for a
target country. Propaganda can be used to expose embarrassing truths, spread
lies to make people lose trust in their country, or side with their enemies.
Economic Disruption
Most modern economic systems operate using computers. Attackers can target
computer networks of economic establishments such as stock markets,
payment systems, and banks to steal money or block people from accessing the
funds they need.
Surprise Attacks
These are the cyber equivalent of attacks like Pearl Harbor and 9/11. The point
is to carry out a massive attack that the enemy isn’t expecting, enabling the
attacker to weaken their defenses. This can be done to prepare the ground for
a physical attack in the context of hybrid warfare.
Stuxnet Virus
Stuxnet was a worm that attacked the Iranian nuclear program. It is among the
most sophisticated cyber attacks in history. The malware spread
via infected Universal Serial Bus devices and targeted data acquisition and
supervisory control systems. According to most reports, the attack seriously
damaged Iran’s ability to manufacture nuclear weapons.
UNIT - V 49
[CYBER SECURITY]
An attack on Sony Pictures followed the release of the film “The Interview”,
which presented a negative portrayal of Kim Jong Un. The attack is attributed to
North Korean government hackers. The FBI found similarities to previous
malware attacks by North Koreans, including code, encryption algorithms, and
data deletion mechanisms.
Bronze Soldier
In 2007, Estonia relocated a statue associated with the Soviet Union, the Bronze
Soldier, from the center of its capital Tallinn to a military cemetery near the city.
Estonia suffered a number of significant cyber attacks in the following months.
Estonian government websites, media outlets, and banks were overloaded with
traffic in massive denial of service (DoS) attacks and consequently were taken
offline.
Fancy Bear
CrowdStrike claims that the Russian organized cybercrime group Fancy Bear
targeted Ukrainian rocket forces and artillery between 2014 and 2016. The
malware was spread via an infected Android application used by the D-30
Howitzer artillery unit to manage targeting data.
Ukrainian officers made wide use of the app, which contained the X-Agent
spyware. This is considered to be a highly successful attack, resulting in the
destruction of over 80% of Ukraine’s D-30 Howitzers.
Enemies of Qatar
According to the lawsuit, the brother of the Qatari Emir was alleged to have
orchestrated a cyber warfare campaign, along with others in Qatari leadership.
1,200 people were targeted by the same attackers, with many of these being
UNIT - V 50
[CYBER SECURITY]
known “enemies of Qatar”, including senior officials from Egypt, Saudi Arabia,
the United Arab Emirates, and Bahrain.
The legal status of this new field is still unclear as there is no international law
governing the use of cyber weapons. However, this does not mean that cyber
warfare is not addressed by the law.
The Cooperative Cyber Defense Center of Excellence (CCDCoE) has published the
Tallinn Manual, a textbook that addresses rare but serious cyber threats. This
manual explains when cyber attacks violate international law and how countries
may respond to such violations.
The best way to assess a nation’s readiness for cyber warfare is to conduct a
real-life exercise or simulation, also known as a cyber wargame.
Cyber wargames can help cities, states, or countries improve readiness for cyber
warfare by:
UNIT - V 51
[CYBER SECURITY]
not know each other, and help them decide how to work together in the
event of a crisis.
Improving policies – governments may establish cyber warfare policies,
but need to test them in practice. A cyber wargame can test the
effectiveness of policies and provide an opportunity for improving them.
UNIT - V 52
[CYBER SECURITY]
API Security – Automated API protection ensures your API endpoints are
protected as they are published, shielding your applications from exploitation.
Advanced Bot Protection – Prevent business logic attacks from all access points
– websites, mobile apps and APIs. Gain seamless visibility and control over bot
traffic to stop online fraud through account takeover or competitive price
scraping.
DDoS Protection – Block attack traffic at the edge to ensure business continuity
with guaranteed uptime and no performance impact. Secure your on premises
or cloud-based assets – whether you’re hosted in AWS, Microsoft Azure, or
Google Public Cloud.
Attack Analytics – Ensures complete visibility with machine learning and domain
expertise across the application security stack to reveal patterns in the noise and
detect application attacks, enabling you to isolate and prevent attack
campaigns.
UNIT - V 53
[CYBER SECURITY]
Imperva protects all cloud-based data stores to ensure compliance and preserve
the agility and cost benefits you get from your cloud investments
Cloud Data Security – Simplify securing your cloud databases to catch up and
keep up with DevOps. Imperva’s solution enables cloud-managed services users
to rapidly gain visibility and control of cloud data.
UNIT - V 54