Sie sind auf Seite 1von 11

Art Doli

Security, Privacy, Ethical Issues in Operating Systems

12/08/2013

Security, Privacy, and Ethical Issues in Information Systems and the Internet
Contents
Social Issues in Information Systems ............................................................................................................ 1 Computer Waste and Mistakes................................................................................................................. 1 Computer Crime............................................................................................................................................ 2 What is the difference between viruses, worms, Trojans and Bots? ........................................................... 4 Classes of Malicious Software ................................................................................................................... 5 Best Practices for Combating Viruses, Worms, Trojans, and Bots............................................................ 8 How to Respond to a Security Incident ........................................................................................................ 8 Privacy Issues ................................................................................................................................................ 9

Social Issues in Information Systems


Waste and Mistakes Crime Privacy Health Concerns Ethical Issues

Computer Waste and Mistakes

Waste is a mismanagement of Information Systems and resources. Experts estimate $5,000 per year wasted by computer users. Some reasons for this are poorly trained users trying to do something they really don't know how such as Word processor trying to implement a

Art Doli

Security, Privacy, Ethical Issues in Operating Systems

12/08/2013

new, complex format required by job or a user trying to create complex spreadsheet format not required by job. Sending personal email is also part of this followed by surfing on the Internet for personal items, games and spam.
How to prevent Computer-Related Waste and Mistakes

The only way to prevent computer-related waste and mistakes is by: Better training Better controls Limit user rights so they can't do anything except their job No write access to data they shouldn't change No access to features of applications they don't need No access to Internet (reduction ad absurdum) No access to computers or phoneseliminates 100% of computer/phone waste. Supervise users closely and enforce rules Check browser history file Check all email messages Check all phone calls Check log of all computer usage

Computer Crime
The computer as a tool to commit crime Gaining access to information o The computer as the object of crime

Art Doli

Security, Privacy, Ethical Issues in Operating Systems

12/08/2013

Illegal access Data destruction Information Software and Computer International

and use alteration and and equipment theft Internet piracy scams computer crime

Hacker is a person who enjoys computer technology and spends/wastes his own time learning/using/playing with computer systems. A hacker uses a computer to commit break into unauthorized data. Cracker is always criminal; from Criminal Hacker A computer-savvy person is the one who attempts to gain unauthorized or illegal access to computer systems. Data Alteration The intentional use of illegal and destructive programs to alter or destroy data. Application Viruses Infects executable application files such as word processing. System Virus Typically infects operating systems programs or other system files.

Art Doli

Security, Privacy, Ethical Issues in Operating Systems

12/08/2013

Logic Bomb An application or system virus designed to explode or execute at a specified time and date. Macro Virus uses an applications own macro programming language to distribute itself. It is very easy to write, so most common virus. Latest payload: mails copies of itself from recipient's machine to all people recipient that have recently sent email. The email seems to be from recipient. Password Sniffer is a small program hidden in a network or a computer system that records identification numbers and passwords.

What is the difference between viruses, worms, Trojans and Bots?


Viruses, worms, Trojans, and bots are all part of a class of software called malware short for malicious software. It is a code or software that is designed to damage, steal, or in general inflict some other bad action on data, hosts, or networks. There are many different classes of malware that have varying ways of infecting systems. Malware can infect systems by being bundled with other programs or attached as macros to files. Others are installed by exploiting a known vulnerability in an operating system (OS), network device, or other software, such as a hole in a browser that only requires users to visit a website to infect their computers. The vast majority are

Art Doli

Security, Privacy, Ethical Issues in Operating Systems

12/08/2013

installed by some action clicking an e-mail downloading a file from

from a user, such as attachment or the Internet.

Some of the more commonly known types of malware are viruses, worms, Trojans, bots, back doors, spyware, and adware. Damage from malware varies from causing minor irritation (such as browser popup ads), to stealing confidential information or money, destroying data, and compromising and/or entirely disabling systems and networks. Malware cannot damage the physical hardware of systems and network equipment, but it can damage the data and software residing on the equipment. Malware should also not be confused with defective software, which is intended for legitimate purposes but has errors or bugs..
Classes of Malicious Software

Two of the most common types of malware are viruses and worms. These types of programs are able to self-replicate and can spread copies of themselves, which might even be modified copies. To be classified as a virus or worm, malware must have the ability to propagate. The difference is that a worm operates more or less independently of other files, whereas a virus depends on a host program to spread itself. These and other classes of malicious software are described below. Viruses A computer virus is a type of malware that spreads out from one computer to another, leaving infections as it travels. Viruses can range in severity from causing mildly annoying effects to damaging data or software and causing denial-of-service (DoS) conditions. Almost all viruses are attached to an executable file, which means the virus may exist on a system but will not be active or able to spread until a user runs or opens

Art Doli

Security, Privacy, Ethical Issues in Operating Systems

12/08/2013

the malicious host file or program. When the host code is executed, the viral code is executed as well. Normally, the host program keeps functioning after it is infected by the virus. However, some viruses overwrite other programs with copies of themselves, which destroys the host program altogether. Viruses spread when the software or document they are attached to is transferred from one computer to another using the network, a disk, file sharing, or infected e-mail attachments. Worms Computer worms are similar to viruses in that they replicate functional copies of themselves and can cause the same type of damage. In contrast to viruses, which require the spreading of an infected host file, worms are standalone software and do not require a host program or human help to propagate. To spread, worms either exploit vulnerability on the target system or use some kind of social engineering to trick users into executing them. A worm enters a computer through vulnerability in the system and takes advantage of file-transport or information-transport features on the system, allowing it to travel unaided. Trojans A Trojan is another type of malware named after the wooden horse the Greeks used to infiltrate Troy. It is a harmful piece of software that looks legitimate. Users are typically tricked into loading and executing it on their systems. After it is activated, it can achieve any number of attacks on the host, from irritating the user (popping up windows or changing desktops) to damaging the host (deleting files, stealing data, or activating and spreading other malware, such as viruses). Trojans are also known to create back doors to give malicious users access to the system. Unlike viruses and worms, Trojans do not reproduce by infecting other files nor do they self-replicate. Trojans must spread through user

Art Doli

Security, Privacy, Ethical Issues in Operating Systems

12/08/2013

interaction such as opening an e-mail attachment or downloading and running a file from the Internet. Bots "Bot" is derived from the word "robot" and is an automated process that interacts with other network services. Bots often automate tasks and provide information or services that would otherwise be conducted by a human being. A typical use of bots is to gather information (such as web crawlers), or interact automatically with instant messaging (IM), Internet Relay Chat (IRC), or other web interfaces. They may also be used to interact dynamically with websites. Bots can be used for either good or malicious intent. A malicious bot is self-propagating malware designed to infect a host and connect back to a central server or servers that act as a command and control (C&C) center for an entire network of compromised devices, or "botnet." With a botnet, attackers can launch broad-based, "remote-control," flood-type attacks against their target(s). In addition to the worm-like ability to selfpropagate, bots can include the ability to log keystrokes, gather passwords, capture and analyze packets, gather financial information, launch DoS attacks, relay spam, and open back doors on the infected host. Bots have all the advantages of worms, but are generally much more versatile in their infection vector, and are often modified within hours of publication of a new exploit. They have been known to exploit back doors opened by worms and viruses, which allows them to access networks that have good perimeter control. Bots rarely announce their presence with high scan rates, which damage network infrastructure; instead they infect networks in a way that escapes immediate notice.

Art Doli

Security, Privacy, Ethical Issues in Operating Systems

12/08/2013

Best Practices for Combating Viruses, Worms, Trojans, and Bots

The first steps to protecting your computer are to ensure that your OS is up to date. This means regularly applying the most recent patches and fixes recommended by the OS vendor. Secondly, you should have antivirus software installed on your system and download updates frequently to ensure that your software has the latest fixes for new viruses, worms, Trojans, and bots. You want to make sure that your antivirus program can scan e-mail and files as they are downloaded from the Internet. This will help prevent malicious programs from reaching your computer. You may also want to consider installing a firewall.

How to Respond to a Security Incident


Follow organization's rules Forward email to postmaster Run virus program Backups Software Piracy The act of illegally duplicating software. Internet Piracy The act of illegally gaining access to and using the Internet. Preventing Computer Crime Crime prevention by state and federal agencies Crime prevention by corporations

Biometrics The measurement of a living trait, whether physical or behavioral, for the purpose of protecting important data and information systems.

Art Doli

Security, Privacy, Ethical Issues in Operating Systems

12/08/2013

Software Publishers Association (SPA) An organization formed by a number of leading software companies to audit and check for software licenses. Preventing Computer Crime Antivirus Programs are programs or utilities that prevent viruses or help recover from them if they infect a computer. Proper Use of Antivirus Software would install a virus scanner and run it often. Updating the scan often for viruses is another way of preventing computer crimes. It is also good to scan all diskettes before copying or running programs from them. Install software only from a sealed package produced by a known software company. Follow careful downloading practices. If you detect a virus, take immediate action. Preventing Crime on the Internet Develop effective Internet and security policies for all employees. Use a stand-alone firewall (hardware and software) with network monitoring capabilities. Monitor managers and employees to make sure they are using the Internet for business purposes only. Use Internet security specialists to perform audits of all Internet and network activities.

Privacy Issues
Privacy and the federal government Privacy at work E-mail privacy issues Privacy and the Internet

Art Doli

Security, Privacy, Ethical Issues in Operating Systems

12/08/2013

Protecting Individual Privacy

Find out what is stored about you in existing databases. Be careful when you share information about yourself. Be proactive to protect your privacy. The Work Environment - Health Concerns Ergonomics The study of designing and positioning computer equipment to reduce health problems. Repetitive Motion Disorder Health problems caused by working with computer keyboards and other equipment. Repetitive Stress Injury (RSI) Such problems as tendinitis, tennis elbow, the inability to hold objects, and sharp pain in the fingers. Carpal Tunnel Syndrome (CTS) The aggravation of the pathway for nerves that travel through the wrist (the carpal tunnel). Ethical Issues in Information Systems Organizations that promote ethical issues The Association of Information Technology Professionals (AITP) The Association of Computing Machinery (ACM) The Institute of Electrical and Electronics Engineers (IEEE) Computer Professionals for Social Responsibility (CPSR)

Art Doli

Security, Privacy, Ethical Issues in Operating Systems

12/08/2013

Links:
http://facpub.stjohns.edu/~wolfem/4322/Chapter14/ http://ahmedsalemu089502.blogspot.com/2012/12/information-systems-ethics-privacy-and.html

Das könnte Ihnen auch gefallen