BASICINFOSECWEEK4
BASICINFOSECWEEK4
INTERNETCRIME
2
WEEK 4 QUOTE
It is a fairly open secret that almost all systems
can be hacked, somehow. It is a less spoken of
secret that such hacking has actually gone quite
COMPUTER AND mainstream. - Dan Kaminsky
I. INTRODUCTION
Now a days, People started think that hacking is only hijacking Facebook
accounts or defacing websites. Yes, it is also part of hacking field but it doesn’t
mean that it is the main part of hacking. The main thing you need to become a
hacker is self-interest. You should always ready to learn something and learn to
create something new
II. LEARNING OBJECTIVES
At the end of the topic session the students are expected to:
∙ identify the primary perpetrators of computer crime, and what are their
objectives;
Malicious Insiders
• Major security concern for companies
• Fraud within an organization is usually due to
weaknesses in internal control procedures
• Collusion
– Cooperation between an employee and an outsider
• Insiders are not necessarily employees
– Can also be consultants and contractors
• Extremely difficult to detect or stop
– Authorized to access the very systems they abuse
• Negligent insiders have potential to cause damage
Industrial Spies
• Major security concern for companies
• Fraud within an organization is usually due to
weaknesses in internal control procedures
• Collusion
– Cooperation between an employee and an outsider
• Insiders are not necessarily employees
– Can also be consultants and contractors
• Extremely difficult to detect or stop
– Authorized to access the very systems they abuse
• Negligent insiders have potential to cause damage
Cybercriminals
Major security concern for companies
• Fraud within an organization is usually due to
weaknesses in internal control procedures
• Collusion
– Cooperation between an employee and an outsider
• Insiders are not necessarily employees
– Can also be consultants and contractors
• Extremely difficult to detect or stop
– Authorized to access the very systems they abuse
• Negligent insiders have potential to cause damage
• Smart cards
• Contain a memory chip
• Updated with encrypted data each time card is used
• Used widely in Europe
• Not widely used in the U.S.
Risk Assessment
• Process of assessing security-related risks:
– To an organization’s computers and networks
– From both internal and external threats
• Identifies investments that best protect from most
likely and serious threats • Focuses security efforts
on areas of highest payoff
Prevention
• Implement a layered security solution
– Make computer break-ins harder
• Installing a corporate firewall
– Limits network access
• Intrusion prevention systems
– Block viruses, malformed packets, and other threats
• Installing antivirus software
2.ANALYSIS:
1. Fill in the blanks:
3.ABSTRACTION:
4.ASSESSMENT:
Instruction: Read the case below and answer the questions that
follows. Write your answer in a one whole sheet long bond
paper.
1.SITUATION 1:
It appears that someone is using your firm’s corporate
directory—which includes job titles and email addresses—to
contact senior managers and directors via email. The email
requests that the recipient click on a URL, which leads to a Web
site that looks as if it were designed by your Human Resources
organization. Once at this phony Web site, the employees are
asked to confirm the bank and account number to be used for
electronic deposit of their annual bonus check. You are a
member of IT security for the firm. What can you do?
2.SITUATION 2:
You are a member of the Human Resources Department
of a three-year-old software manufacturer that has several
products and annual revenue in excess of $500 million. You’ve
just received a request from the manager of software
development to hire three notorious crackers to probe your
company’s software products in an attempt to identify any
vulnerabilities. The reasoning is that if anyone could find a
vulnerability in your software, they could. This will give your
firm a head start on developing patches to fix the problems
before anyone can exploit them. You’re not sure, and you feel
uneasy about hiring people with criminal records and
connections to unsavory members of the hacker/ cracker
community. What would you do?
IV. REFERENCES: