Session6 BCS428
Session6 BCS428
Slide 3
BCS 428– LEGAL & ETHICAL ISSUES IN COMPUTER SCIENCE
Topic One
•
BCS 428– LEGAL & ETHICAL ISSUES IN COMPUTER SCIENCE Slide 10
Worms
• Pieces of programming code
• Usually disguised as something else
• Cause unexpected and undesirable behavior
• Often attached to files
• Deliver a “payload”
• Spread by actions of the “infected” computer user
• Infected e-mail document attachments
• Downloads of infected programs
• Visits to infected Web sites
BCS 428– LEGAL & ETHICAL ISSUES IN COMPUTER SCIENCE
Slide 11
Trojan Horses
• Malicious code hidden inside seemingly harmless
programs
• Users are tricked into installing them
• Delivered via email attachment, downloaded from a Web
site, or contracted via a removable media device
• Logic bomb
– Executes when triggered by certain event
IMPLEMENTING TRUSTWORTHY
COMPUTING
BCS 428– LEGAL & ETHICAL ISSUES IN COMPUTER SCIENCE Slide 26
Implementing Trustworthy
Computing
• Trustworthy computing
– Delivers secure, private, and reliable computing
– Based on sound business practices
• Eradication effort
– Collect and log all possible criminal evidence
– Verify necessary backups are current and complete
– Create new backups
• Follow-up
– Determine how security was compromised
• Prevent it from happening again
BCS 428– LEGAL & ETHICAL ISSUES IN COMPUTER SCIENCE Slide 44
Computer Forensics
• Combines elements of law and computer science to
identify, collect, examine, and preserve data and
preserve its integrity so it is admissible as evidence