Introduction to Security and Ethics in Cyberspace
Introduction to Security and Ethics in Cyberspace
04 Case Study
What is Cybersecurity?
Most of today’s cars and trucks are practically rolling laptops, with a wide array
of important vehicle systems controlled by sophisticated onboard computers.
Many of them also have the capacity to use Wi-Fi and Bluetooth to
communicate with passenger devices, cell networks and the internet, making
them also resemble smartphones on wheels.
• Control measures are the various security controls used to safeguard information,
devices and networks, such as card-restricted access to certain computing
resources, antivirus software that monitors network activity, password protection for
accounts and computers, and special approval procedures for a defined set of high-
risk operations.
These are the IT devices individuals use every day—the smartphones, tablets,
laptops and desktop computers we use for school, work or personal purposes.
Every one of these devices constitutes a potential point of entry for hackers,
which is why we use passwords, antivirus software, network firewalls and other
cybersecurity measures to keep our individual devices safe.
Many economists will tell you that if you really want to make money, you need
to get into the financial sector: firms that make money in the business of
investing money itself, including investment firms, banks, and mortgage
lenders. This of course makes such firms attractive targets to hackers. In 2016
and 2017, a single hacker group called MoneyTaker conducted 20 confirmed
attacks on financial institutions in the United States, Russia and the United
Kingdom, stealing in excess of $11 million from the companies.
At the federal level, IT systems contain valuable state secrets. For example,
hackers likely working for the Chinese government hacked into the U.S. Office
of Personnel Management and stole records on 4.2 million people in 2014 and
2015, including the highly confidential forms people filled out to qualify for
classified, secret and top-secret security clearances.
When it comes to protecting their own systems and information, the greatest
threats facing federal organizations are malicious outsider hacks and
inadvertent breaches caused by negligent employees or contractors.
Government
• State governments are taking steps to fend off criminal hackers, but they’re
also concerned about the difficulties they face in trying to obtain the
personnel and funding they need to fix known vulnerabilities in a timely
fashion. Some states are doing a great job of allocating resources to
cybersecurity and implementing best practices; others, not so much
• Local governments are facing the same challenges but even more so, which
is why a number of city government IT systems have recently fallen prey to
costly attacks.
The internet of things (IoT) allows us to use a doorbell camera to check on our
porch activity from work, or to turn our lights or music on or off by telling the
smart home assistant what to do. You can even use the IoT to track the
temperature in an aquarium.
Where needed?
• Automobile
Key points
• Energy Firm
• Cybersecurity
• End Users
• Ransomware
• Government
• Network Firewalls
• Business
• Financial Sectors
• IoT
End of Lecture 1
[email protected]