Computer Waste: inappropriate use of computer technology and resources
- Computer related mistakes: errors, failures, and other computer problems that make computer output incorrect or not useful
Causes of computer waste: Improper management of information systems and resources
- Discarding of old software/computer systems when they still have value
- Building and maintaining complex systems that are not used to their fullest extent
- Using corporate time/technology for personal use
- Spam
Preventing computer release waste and mistakes:
- Establishing policies and procedures (for proper waste disposal)
- Implementing policies and procedures
- Monitoring policies and procedures
- Reviewing policies and procedures
Computer Crime: often defies detection, is the theft of intellectual property. Criminals require two tools to be able to commit computer crimes:
- Knowing how to access computer systems
- Manipulating the system to produce desired result
Examples:
- Social engineering
- Dumpster diving
- Counterfeit and banking fraud using legitimate desktop publishing programs
Cyberterrorist: someone who intimated or coerces a government or organisation to advance their political or social objectives by launching computer based attacks against computers or networks
- The goal is to gather all information stored in them
Identity Theft: imposter obtains key pieces of personal identification information to impersonate someone else
Illegal access and use of information:
- Hacker: learns about and uses computer systems
- Criminal hacker (cracker): gains unauthorised use or illegal access to computer systems
- Script bunnies: automate the job of crackers
- Insider: employee who compromises corporate systems
- Malware: software programs that destroy or damage processing
- Virus: computer program file capable of attaching to disks or other files and replicating itself repeatedly
- without the owner’s permission
Worm: parasitic computer program that can create copies of itself on infected computer or send copies to other computers via a network
- Trojan horse: malicious program that disguises itself as a useful application and purposefully does something the user does not expect
- Logic bomb: type of trojan horse that executes when specific conditions occur
- Triggers for logic bombs include a change in a file by a particular series of keystrokes or at a specific time or date
Avoiding viruses and worms:
- Installing antivirus software on your device
- Update antivirus software regularly
- Backup files regularly
- Do not open suspicious files or links
Antivirus program: software that runs in the background to protect your computer from dangers lurking on the internet and other possible sources of infected files
- Tips:
- Run and update antivirus software
- Scan all CD’s before using them
- Only install softwares from well-known websites
- Take immediate action if a virus is detected
Software Piracy: act of illegally duplicating software
Internet software piracy: illegally downloading software from the internet
- Most rapidly expanding type of software piracy
- Most difficult to combat
- Can be served penalties
- Examples: pirate Websites, auction sites that offer counterfeit software, peer-to-peer networks
Phishing: gaining access to personal information by redirecting user to fake site
Crime prevention by corporations:
- Public key infrastructure (PKI): enables users of an unsecured public network such as the internet to securely and privately exchange data
- Uses public and private cryptographic key pair that is obtained and shared through a trusted authority
- Biometrics: measurement of one of a person's traits, whether physical or behavioural
Using intrusion detection software:
- Intrusion detection system (IDS): software that monitors system and network resources and notifies network security personnel when it senses a possible intrusion
- Intrusion activities: failed login attempts, suspicious behaviour
- Can provide false alarms
- Email or voice message alerts may be missed
- Managed security service provider (MSSP): organisational that monitors, managers, and maintains network security for both hardware and software
- Sifts through alarms and alerts from all monitoring systems
- May provide scanning, blocking, and filtering capabilities
Platform for privacy preferences (P3P): Screening technology that shields users from websites that do not provide the level of privacy protection they desire
Ergonomics: science of designing machines, products, and systems to maximise the safety, comfort, and efficiency of the people who use them
Code of ethics: states the principles and core values that are essential to a set of people and thus governs their behaviour