CIS 381: Social & Ethical Issues of Computing
Total Page:16
File Type:pdf, Size:1020Kb
CIS 381: Social & Ethical Issues of Computing Security Dr. David Koop D. Koop, CIS 381, Spring 2019 Hackers, Past and Present • Original meaning of hacker: explorer, risk taker, system innovator (e.g. MIT’s Tech Model Railroad Club in 1950s) • Change in meaning from electronics to computers and networks • WarGames (1983): Hacking military supercomputer • Modern meaning of hacker: someone who gains unauthorized access to computers and computer networks [M. J. Quinn] D. Koop, CIS 381, Spring 2019 !2 Password Advice • Do not use short passwords • Do not rely solely on words from the dictionary • Do not rely on substituting numbers for letters • Do not reuse passwords • Give ridiculous answers to security questions • Enable two-factor authentication if available • Have password recoveries sent to a secure email address [M. J. Quinn] D. Koop, CIS 381, Spring 2019 !3 Case Study: Firesheep • October 2010: Eric Butler released Firesheep extension to Firefox browser • Firesheep made it possible for ordinary computer users to easily sidejack Web sessions • More than 500,000 downloads in first week • Attracted great deal of media attention • Early 2011: Facebook and Twitter announced options to use their sites securely • Evaluate: Was this a good action? [M. J. Quinn] D. Koop, CIS 381, Spring 2019 !4 Viruses • Virus: Piece of self-replicating code embedded within another program (host) • Viruses associated with program files - Hard disks, floppy disks, CD- ROMS - Email attachments • How viruses spread - Diskettes or CDs - Email - Files downloaded from Internet [M. J. Quinn] D. Koop, CIS 381, Spring 2019 !5 Worm • Worm: - Self-contained program 7.3 Malware 329 - Spreads via computer network - Exploits security holes W • Tappen's Internet Worm W W - Released worm onto Internet from W MIT computer - Spread to significant numbers of Unix computers W - Infected computers kept crashing or became unresponsive Figure 7.4 A worm spreads to other computers by exploiting security holes in computer networks. punk: Outlaws and Hackers on the Computer Frontier, written by Katie Hafner and John Markoff [25]. [M. J. Quinn] BACKGROUND OF ROBERT TAPPAN MORRIS JR. D. Koop, CIS 381, Spring 2019 Robert Tappan Morris Jr. began learning about the Unix operating system when he was!6 still in junior high school. His father was a computer security researcher at Bell Labs, and young Morris was given an account on a Bell Labs computer that he could access from a teletype at home. It didn’t take him long to discover security holes in Unix. In a 1982 interview with Gina Kolata, a writer for Smithsonian magazine, Morris admitted he had broken into networked computers and read other people’s email. “I never told myself that there was nothing wrong with what I was doing,” he said, but he acknowledged that he found breaking into systems challenging and exciting, and he admitted that he continued to do it. As an undergraduate at Harvard, Morris majored in computer science. He quickly gained a reputation for being the computer lab’s Unix expert. After his freshman year, Morris worked at Bell Labs. The result of his work was a technical paper describing a security hole in Berkeley Unix. While at Harvard, Morris was responsible for several computer pranks. In one of them, he installed a program that required people logging in to answer a question posed by “the Oracle” and then to ask the Oracle another question. (The Oracle program worked by passing questions and answers among people trying to log in.) Conficker Worm • Conficker (a.k.a. Downadup) worm appeared 2008 on Windows computers • Particularly difficult to eradicate • Uses pseudorandom domains to download from • Different variants released (type E installs malware) • Millions of copies of worm are circulating • Purpose of worm still unknown [M. J. Quinn] D. Koop, CIS 381, Spring 2019 !7 Trojan Horses + Spyware & Adware • Trojan horse: - Program with benign capability that masks a sinister purpose - Performs expected task but also unknown, sinister actions • Backdoor Trojan: Trojan horse that gives attack access to victim’s computer • Spyware: Program that communicates over an Internet connection without user’s knowledge or consent - Log keystrokes or take snapshots of computer screen - Send reports back to host computer • Adware: Type of spyware that displays pop-up advertisements related to user’s activity [M. J. Quinn] D. Koop, CIS 381, Spring 2019 !8 Term Paper • Topics have been assigned • 4-5 people per group • Term papers are individual • Topic presentations are done in groups, but each person should speak for 3-4 minutes • As a group, rank your preferred presentation days - April 17, April 19, April 22, April 24, April 29, May 1 • Individual term papers are due May 6 (assigned exam date) • Need to evaluate issues using ethical frameworks • Groups can choose to examine different issues related to a topic or examine a similar issue using different frameworks D. Koop, CIS 381, Spring 2019 !9 Assignment 5 • Computer Reliability • About radiation treatments and their reliance on increasingly complicated software • Due Monday D. Koop, CIS 381, Spring 2019 !10 Bots • Bot: A kind of backdoor Trojan that responds to commands sent by a command-and-control program on another computer • First bots supported legitimate activities - Internet Relay Chat - Multiplayer Internet games • Other bots support illegal activities - Distributing spam - Collecting person information for ID theft - Denial-of-service attacks [M. J. Quinn] D. Koop, CIS 381, Spring 2019 !11 Botnets and Bot Herders • Botnet: Collection of bot-infected computers controlled by the same command-and-control program • Bot herder: Someone who controls a botnet • Some botnets have over a million computers in them [M. J. Quinn] D. Koop, CIS 381, Spring 2019 !12 Defensive Measures • Security patches: Code updates to remove security vulnerabilities • Anti-malware tools: Software to scan hard drives, detect files that contain viruses or spyware, and delete these files • Firewall: A software application installed on a single computer that can selectively block network traffic to and from that computer [M. J. Quinn] D. Koop, CIS 381, Spring 2019 !13 Cyber Crime and Cyber Attacks • Internet sales over $1 trillion annually • Organized crime and politically motivated attacks • Various types of attacks - Phishing - SQL Injection - Distributed Denial of Service (DDOS) D. Koop, CIS 381, Spring 2019 !14 Phishing and Spear-phishing • Phishing: Large-scale effort to gain sensitive information from gullible computer users - At least 67,000 phishing attacks globally in second half of 2010 - New development: phishing attacks on Chinese e-commerce sites • Spear-phishing: Variant of phishing in which email addresses chosen selectively to target particular group of recipients [M. J. Quinn] D. Koop, CIS 381, Spring 2019 !15 Bobby Tables [xkcd] D. Koop, CIS 381, Spring 2019 !16 SQL Injection • Method of attacking a database-driven Web application with improper security • Attack inserts (injects) SQL query into text string from client to application • Application returns sensitive information [M. J. Quinn] D. Koop, CIS 381, Spring 2019 !17 DoS and DDoS Attacks • Denial-of-service (DoS) attack: Intentional action designed to prevent legitimate users from making use of a computer service • Aim of a DoS attack is not to steal information but to disrupt a server’s ability to respond to its clients • Distributed denial-of-service attack (DDoS): DoS attack launched from many computers, such as a botnet [M. J. Quinn] D. Koop, CIS 381, Spring 2019 !18 Cyber Crime • Criminal organizations making significant amounts of money from malware • Jeanson James Ancheta • Blue Security and Pharmamaster • Albert Gonzalez • Avalanche Gang [M. J. Quinn] D. Koop, CIS 381, Spring 2019 !19 The Rise and Fall of Blue Security • Blue Security: An Israeli company selling a spam deterrence system • Blue Frog bot would automatically respond to each spam message with an opt-out message • Spammers started receiving hundreds of thousands of opt-out messages, disrupting their operations • 6 of 10 of world’s top spammers agreed to stop sending spam to users of Blue Frog [M. J. Quinn] D. Koop, CIS 381, Spring 2019 !20 The Rise and Fall of Blue Security • One spammer (PharmaMaster) started sending Blue Frog users 10-20 times more spam • PharmaMaster then launched DDoS attacks on Blue Security and its business customers • Blue Security could not protect its customers from DDoS attacks and virus-laced emails • Blue Security reluctantly terminated its anti-spam activities [M. J. Quinn] D. Koop, CIS 381, Spring 2019 !21 Politically Motivated Cyber Attacks • Estonia (2007) • Georgia (2008) • Georgia (2009) • Exiled Tibetan Government (2009) • United States and South Korea (2009) • Iran (2009) • Espionage attributed to People’s Liberation Army • Anonymous [M. J. Quinn] D. Koop, CIS 381, Spring 2019 !22 Attacks on Social Networking Sites • Massive DDoS attack made Twitter service unavailable for several hours on August 6, 2009 • Three other sites attacked at same time: Facebook, LiveJournal, and Google • All sites used by a political blogger from the Republic of Georgia • Attacks occurred on first anniversary of war between Georgia and Russia over South Ossetia [M. J. Quinn] D. Koop, CIS 381, Spring 2019 !23 Fourth of July Attacks • 4th of July weekend in 2009: DDoS attack on governmental agencies and commercial Web sites in United States and South Korea • Attack may have been launched by North Korea in retaliation for United Nations