Masyarakat dan Teknologi Informasi Masa Kini Pertemuan 21

advertisement
Matakuliah
Tahun
Versi
: T0604-Pengantar Teknologi Informasi
: 2008
: 2.0/0.0
Pertemuan 21
Masyarakat dan Teknologi
Informasi Masa Kini
Sumber:
Chapter 9. The Challenges of
Digital Age: Society and IT, p.463
Williams, B.K, Stacy C. Sawyer (2007).
Using Information Technology: A
Practical Introduction to Computers &
Communications. Seventh Edition,
McGraw-Hill, New York. ISBN-13: 978-007-110768-6
1
Learning Outcomes
Pada akhir pertemuan ini, diharapkan mahasiswa
akan mampu :
• menjelaskan: bagaimana data digital
digunakan utk membodohi orang lain, dan
dapat menjelaskan jenis-jenis ancaman
pada komputer, dan karakteristik dari lima
komponen sekuriti (C2)
2
Outline Materi
• Truth Issues: Manipulating Digital Data
• Security Issues: Threats
• Security: Safeguarding Computers &
Communications
3
Truth Issues: Manipulating
Digital Data
• Digital Images and Sounds can be manipulated
– Pro: Creates new forms of art
• Morphing software makes one image morph into another
http://www.cs.utah.edu/~dejohnso/morph.html
• Movies such as “Crouching Tiger, Hidden Dragon” and
“Harry Potter” contain many scenes that could never actually
happen
• Adobe Photoshop allows changes, enhancements to photos
• Digital technology allows musicians to sing every track of a
song and accompany themselves
– Con: Has made photographs & recordings
untrustworthy
• Famous Yalta summit photo edited: Stallone added in!
9-4
Truth Issues: Manipulating
Digital Data
– Photographs may not be authentic
– Photographs may be deliberately misleading
• 1994 Time magazine photo of O.J. Simpson was
digitally darkened to make him appear sinister
– Could this have biased potential jury members?
• Fashion model photos are routinely elongated to
make models appear more slender
– How many girls become anorexic to try to match those
models’ impossible perfection?
» http://www.etniesgirl.com/blog/2005/11/30/photoshop
-101-even-models-have-flaws
» http://www.tutorialized.com/tutorial/Basic-ModelRetouching/9547
» http://news.bbc.co.uk/1/hi/health/769290.stm
9-5
Truth Issues: Manipulating
Digital Data
• Techniques to combat digital deception
– Prof. William H. Mitchell of M.I.T. wrote the first
systematic, critical analysis of the digital revolution
– Corbis http://pro.corbis.com/ adds a digital watermark
to its photos
– Hany Farid of Dartmouth College devised algorithms
to detect changes to uncompressed digital photos
– Prof. Jessica Fridrich of S.U.N.Y. at Binghamton is
researching digital cameras that hide a picture of the
photographer’s iris inside each digital photo
9-6
Truth Issues: Manipulating
Digital Data
• Limitations of Public databases
– You can’t get the whole story
• Start with a public database, THEN do more research
– The data is not necessarily accurate
• Cross-check against multiple sources
– Each database service has boundaries
• Know what those boundaries are
– Different keywords bring different results
– History is limited
• These databases often begin with data from 1980 or later
9-7
Security Issues: Threats
•
•
•
•
Errors and accidents
Natural hazards
Computer crime
Computer criminals
9-8
Is my computer safe?
I’m concerned about it. What
do I need to do to use it
safely for work, home, and
school?
Security Issues: Threats
Errors & Accidents
• Human errors
– People choose the wrong computer
• Too simple or too complex
– Human emotions affect performance
• People get frustrated
– Human perceptions are slower than the
equipment
• Watch out when you click the OK button! You may
have just deleted something important!
9-9
Security Issues: Threats
Errors & Accidents
• Procedural errors
– When people fail to follow safe procedures, errors can
occur
• Software errors
– Programmers make coding errors
– Famous example: Utility billing software:
• Customer pays early – software credits account
• Customer pays late – software credits account, adds late fee
in for next bill
• Programmer forgot to consider customers who pay exactly
on time – their payments were never credited at all!
9-10
Security Issues: Threats
Errors & Accidents
• Electromechanical problems
– Mechanical systems wear out
– Power failures shut down computers unless you have
battery backup
– Using cellphones and Blackberries while driving can
cause people to crash
• Dirty data problems
– Incomplete, updated, or inaccurate data
– Check your records – medical, school, and credit to
make sure they are accurate
• Natural hazards can lead to disasters
9-11
Security Issues: Threats
Computer Crimes
• Two types of computer crime
– It can be an illegal act perpetrated against
computers or telecommunications
– It can be the use of computers or
telecommunications to accomplish an illegal
act
9-12
Security Issues: Threats
Computer Crimes
•
•
•
•
•
•
•
•
•
Theft of hardware
Theft of software
Theft of online music and videos
Theft of time and services
Theft of information
Internet-related fraud
Taking over your PC
Crimes of malice
Computer criminals
9-13
Security Issues: Threats
Computer Crimes
• Theft of hardware can range from
– Shoplifting an item from a computer store
– Stealing an entire PC or laptop
• Theft of software
– Pirated software is software obtained illegally
– This includes “softlifting” - buying one copy of the
software and using it on multiple computers
– Software makers have prosecuted both
companies and individuals including students for
software piracy
9-14
Security Issues: Threats
Computer Crimes
• Theft of online music and movies
– Entertainment industry takes this seriously
and prosecutes offenders
– Stealing music
• Illegal file swapping services
• Damages can be up to $150,000 per song
– Stealing movies
• The film industry has taken aggressive aim at
pirated movies
• 11-nation crackdown announced in 2005
9-15
Security Issues: Threats
Computer Crimes
• Theft of time and services
– Theft of computer time at work
• Surfing or playing games when you should be working
• Some employees violate policy by conducting personal
business online such as online auctions from work
• Most employers have policies against viewing X-rated
web sites at work
– Theft of phone services
• Phone phreaks use company phone systems to make
“free” unauthorized long distance calls
• Why break the law, when you can get free long
distance over the internet using skype www.skype.com
9-16
Security Issues: Threats
Computer Crimes
• Theft of Information
– A common crime today
– Can include theft of personal information, medical
information, or credit card and financial information
– Legislation to make it a crime to steal someone’s
identity was the 1998 Identity Theft and Assumption
Deterrence Act
– The U.S. Department of Justice discusses their
approach to this crime at
http://www.usdoj.gov/criminal/fraud/idtheft.html
– If you are a victim of identity theft, you may file a
report online at the Federal Trade Commission’s
website at
https://rn.ftc.gov/pls/dod/widtpubl$.startup?Z_ORG_CODE=PU03
9-17
Security Issues: Threats
Computer Crimes
• Internet-related Fraud
– Because it lends itself to anonymity, internetrelated fraud is becoming more common
– Well-known examples include:
• Nigerian letter scam
– Letter says you can get a lot of money out of Nigeria if
you pay a “money transfer fee” first
• Evil twin attacks
– A cracker sets up an attack computer as a duplicate
public access point in a public location
• Phishing
– Sending emails that appear to come from a trusted
source that links you to a website where you type in
personal information that is intercepted by the phisher
9-18
Security Issues: Threats
Computer Crimes
• Internet-related Fraud (continued)
– Pharming
• Malicious software is implanted in your computer that
directs you to an imposter web page
– Trojan horses
• A program such as a “free” online game or
screensaver that loads hidden programs that take
over your computer or cause mischief without your
knowledge
• For example, Windows users who install the phony
MSN Messenger Version 8 "beta" are actually
installing an IM worm that spreads to their IM
contacts, and connects their computer to a remote
control "bot" network run by malicious hackers
9-19
Security Issues: Threats
Computer Crimes
• Crimes of Malice: Crashing entire computer systems
– Sometimes criminals are more interested in vandalizing
systems than they are in gaining control of them
– In 2003, an entrepreneur with a grudge because he lost a
sale retaliated by shutting down the WeaKnees website
– Crackers regularly attempt to crash Microsoft’s website
– Security specialists monitor for possible cyber-attacks on
electrical and nuclear power plants, dams, and air traffic
control systems
– Crackers have attacked the internet too and brought down
large sections of it
9-20
Security Issues: Threats
Computer Crimes
• Computer criminals may include
– Individuals or small groups who
• Use fraudulent email and websites
• Steal peoples’ identities for monetary gains
• Show off their power for bragging rights
– Employees who
• Have a grudge against their current or former
employers
• Have a grudge against another employee
• Sell their company’s secrets for personal profit
– Outside partners and company suppliers
9-21
Security Issues: Threats
Computer Crimes
• Computer criminals may also include
–
–
–
–
Corporate spies
Enemy foreign intelligence services
Organized crime
Terrorists
• Computer criminals do not include your
employer, who is legally allowed to monitor the
computers at work
– Check your company’s computer usage policy
– Make sure you follow the rules
– Know that any data you store in the computer at work
– including emails – is company property
9-22
Security: Safeguarding
Computers & Communications
• Security is
– A system of safeguards for protecting information
technology against disasters, system failures, and
unauthorized access that can result in damage or loss
• Computer Security’s Five Components
–
–
–
–
–
Deterrence of computer crime
Identification and access
Encryption
Protection of software and data
Disaster recovery plans
9-23
Security: Safeguarding
Computers & Communications
• Deterrents to computer crime
– Enforcing laws
– CERT: The Computer Emergency Response Team
• Provides round-the-clock information on international
computer security threats
• The CERT website is www.cert.org
– For example, on December 15, 2005 announced a
partnership between the US and ictQatar, the Qatar
Supreme Council for Information and
Communications Technology, to conduct and
coordinate cybersecurity activities
– On December 13, 2005 CERT issued alert SA05347A documenting Windows Explorer vulnerabilities
9-24
Security: Safeguarding
Computers & Communications
• More deterrents to computer crimes
– Tools to fight fraudulent and unauthorized online uses
• Rule-based detection software
• Predictive-statistical-model software
• Employee internet management software
• Internet filtering software
• Electronic surveillance
– Verify legitimate right of access
• Use cards, keys, signatures, and badges
• Use PINs and passwords
• Use physical traits and personal identification
9-25
Security: Safeguarding
Computers & Communications
• Encryption
– The process of altering readable data into unreadable
form to prevent unauthorized access
– Advantage: encrypting data that is available over the
internet keeps thieves and crackers from reading it
• On Dec. 7, 2005, Guidance Software, a maker of Computer
Forensics software, informed their customers that criminals had
stolen their credit cards because Guidance had FAILED to encrypt a
database that was accessible over the internet
– Disadvantage: encrypting data may prevent lawenforcement officials from reading the data criminals are
sending to each other
Discussion Question: Does information privacy outweigh law enforcement’s needs to
track down and prosecute criminals? Should we all encrypt our information to
prevent crackers and criminals from stealing it?
9-26
Security: Safeguarding
Computers & Communications
• 4 ways to protect software & data
– Educate employees in backing up data, virus
protection, and not sharing passwords
– Control of access to restrict usage
– Audit controls to document who used what
programs and computers and when
– People controls include screening applicants,
background checks, monitoring internet,
email, and computer usage
9-27
Security: Safeguarding
Computers & Communications
• Disaster-recovery plans
– A method of restoring information-processing operations that
have been halted by destruction or accident
• Reinforced by 2001 World Trade Center attack
• Reinforced by company data losses incurred during 2005
Hurricane Katrina
– Plans range in price and complexity from
• Backing up data from disk to tape, CD, or zip disk, with a UPS
• Automatically storing data redundantly in two places, with a
generator
• Having an off-site computerized data storage center with
independent power supply
• Having a complete “hot” redundant data center that can instantly
be used if there is a disaster
More $$$
9-28
Kesimpulan
29
Download