19
Computer Security Computer Security Ethics Ethics Mehrdad Saadatmand Mehrdad Saadatmand

Computer Security Ethics

Embed Size (px)

DESCRIPTION

Computer Security Ethics. Mehrdad Saadatmand. Before we start…. Being ethical is not necessarily following one’s feelings; “feelings frequently deviate from what is ethical“ - PowerPoint PPT Presentation

Citation preview

Computer Security Ethics Computer Security Ethics

Mehrdad SaadatmandMehrdad Saadatmand

Before we start…Before we start…Being ethical is not necessarily following one’s feelings; Being ethical is not necessarily following one’s feelings; “feelings frequently deviate from what is ethical““feelings frequently deviate from what is ethical“Often because of the way one is raised, ethics and religion are coupled; Often because of the way one is raised, ethics and religion are coupled; but ethics is not confined to religion nor is the same as religionbut ethics is not confined to religion nor is the same as religionBeing ethical is not solely following the law.Being ethical is not solely following the law.

Elements of practical ethics through basic philosophy:Elements of practical ethics through basic philosophy: Ethical thoughtEthical thought Ethical definitionEthical definition Ethical valuesEthical values

Example: “If a person conceives of engineering activity as only making Example: “If a person conceives of engineering activity as only making money, then one's definition of practical ethics, one's actions and values money, then one's definition of practical ethics, one's actions and values will, be guided by this basic philosophical position. “ will, be guided by this basic philosophical position. “

Security in:Security in:Client / Workstation / TerminalClient / Workstation / TerminalIntra-networks Intra-networks Inter-networksInter-networks

In terms of:In terms of:Physical SecurityPhysical SecurityNon-Physical SecurityNon-Physical Security

Security Threats Security Threats (sources, causes, people behind)(sources, causes, people behind) : :

HackersHackers CrackersCrackers Script KiddiesScript Kiddies Unethical Employees Unethical Employees (logic bombs, backdoor,…)(logic bombs, backdoor,…)

CyberterroristsCyberterrorists Corporate SpyCorporate Spy Worm / Virus / Trojan Worm / Virus / Trojan (incl. keyloggers,…)(incl. keyloggers,…)

Spoofing / Sniffing / PhishingSpoofing / Sniffing / Phishing DoS / DDoS attacksDoS / DDoS attacks Hoax / SpamHoax / Spam ......

Examples:Examples:

Examples (cont):Examples (cont):

Remote Access VPN Site to Site (Router to Router) VPN

Virtual Private Network (VPN)

Generic Routing Encapsulation (GRE) Encapsulation Security Payload (ESP)

Example of Phishing:

Hacker creed (Steven Levy’s “Hackers: Heroes of Hacker creed (Steven Levy’s “Hackers: Heroes of Computer Revolution” - 1984 ):Computer Revolution” - 1984 ):

Access to computers should be unlimited and Access to computers should be unlimited and total. total. Always yield to the Hands-On Imperative Always yield to the Hands-On Imperative All information should be free. All information should be free. Mistrust authority -- promote decentralization. Mistrust authority -- promote decentralization. Hackers should be judged by their hacking. Hackers should be judged by their hacking. You can create art and beauty on a computer. You can create art and beauty on a computer. Computers can change your life for the better. Computers can change your life for the better.

Hackers’ Code of Ethics:Hackers’ Code of Ethics:

"Above all else, do no harm""Above all else, do no harm" Protect PrivacyProtect Privacy "Waste not, want not.""Waste not, want not." Exceed LimitationsExceed Limitations The Communicational ImperativeThe Communicational Imperative Leave No TracesLeave No Traces Share!Share! Self DefenseSelf Defense Hacking Helps SecurityHacking Helps Security Trust, but Test!Trust, but Test!

In Short : In Short : 1) protect data and hardware 2) respect and protect 1) protect data and hardware 2) respect and protect privacy 3) utilize what is being wasted by others 4) exceed privacy 3) utilize what is being wasted by others 4) exceed unnecessary restrictions 5) promote peoples' right to unnecessary restrictions 5) promote peoples' right to communicate 6) leave no traces 7) share data and software 8) communicate 6) leave no traces 7) share data and software 8) be vigilant against cyber-tyranny and 9) test security and be vigilant against cyber-tyranny and 9) test security and system integrity of computer systems.system integrity of computer systems.

New Code of Ethics (90s) - Steven Mizrach :New Code of Ethics (90s) - Steven Mizrach :

New(er) Hacker Ethics:New(er) Hacker Ethics:Hackers share and are willing to teach their knowledge. Hackers share and are willing to teach their knowledge. Hackers are skilled. Many are self-taught, or learn by Hackers are skilled. Many are self-taught, or learn by interacting with other hackers. interacting with other hackers. Hackers seek knowledge. This knowledge may come from Hackers seek knowledge. This knowledge may come from unauthorized or unusual sources, and is often hidden. unauthorized or unusual sources, and is often hidden.

Hackers like to understand how things work, and want to Hackers like to understand how things work, and want to make their own improvements or modifications. make their own improvements or modifications.

Hackers often disagree with authority, including parents, Hackers often disagree with authority, including parents, employers, social customs and laws. They often seek to get employers, social customs and laws. They often seek to get around authority they disagree with. around authority they disagree with.

Hackers disagree with each other. Different hackers have Hackers disagree with each other. Different hackers have different values, and come from all backgrounds. This different values, and come from all backgrounds. This means that what one hacker is opposed to might be means that what one hacker is opposed to might be embraced by another. embraced by another.

New(er) Hacker Ethics:New(er) Hacker Ethics:

Hackers are persistent, and are willing to devote hours, days and Hackers are persistent, and are willing to devote hours, days and years to pursuing their individual passions. years to pursuing their individual passions.

This Code is not to prescribe how hackers act. Instead, it is to This Code is not to prescribe how hackers act. Instead, it is to help us to recognize our own diversity and identity. help us to recognize our own diversity and identity.

Every hacker must make his or her own decisions about what is Every hacker must make his or her own decisions about what is right or wrong, and some might do things they believe are illegal, right or wrong, and some might do things they believe are illegal, amoral or anti-social. amoral or anti-social.

Hackers' motivations are their own, and there is no reason for all Hackers' motivations are their own, and there is no reason for all hackers to agree. hackers to agree. Hackers have a shared identity, however, and many shared Hackers have a shared identity, however, and many shared interests. interests.

By reading this Code, hackers can recognize themselves and By reading this Code, hackers can recognize themselves and each other, and understand better the group they are a part of.each other, and understand better the group they are a part of.

Hackers’ Code of Ethics:Hackers’ Code of Ethics:

Old code vs new codeOld code vs new code

Are new hackers aware of the original Are new hackers aware of the original hacker ethics?hacker ethics?

Are new hackers aware of any hacker Are new hackers aware of any hacker ethics?ethics?

Influence of technology and social issues Influence of technology and social issues on changes in hacker ethicson changes in hacker ethics

Similarity between the old and new ethics Similarity between the old and new ethics and ethical continuityand ethical continuity

Ethical Issues in Security CoursesEthical Issues in Security Courses

More security subjects are moved from graduate level to More security subjects are moved from graduate level to undergraduate level ; graduate students are more undergraduate level ; graduate students are more mature than undergraduate onesmature than undergraduate ones

Are security courses’ materials really appropriate? (some Are security courses’ materials really appropriate? (some include: trying DDOS, writing and spreading a virus,…)include: trying DDOS, writing and spreading a virus,…)

Major of computer hackers are under the age of 25 and Major of computer hackers are under the age of 25 and many of them are college studentsmany of them are college students

Using hacking tools in labs and classes increases Using hacking tools in labs and classes increases “comfort level” with such tools “comfort level” with such tools the more comfortable the more comfortable people become with one computer technology, the more people become with one computer technology, the more likely they are to use themlikely they are to use them

Ethical Issues in Security CoursesEthical Issues in Security Courses

There are many justifications for teaching such There are many justifications for teaching such sensitive issues: to strengthen the nations sensitive issues: to strengthen the nations defense against attacks. But do we need to defense against attacks. But do we need to know the details of how to make a bomb in order know the details of how to make a bomb in order to defend ourselves against bomb attacks? to defend ourselves against bomb attacks? Using password crackers is not necessary to Using password crackers is not necessary to teach the dangers of using weak and insecure teach the dangers of using weak and insecure passwords.passwords.

“Students would learn them on their own Students would learn them on their own anyway. We are presenting this material in a anyway. We are presenting this material in a responsible manner.” The big question is : how responsible manner.” The big question is : how to really present this material in a responsible to really present this material in a responsible manner ?manner ?

Requiring students to sign a statement and take an Requiring students to sign a statement and take an ethical oath? Teaching ethical issues as part of a ethical oath? Teaching ethical issues as part of a course? Problem: ethical standards cannot be integrated course? Problem: ethical standards cannot be integrated in individuals just over a short period of time!in individuals just over a short period of time!

Ethical subjects are necessary especially in computer Ethical subjects are necessary especially in computer security curricula. Ethical standards should be taught to security curricula. Ethical standards should be taught to students early in the program and students should be students early in the program and students should be reminded of them throughout the program. reminded of them throughout the program.

Students should become aware about the consequences Students should become aware about the consequences of misuse of their knowledgeof misuse of their knowledge

Ethical Issues in Security CoursesEthical Issues in Security Courses

The problem of “deindividualism” (group size, anonymity)The problem of “deindividualism” (group size, anonymity) “ “Deindividualism is a feeling of separation and anonymity Deindividualism is a feeling of separation and anonymity

that can lead to individuals engaging in a broader range that can lead to individuals engaging in a broader range of unethical behaviors.”of unethical behaviors.”

““Deindividuation is the psychological state of separation Deindividuation is the psychological state of separation of the individual from others“ It is often seen in of the individual from others“ It is often seen in chatrooms and message boards.chatrooms and message boards.

Making students aware that they are trusted with Making students aware that they are trusted with something important encourages them to live up to that something important encourages them to live up to that trust.trust.

Sensitive topics should be taught and discussed at Sensitive topics should be taught and discussed at higher levels of a program.higher levels of a program.

Ethical Issues in Security CoursesEthical Issues in Security Courses