cs 4001: computing, society & professionalism · • increasing use of computers ®growing...

48
CS 4001: Computing, Society & Professionalism Munmun De Choudhury | Assistant Professor | School of Interactive Computing Week 12: Computer and Network Security March 30, 2017

Upload: others

Post on 09-Oct-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: CS 4001: Computing, Society & Professionalism · • Increasing use of computers ®growing importance of computer security. 7.2 Hacking. Hackers, Past and Present ... people to do

CS 4001: Computing, Society & ProfessionalismMunmun DeChoudhury |AssistantProfessor|SchoolofInteractiveComputing

Week 12: Computer and Network SecurityMarch 30, 2017

Page 2: CS 4001: Computing, Society & Professionalism · • Increasing use of computers ®growing importance of computer security. 7.2 Hacking. Hackers, Past and Present ... people to do

Chapter Overview

• Introduction

• Hacking

• Malware

• Onlinevoting

• Cybercrimeandcyberattacks

Page 3: CS 4001: Computing, Society & Professionalism · • Increasing use of computers ®growing importance of computer security. 7.2 Hacking. Hackers, Past and Present ... people to do

7.1 Introduction

• Computersgettingfasterandlessexpensive

• Utilityofnetworkedcomputersincreasing§ Shoppingandbanking§ Managingpersonalinformation§ Controllingindustrialprocesses

• Increasinguseofcomputers® growingimportanceofcomputersecurity

Page 4: CS 4001: Computing, Society & Professionalism · • Increasing use of computers ®growing importance of computer security. 7.2 Hacking. Hackers, Past and Present ... people to do

7.2 Hacking

Page 5: CS 4001: Computing, Society & Professionalism · • Increasing use of computers ®growing importance of computer security. 7.2 Hacking. Hackers, Past and Present ... people to do

Hackers, Past and Present

• Originalmeaningofhacker:explorer,risktaker,systeminnovator§ MIT’sTechModelRailroadClubin1950s

• 1960s-1980s:Focusshiftedfromelectronicstocomputersandnetworks§ 1983movieWarGames

• Modernmeaningofhacker:someonewhogainsunauthorizedaccesstocomputersandcomputernetworks

Page 6: CS 4001: Computing, Society & Professionalism · • Increasing use of computers ®growing importance of computer security. 7.2 Hacking. Hackers, Past and Present ... people to do

Obtaining Login Names and Passwords

• Bruteforcemethodsanddictionaryattacks

• Eavesdropping

• Dumpsterdiving

• Socialengineering

Page 7: CS 4001: Computing, Society & Professionalism · • Increasing use of computers ®growing importance of computer security. 7.2 Hacking. Hackers, Past and Present ... people to do

Sidejacking

• Sidejacking:hijackingofanopenWebsessionbycapturingauser’scookie

• Sidejacking possibleonunencryptedwirelessnetworksbecausemanysitessendcookies“intheclear”

• Internetsecuritycommunitycomplainedaboutsidejacking vulnerabilityforyears,butecommercesitesdidnotchangepractices

Page 8: CS 4001: Computing, Society & Professionalism · • Increasing use of computers ®growing importance of computer security. 7.2 Hacking. Hackers, Past and Present ... people to do

Computer Fraud and Abuse Act

• Criminalizeswidevarietyofhacker-relatedactivities§ Transmittingcodethatdamagesacomputer§ AccessinganyInternet-connectedcomputerwithout

authorization§ Transmittingclassified governmentinformation§ Traffickingincomputerpasswords§ Computerfraud§ Computerextortion

• Maximumpenalty:20yearsinprisonand$250,000fine

Page 9: CS 4001: Computing, Society & Professionalism · • Increasing use of computers ®growing importance of computer security. 7.2 Hacking. Hackers, Past and Present ... people to do

Other Laws

• Otherlaws– ElectronicCommissionPrivacyAct(cannotinterceptelectroniccommunicationsorreademailwithoutauthorization)

• WireFraudAct,NationalStolenPropertyAct,IdentityTheftandAssumptionDeterrenceAct

Page 10: CS 4001: Computing, Society & Professionalism · • Increasing use of computers ®growing importance of computer security. 7.2 Hacking. Hackers, Past and Present ... people to do

ClassActivity1:CaseStudyofFiresheep

Page 11: CS 4001: Computing, Society & Professionalism · • Increasing use of computers ®growing importance of computer security. 7.2 Hacking. Hackers, Past and Present ... people to do

Firesheep: Act Utilitarian Analysis

• ReleaseofFiresheepledmediatofocusonsecurityproblem

• Benefitswerehigh:afewmonthslaterFacebookandTwittermadetheirsitesmoresecure

• Harmswereminimal:noevidencethatreleaseofFiresheepcausedbigincreaseinidentitytheftormaliciouspranks

• Conclusion:ReleaseofFiresheepwasgood

Page 12: CS 4001: Computing, Society & Professionalism · • Increasing use of computers ®growing importance of computer security. 7.2 Hacking. Hackers, Past and Present ... people to do

Firesheep: Kantian Analysis

• Accessingsomeoneelse’suseraccountisaninvasionoftheirprivacyandiswrong

• Butlerprovidedatoolthatmadeitmuchsimplerforpeopletodosomethingthatiswrong,sohehassomemoralaccountabilityfortheirmisdeeds

• Butlerwaswillingtotolerateshort-termincreaseinprivacyviolationsinhopethatmediapressurewouldforceWebretailerstoaddsecurity

• HetreatedvictimsofFiresheep asameanstohisend

• ItwaswrongforButlertoreleaseFiresheep

Page 13: CS 4001: Computing, Society & Professionalism · • Increasing use of computers ®growing importance of computer security. 7.2 Hacking. Hackers, Past and Present ... people to do

Firesheep: Virtue Ethics Analysis

• Butlersharedexpertiseandknowledgetohelppeopleandeducatethemoftheprivacyrisksofusingsomenon-encryptedwebsites

• ButlerexhibitedcouragebytakingpersonalresponsibilityforcreatingFiresheep,andhedemonstratedbenevolencebymakingitfreelyavailable

• Butler’sinterestinpromotingthecommongood

Page 14: CS 4001: Computing, Society & Professionalism · • Increasing use of computers ®growing importance of computer security. 7.2 Hacking. Hackers, Past and Present ... people to do

7.3 Malware

Page 15: CS 4001: Computing, Society & Professionalism · • Increasing use of computers ®growing importance of computer security. 7.2 Hacking. Hackers, Past and Present ... people to do

Viruses

• Virus:Pieceofself-replicatingcodeembeddedwithinanotherprogram(host)

• Virusesassociatedwithprogramfiles§ Harddisks,floppydisks,CD-ROMS§ Emailattachments

• Howvirusesspread§ DiskettesorCDs§ Email§ FilesdownloadedfromInternet

Page 16: CS 4001: Computing, Society & Professionalism · • Increasing use of computers ®growing importance of computer security. 7.2 Hacking. Hackers, Past and Present ... people to do

How a Virus Replicates

Page 17: CS 4001: Computing, Society & Professionalism · • Increasing use of computers ®growing importance of computer security. 7.2 Hacking. Hackers, Past and Present ... people to do

Email Attachment with Possible Virus

Page 18: CS 4001: Computing, Society & Professionalism · • Increasing use of computers ®growing importance of computer security. 7.2 Hacking. Hackers, Past and Present ... people to do

How an Email Virus Spreads

Page 19: CS 4001: Computing, Society & Professionalism · • Increasing use of computers ®growing importance of computer security. 7.2 Hacking. Hackers, Past and Present ... people to do

Antivirus Software Packages

• Allowcomputeruserstodetectanddestroyviruses

• Mustbekeptup-to-datetobemosteffective

• Manypeopledonotkeeptheirantivirussoftwarepackagesup-to-date

• Consumersneedtobewareoffakeantivirusapplications

Page 20: CS 4001: Computing, Society & Professionalism · • Increasing use of computers ®growing importance of computer security. 7.2 Hacking. Hackers, Past and Present ... people to do

Worm

• Self-containedprogram

• Spreadsthroughacomputernetwork

• Exploitssecurityholesinnetworkedcomputers

Page 21: CS 4001: Computing, Society & Professionalism · • Increasing use of computers ®growing importance of computer security. 7.2 Hacking. Hackers, Past and Present ... people to do

How a Worm Spreads

Page 22: CS 4001: Computing, Society & Professionalism · • Increasing use of computers ®growing importance of computer security. 7.2 Hacking. Hackers, Past and Present ... people to do

Cross-site Scripting

• Anotherwaymalwaremaybedownloadedwithoutuser’sknowledge

• ProblemappearsonWebsitesthatallowpeopletoreadwhatothershaveposted

• Attackerinjectsclient-sidescriptintoaWebsite

• Victim’s(thenextuser’s)browserexecutesscript,whichmaystealcookies,trackuser’sactivity,orperformanothermaliciousaction

Page 23: CS 4001: Computing, Society & Professionalism · • Increasing use of computers ®growing importance of computer security. 7.2 Hacking. Hackers, Past and Present ... people to do

Drive-by Downloads

• UnintentionaldownloadingofmalwarecausedbyvisitingacompromisedWebsite

• AlsohappenswhenWebsurferseespop-upwindowaskingpermissiontodownloadsoftwareandclicks“Okay”

• GoogleAnti-MalwareTeamsays1.3percentofqueriestoGoogle’ssearchenginereturnamaliciousURLsomewhereonresultspage

Page 24: CS 4001: Computing, Society & Professionalism · • Increasing use of computers ®growing importance of computer security. 7.2 Hacking. Hackers, Past and Present ... people to do

Trojan Horses and Backdoor Trojans

• Trojanhorse:Programwithbenigncapabilitythatmasksasinisterpurpose

• BackdoorTrojan:Trojanhorsethatgivesattackeraccesstovictim’scomputer§ Mayclaimtocleansemalwarefromauser’s

computer,butinrealityitinstallsspyware

Page 25: CS 4001: Computing, Society & Professionalism · • Increasing use of computers ®growing importance of computer security. 7.2 Hacking. Hackers, Past and Present ... people to do

Rootkits

• Rootkit:Asetofprogramsthatprovidesprivilegedaccesstoacomputer

• Activatedeverytimecomputerisbooted

• Usessecurityprivilegestomaskitspresence

Page 26: CS 4001: Computing, Society & Professionalism · • Increasing use of computers ®growing importance of computer security. 7.2 Hacking. Hackers, Past and Present ... people to do

Spyware and Adware

• Spyware:ProgramthatcommunicatesoveranInternetconnectionwithoutuser’sknowledgeorconsent§ MonitorWebsurfing§ Logkeystrokes§ Takesnapshotsofcomputerscreen§ Sendreportsbacktohostcomputer

• Adware:Typeofspywarethatdisplayspop-upadvertisementsrelatedtouser’sactivity

• BackdoorTrojansoftenusedtodeliverspywareandadware

Page 27: CS 4001: Computing, Society & Professionalism · • Increasing use of computers ®growing importance of computer security. 7.2 Hacking. Hackers, Past and Present ... people to do

Bots

• Bot:AkindofbackdoorTrojanthatrespondstocommandssentbyacommand-and-controlprogramonanothercomputer

• Firstbotssupportedlegitimateactivities§ InternetRelayChat§ MultiplayerInternetgames

• Otherbotssupportillegalactivities§ Distributingspam§ CollectingpersoninformationforIDtheft§ Denial-of-serviceattacks

Page 28: CS 4001: Computing, Society & Professionalism · • Increasing use of computers ®growing importance of computer security. 7.2 Hacking. Hackers, Past and Present ... people to do

Botnets and Bot Herders

• Botnet:Collectionofbot-infectedcomputerscontrolledbythesamecommand-and-controlprogram

• Somebotnetshaveoveramillioncomputersinthem

• Botherder:Someonewhocontrolsabotnet

Page 29: CS 4001: Computing, Society & Professionalism · • Increasing use of computers ®growing importance of computer security. 7.2 Hacking. Hackers, Past and Present ... people to do

ClassActivity2:TheInternetWorm(RobertTappanMorrisCaseStudy)

Page 30: CS 4001: Computing, Society & Professionalism · • Increasing use of computers ®growing importance of computer security. 7.2 Hacking. Hackers, Past and Present ... people to do

Ethical Evaluation

• Kantianevaluation§ Morrisusedothersbygainingaccesstotheircomputers

withoutpermission

• Socialcontracttheoryevaluation§ Morrisviolatedpropertyrightsoforganizations

• Utilitarianevaluation§ Benefits:Organizationslearnedofsecurityflaws§ Harms:Timespentbythosefightingworm,unavailable

computers,disruptednetworktraffic,Morris’spunishments

• MorriswaswrongtohavereleasedtheInternetworm

Page 31: CS 4001: Computing, Society & Professionalism · • Increasing use of computers ®growing importance of computer security. 7.2 Hacking. Hackers, Past and Present ... people to do

Defensive Measures

• Securitypatches:Codeupdatestoremovesecurityvulnerabilities

• Anti-malwaretools:Softwaretoscanharddrives,detectfilesthatcontainvirusesorspyware,anddeletethesefiles

• Firewall:Asoftwareapplicationinstalledonasinglecomputerthatcanselectivelyblocknetworktraffictoandfromthatcomputer

Page 32: CS 4001: Computing, Society & Professionalism · • Increasing use of computers ®growing importance of computer security. 7.2 Hacking. Hackers, Past and Present ... people to do

7.5 Online Voting

Page 33: CS 4001: Computing, Society & Professionalism · • Increasing use of computers ®growing importance of computer security. 7.2 Hacking. Hackers, Past and Present ... people to do

Motivation for Online Voting

• 2000U.S.Presidentialelectioncloselycontested

• Floridapivotalstate

• MostFloridacountiesusedkeypunchvotingmachines

• Twovotingirregularitiestracedtothesemachines§ Hangingchad§ “Butterflyballot”inPalmBeachCounty

Page 34: CS 4001: Computing, Society & Professionalism · • Increasing use of computers ®growing importance of computer security. 7.2 Hacking. Hackers, Past and Present ... people to do

The Infamous “Butterfly Ballot”

AP Photo/Gary I. Rothstein

Page 35: CS 4001: Computing, Society & Professionalism · • Increasing use of computers ®growing importance of computer security. 7.2 Hacking. Hackers, Past and Present ... people to do

GroupActivity:EthicalEvaluationofOnlineVoting:1) ActUtilitarianPerspective;2) 2)KantianPerspective

Supposeonlinevotingreplacedtraditionalvoting

Page 36: CS 4001: Computing, Society & Professionalism · • Increasing use of computers ®growing importance of computer security. 7.2 Hacking. Hackers, Past and Present ... people to do

Utilitarian Analysis

• Benefit:Timesavings§ Assume50%ofadultsactuallyvote§ Supposevotersaves1hourbyvotingonline§ AveragepayinU.S.is$18.00/hour§ Timesavingsworth$9peradultAmerican

• HarmofDDoSattackdifficulttodetermine§ WhatisprobabilityofaDDoSattack?§ Whatistheprobabilityanattackwouldsucceed?§ Whatistheprobabilityasuccessfulattackwould

changetheoutcomeoftheelection?

Page 37: CS 4001: Computing, Society & Professionalism · • Increasing use of computers ®growing importance of computer security. 7.2 Hacking. Hackers, Past and Present ... people to do

Kantian Analysis

• Thewillofeachvotershouldbereflectedinthatvoter’sballot

• Theintegrityofeachballotisparamount

• Abilitytodoarecountnecessarytoguaranteeintegrityofeachballot

• Thereshouldbeapaperrecordofeveryvote

• Eliminatingpaperrecordstosavetimeand/ormoneyiswrong

Page 38: CS 4001: Computing, Society & Professionalism · • Increasing use of computers ®growing importance of computer security. 7.2 Hacking. Hackers, Past and Present ... people to do

Conclusions

• Existingsystemsarehighlylocalized

• Widespreadtaintingmorepossiblewithonlinesystem

• Nopaperrecordswithonlinesystem

• Evidenceoftamperingwithonlineelections

• Relyingonsecurityofhomecomputersmeanssystemvulnerabletofraud

• Strongcasefornotallowingonlinevoting

Page 39: CS 4001: Computing, Society & Professionalism · • Increasing use of computers ®growing importance of computer security. 7.2 Hacking. Hackers, Past and Present ... people to do

Benefits of Online Voting

• Morepeoplewouldvote

• Voteswouldbecountedmorequickly

• Noambiguitywithelectronicvotes

• Costlessmoney

• Eliminateballotboxtampering

• Softwarecanpreventaccidentalover-voting

• Softwarecanpreventunder-voting

Page 40: CS 4001: Computing, Society & Professionalism · • Increasing use of computers ®growing importance of computer security. 7.2 Hacking. Hackers, Past and Present ... people to do

Risks of Online Voting

• Givesunfairadvantagetothosewithhomecomputers

• Moredifficulttopreservevoterprivacy

• Moreopportunitiesforvoteselling

• ObvioustargetforaDDoSattack

• Securityofelectiondependsonsecurityofhomecomputers

• Susceptibletovote-changingvirusorRAT

• Susceptibletophonyvoteservers

• Nopapercopiesofballotsforauditingorrecounts

Page 41: CS 4001: Computing, Society & Professionalism · • Increasing use of computers ®growing importance of computer security. 7.2 Hacking. Hackers, Past and Present ... people to do

7.4 Cyber Crime and Cyber Attacks

Page 42: CS 4001: Computing, Society & Professionalism · • Increasing use of computers ®growing importance of computer security. 7.2 Hacking. Hackers, Past and Present ... people to do

Phishing and Spear-phishing

• Phishing:Large-scaleefforttogainsensitiveinformationfromgulliblecomputerusers§ Phishingemailsaresenttousersaskingthemto

entersensitiveinformationonanimposterwebsite§ Atleast67,000phishingattacksgloballyinsecondhalfof

2010§ Newdevelopment:phishingattacksonChinesee-commerce

sites

• Spear-phishing:Variantofphishinginwhichemailaddresseschosenselectivelytotargetparticulargroupofrecipients

Page 43: CS 4001: Computing, Society & Professionalism · • Increasing use of computers ®growing importance of computer security. 7.2 Hacking. Hackers, Past and Present ... people to do

SQL Injection

• Methodofattackingadatabase-drivenWebapplicationwithimpropersecurity

• Attackinserts(injects)SQLqueryintotextstringfromclienttoapplication

• Applicationreturnssensitiveinformation

Page 44: CS 4001: Computing, Society & Professionalism · • Increasing use of computers ®growing importance of computer security. 7.2 Hacking. Hackers, Past and Present ... people to do

Denial-of-service and DDOS Attacks

• Denial-of-serviceattack:Intentionalactiondesignedtopreventlegitimateusersfrommakinguseofacomputerservice

• AimofaDoS attackisnottostealinformationbuttodisruptaserver’sabilitytorespondtoitsclients

• Distributeddenial-of-serviceattack:DoS attacklaunchedfrommanycomputers,suchasabotnet

Page 45: CS 4001: Computing, Society & Professionalism · • Increasing use of computers ®growing importance of computer security. 7.2 Hacking. Hackers, Past and Present ... people to do

The Rise and Fall of Blue Security Part I: The Rise

• BlueSecurity:AnIsraelicompanysellingaspamdeterrencesystem

• BlueFrogbotwouldautomaticallyrespondtoeachspammessagewithanopt-outmessage

• Spammersstartedreceivinghundredsofthousandsofopt-outmessages,disruptingtheiroperations

• 6of10ofworld’stopspammersagreedtostopsendingspamtousersofBlueFrog

Page 46: CS 4001: Computing, Society & Professionalism · • Increasing use of computers ®growing importance of computer security. 7.2 Hacking. Hackers, Past and Present ... people to do

The Rise and Fall of Blue Security Part II: The Fall

• Onespammer(PharmaMaster)startedsendingBlueFrogusers10-20timesmorespam

• PharmaMasterthenlaunchedDDoSattacksonBlueSecurityanditsbusinesscustomers

• BlueSecuritycouldnotprotectitscustomersfromDDoSattacksandvirus-lacedemails

• BlueSecurityreluctantlyterminateditsanti-spamactivities

Page 47: CS 4001: Computing, Society & Professionalism · • Increasing use of computers ®growing importance of computer security. 7.2 Hacking. Hackers, Past and Present ... people to do

Attacks on Twitter and Other Social Networking Sites

• MassiveDDoSattackmadeTwitterserviceunavailableforseveralhoursonAugust6,2009

• Threeothersitesattackedatsametime:Facebook,LiveJournal,andGoogle

• AllsitesusedbyapoliticalbloggerfromtheRepublicofGeorgia

• AttacksoccurredonfirstanniversaryofwarbetweenGeorgiaandRussiaoverSouthOssetia

Page 48: CS 4001: Computing, Society & Professionalism · • Increasing use of computers ®growing importance of computer security. 7.2 Hacking. Hackers, Past and Present ... people to do

1-

Anonymous

• Anonymous: loosely organized international movement of hacktivists (hackers with a social or political cause)

• Various DDoS attacks attributed to Anonymous members

1-47

Year Victim Reason

2008 Church of Scientology Attempted suppression of Tom Cruise interview

2009 RIAA, MPAA RIAA, MPAA’s attempt to take down the Pirate Bay

2009 PayPal, VISA, MasterCard

Financial organizations freezing funds flowing to Julian Assange of WikiLeaks

2012 U.S. Dept. of Justice, RIAA, MPAA

U.S. Dept. of Justice action against Megaupload