[go: up one dir, main page]

0% found this document useful (0 votes)
47 views19 pages

Methods of Information Systems Protection

Uploaded by

elnurkanatzan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
47 views19 pages

Methods of Information Systems Protection

Uploaded by

elnurkanatzan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 19

In this complex world.

. . what is. . . ?

• Right or wrong?

• Good or bad?

• Ethical or unethical?

• Moral or immoral?

• Legal or illegal? Says who ?


How do they
know?
Methods of information
systems protection
• 12.1.3.1 analyze ethical problems arising due
to computer system cracking
• protect data from unauthorized access
Vocabulary

Protection

Honesty
Integrity
Law
Reputation
Accountabili
ty
Respect
Hacking
Brute force
Decrypt
Guides to living

• Values
Important & shared ideas of a group.

• Morals
Principles of what is right and wrong (based on
values)

• Ethics
Principles to guide decisions & actions (based on
morals)
What are example of ethics?
HONESTY. ...
INTEGRITY. ...
PROMISE-KEEPING &
TRUSTWORTHINESS. ...
LOYALTY. ...
FAIRNESS. ...
CONCERN FOR OTHERS. ...
RESPECT FOR OTHERS. ...
LAW ABIDING.
LEADERSHIP
REPUTATION AND MORALE
ACCOUNTABILITY
Ethics

• moral principles that govern a person's behavior or the

conducting of an activity.

• the branch of knowledge that deals with moral principles.


Range of all possible actions
What’s Hacking?
Hacking is the process of bypassing
computer safeguards in order to gain
access to them – which can either be good
or bad – cracking specifically refers to the
same practice, but with criminal intent.

In particular, crackers engage in such


unruly practices as stealing credit card
numbers, deploying viruses, destroying
files or collecting personal data to then
sell.
https://youtu.be/YiRPt4vrSSw
What’s Cracking?
Cracking is the process of obtaining a password by force (by
skipping authentication and registration steps).

When criminals are targeting the large organisations,


there are various methods of attack.

Features:
•To crack password hackers use brute force and
dictionary attacks;
•Uses data connected to the account in order to crack it;
•Tries every possible combination of symbols.

​Examples:
-Used by criminals to get access to private data.
+May be used to recover a forgotten password.
Types of cracking
Brute force attack
This is a general attack on a network and requires no specialist
knowledge of the individuals or the organisation. It is a trial-
and-error method of obtaining login names and passwords to
allow the hacker to access the network.
For example, automated software can be used to generate and
try millions of login names and passwords.
Success is based on computing power and the number of
combinations tried rather than an ingenious algorithm. That is
why it is called 'brute force'.

How to prevent password cracking?


•Choose a very long password;
•Сreate complex passwords (uses upper and lower case, digits,
symbols).
Types of cracking
Dictionary attack

A dictionary attack is a method of breaking into a password-protected


computer, network, or other IT resource by systematically entering each
word in the dictionary as a password. A dictionary attack can also be
used to try to find the key needed to decrypt an encrypted message or
document.

How to prevent password cracking?


Choose a password that is not in a dictionary;
Add numeric / punctuation / etc;
Is made up of other words;
Uses other character sets;
Uses upper and lower case;
Do not use names, dates, the same word twice or words with numbers
appended.
Activity 1: Is Cracking different
then hacking?
Describe, what is?
Hacking:

LO analyze ethical problems arising due to


computer system cracking
Cracking:
Give a scenario of Cracking Evaluation criteria Difference Cracking from hacking

• For financial gain Descriptors Describe the mean of Hacking:


Describe the mean of Cracking:
Give a scenario of Cracking for
financial gain

Share and discuss with each other


Difference between Hacking and Cracking

Cracking, unlike hacking,


relies more on persistent
repetition of a handful of
fairly well-known tricks in
order to break into
systems, rather than
cleverly exploiting the
system’s weaknesses. As
a result, most crackers
are in fact only sub-par
hackers.
Cracking example
software companies likely won’t know if someone has
cracked their software.

students using the public Wi-Fi at the corner café


won’t know if someone has cracked the Wi-Fi network
and is capturing their vulnerable data, such as banking
info or passwords.

your computer has been cracked if your friends and


colleagues start getting phishing emails from your
email address.
Activity 2: Writing, (50 words)

Adlet, a Computer Clerk, works for the


Akimat, where he has access to all LO analyze ethical problems
arising due to computer
records, Clerk, Aruzhan’ has been system cracking
granted access to the ”but not the Evaluation
corresponding names”of some records. criteria Cracking

Aruzhan finds some information that she Descriptors Describes completely his
would like to use, but she needs the opinion why it is possible
or not to give someone
names and addresses corresponding else's information
with certain properties. Aruzhan asks
Adlet to retrieve the names and Use the vocabulary (Job
responsibility, Use,
addresses so she can contact these Possible misuse,
people for more information and for Confidentiality, Tacit
permission, Propriety)
permission to do further study.
Use the vocabulary: Job responsibility, Use, Possible misuse,
Confidentiality, Tacit permission, Propriety.
How do you stop cracking?

1.Authentication & Authorization


2.Powerful Antiviruses
3.Encryption
4.Abiding with roles and responsibilities
How to prevent?
Don’t open any attachments sent from suspicious email
addresses

Never send your banking info or credit card numbers via


email

Don’t use public Wi-Fi for any activities you want to


keep private
Activity 3. Group work
Using a suitable application, answer the following
questions for each of the scenarios given:

Has a law has been broken?

Explain which ethical aspect is related to the


scenarios below and how to prevent it?
Reflection

You might also like