 The expressions computer security and cybersecurity generally refer to computer/cyber - related concerns affecting the following topics: ➢ Reliability, ➢ Availability, ➢ Accessibility, ➢ System safety, ➢ Data integrity, ➢ Confidentiality, ➢ Privacy.  Epstein (2007) suggests that computer security can be defined in terms of three elements: 1) Confidentiality - focuses on protecting against “unauthorized persons gaining access to unauthorized information.” 2) Integrity - can be understood as “preventing an attacker from modifying data.” 3) Accessibility - has to do with “making sure that resources are available for authorized users.” ## Defining Computer Security (Continued)  In Nuemann’s (2004) view, security in the context of computer systems also aims at preventing: ➢ misuse, ➢ accidents, ➢ malfunctions.  Neumann also notes that computer security can be a “double - edged sword,” because it can be used both to: a) protect privacy, and b) undermine freedom of access to information . ## Computer Security and Computer Crime  Computer security concerns often overlap with issues analyzed under the topic of computer crime .  Virtually all (known) violations of security involving computers and cybertechnology are also criminal in nature.  But not every instance of crime in cyberspace necessarily involves a breach or violation of computer/cyber security. ## Computer Security Issues as Distinct from Computer Crime  Some cyber/computer - related crimes have no direct implications for cyber/computer security.  Consider, for example, that someone can use a computer or an electronic device to: ➢ make unauthorized copies of software programs; ➢ stalk a victim in cyberspace; ➢ bully someone online; ➢ elicit sex with young children; ➢ distribute child pornography;  Note, however, that none of these (criminal) acts are a direct result of insecure computer systems. #### Security as Related to Privacy  Cyber - related issues involving privacy and security often overlap.  But there are some important distinctions between the two notions. ➢ For example, privacy - related concerns often arise because users are concerned about losing control over ways in which personal information about them can be accessed by organizations who claim to have some legitimate need for that personal information in order to make important decisions. ➢ This is not the case with security - related concerns. Security as Related to Privacy (continued)  Cyber - related security concerns (unlike those of privacy) typically arise because of either: a) fears that many individuals and organizations have that their data could be accessed by those who have no legitimate need for, or right to, such information; or b) worries that personal data or proprietary information, or both, could be retrieved and possibly altered by individuals and organizations who are not authorized to access that data. Computer Security Issues as Distinct from Computer Crime  Some cyber/computer - related crimes have no direct implications for cyber/computer security.  Consider, for example, that someone can use a computer or an electronic device to: ➢ make unauthorized copies of software programs; ➢ stalk a victim in cyberspace; ➢ bully someone online; ➢ elicit sex with young children; ➢ distribute child pornography;  Note, however, that none of these (criminal) acts are a direct result of insecure computer systems. Security as Related to Privacy (continued)  But sometimes the objectives of privacy and security seem to be at odds with each other, causing a tension between these two notions.  From a security perspective, protecting computer system resources and proprietary data residing in those systems is critical, but  From a privacy perspective, protecting personal information and personal autonomy has a higher priority  “Those who can give up essential liberty to obtain a little temporary safety, deserve neither liberty nor safety.” (Benjamin Franklin) ## Three Aspects of Cybersecurity: Data, System, and Network Security Security issues involving cybertechnology span concerns having to do with three distinct kinds of (computer - related) vulnerabilities, which include: I. **unauthorized access to data** (i.e., data security ); II. **attacks on system resources by malicious computer** **programs** (i.e., system security ); III. **attacks on computer networks** , including the infrastructure of privately owned networks and the Internet itself (i.e., network security ). #### Data Security: Confidentiality, Integrity, and Availability of Information  Data security is concerned with vulnerabilities pertaining to unauthorized access to data that can either: a) reside in one or more computer storage devices, b) be exchanged between two or more computer systems.  Data security issues affect the confidentiality, integrity, and availability of that information. #### Data Security (Continued)  Spinello (2000) describes what is required for data security by noting that: 1. The information to be protected can be either personal or proprietary or both. 2. The information must be secured not only from tampering and alteration by unauthorized parties, but also from merely being accessed and read by those parties. 3. The stored information must be accurate, readily available, and accessible to authorized parties, i.e., on demand access ## System Security  While System security is concerned with vulnerabilities to system resources such as computer hardware, operating system software, and application software, it is also concerned with various kinds of viruses, worms, and related “malicious programs” that can disrupt and sometimes destroy computer systems. ## The Olympic Games and the Stuxnet Worm In June 2012, the New York Times reported that the US and Israeli governments had been cooperating on an initiative code - named Olympic Games . Originally conceived and developed during the George W. Bush administration, the Olympic Games operation aimed at disrupting Iran’s uranium enrichment program and thus damaging Iran’s nuclear capability. At the core of this joint operation was a computer worm known as Stuxnet, a “cyberweapon” that targeted “electronic program controllers” developed by Siemens Corp for industrial controlled computers that were installed in Iran. The Stuxnet worm was allegedly responsible for ( i ) sending misleading data to computer monitors in Iran and (ii) causing several of Iran’s centrifuges (fast - spinning machines that enrich uranium) to spin out of control. The Stuxnet attack was estimated to have destroyed approximately 1000 of Iran’s 6,000 centrifuges. Was this operation a justified breach of cybersecurity? If it is wrong for ordinary individuals and nongovernmental actors to break into and disrupt someone’s computer system, is it also wrong for nations to do this as well? ## Viruses and Worms (Continued)  Dale and Lewis (2016) define a virus as a “malicious, self - replicating program that embeds itself into other code.” ➢ Dale and Lewis define a worm as a “malicious stand - alone program that often targets network resources.”  However, some believe that both viruses and worms, as well as all other kinds of malicious programs are better described under the single category “malware.” ## Malware  Miller (2015) defines malware as “software designed to produce, damage, or provide unauthorized access to computers or computer systems.”  Under this broad definition, all of the following would be included under the category “malware”: ➢ viruses, ➢ worms, ➢ Trojan horses, ➢ logic bombs, ➢ (at least some forms of) “spyware”. Network Security (Continued)  Attacks on computer networks have ranged from programs launched by individuals and organizations whose intentions were malicious to those entities claiming that their intentions were benign.  Some network attacks have severely disrupted activities on (segments of) the Internet.  In some cases, these attacks have also have rendered the Internet virtually inoperable.  It is not always easy to determine whether a major computer network disruption is the result of malicious individuals or whether it is due to the failure of some aspect of the network infrastructure itself. ➢ For example, some suggest that a significant power outage experienced by AT&T in 1990, which, at the time, was attributed to a software glitch in the system’s programming code, was the result of “malicious” individuals who caused the network to crash. ### Three Kinds oƒ Comp Security ![](Pasted%20image%2020240215161136.png) ## “Cloud Computing” and Security  The National Institute of Standards and Technology (NIST) officially defines cloud computing as ...a model for enabling ubiquitous , convenient , on - demand network access to a shared pool of configurable computing resources.  The National Institute of Standards and Technology (NIST) officially defines cloud computing as ...a model for enabling ubiquitous , convenient , on - demand network access to a shared pool of configurable computing resources. ## Cloud Computing  Cloud computing affects not only where users can store their data but also where many of the applications they use can ultimately reside.  Four popular examples of cloud - computing applications include: ➢ photo storing services, such as Google’s Picasa; ➢ web - based email services, such as Yahoo; ➢ file transfer services, such as YouSendit ; ➢ online computer backup services, such as Mozy (Privacy Rights Clearinghouse, 2008).  The NIST definition of cloud computing identifies four distinct “deployment models” and three kinds of “service models.”  Deployment models include the: ➢ Private Cloud (used by a single organization) ➢ Community Cloud (used mainly by a “specific community” of organizations and users that have “shared concerns”) ➢ Public Cloud (can be used by the general public) ➢ Hybrid Cloud (some combination of the above!)  As already noted, cloud computing also provides three important service (or delivery ) models: ➢ Software as a Service (or SaaS) – delivers various kinds of applications using a “multitenant architecture” ➢ Platform as a Service (PaaS) – delivers “development environments” to consumers ➢ Infrastructure as a Service (IaaS) – delivers various “resources” which include servers, connections, and “related tools” needed for building “an application from scratch” ### Cloud Computing (Continued)  If we combine both a) private/community/public/hybrid modes of deployment , and b) SaaS/ PaaS / IaaS modes of service/delivery we are able to distinguish twelve variations of cloud - computing services. See Table 6 - 2. ## Securing User Data Residing in the Cloud  Cavoukian (2008) argues that for cloud computing to be fully realized, users will have to be confident that their personal information is protected and that their data (in general) is both secure and accessible.  Currently, however, users have at least four different kinds of “concerns” along these lines.  One concern has to do with how users can control their data stored in the cloud – e.g., at present, users have very little “control over or direct knowledge about how their information is transmitted, processed, or stored” (Privacy Rights Clearinghouse).  A second concern involves the integrity of the data – for example, if the host company goes out of business, what happens to the users’ data?  A third kind of concern affects questions about access to the data – i.e., can the host deny a user access to his/her own data?  A fourth concern has to do with who actually “owns” the data that is stored in the cloud. ##### Securing User Data Residing in the Cloud (Continued)  Talbot (2011) identifies three main kinds of concerns that these businesses have, which involve: 1) accidental loss of data, 2) fear of hacking attacks, 3) theft by “rogue employees of cloud providers.”  Until these concerns are resolved, Talbot suggests that users will be skeptical about placing their trust in cloud - computing services to protect their data. ## Assessing Risk in the Context of Cloud Computing  It is not clear who is responsible for assessing and managing risk in computing/IT - security contexts.  One reason why it is becoming even more difficult to determine who is responsible for doing this may have to do with a factor that Pieters and van Cleeff (2009) call the “ de-perimeterization ” of the security landscape.  Because the information security landscape has become increasingly “ deperimeterized ,” IT systems now “span the boundaries of multiple parties” and they “cross the security perimeters.”  They also note that deperimeterization - related concerns lead to “uncertain risk” for IT security, because of the lack of clear boundaries defining the security landscape with no secure “digital fence” or perimeter safeguarding the users' data.  So both ordinary users and businesses may be required to assume some level of uncertain risk with regard to their data and system resources that reside in the cloud. ## Ethical Aspects of Cybersecurity  Ethical issues affecting individual autonomy, privacy, and expectations of anonymity arise because of cybersecurity.  To realize autonomy, as well as privacy and anonymity, users need to have some control over how personal information about them is gathered and used.  On the one hand, secure computers can help users realize this goal.  But secure computers can also undermine this goal, and this can raise ethical concerns.  An ethical analysis of cybersecurity issues needs to consider whether an appropriate balance can be found in preserving both: a) adequately secure computer systems; b) autonomy and privacy for computer users. ## Hacking and the “Hacker Ethic”  Individuals and groups that launch malicious programs of various kinds are commonly described in the media as hackers .  According to Simpson (2006), a hacker is anyone who “accesses a computer system or network without authorization from the owner.”  Simpson defines “crackers” as hackers who break into a computer system with “the intention of doing harm or destroying data.”  Many computer scientists are unhappy with how the word “hacker” has come to be used in the media.  Kaufman, Perlman, and Spencinor (2002) describe “true computer hackers” as  individuals who play with computers for the “pure intellectual challenge” and as “master programmers, incorruptibly honest, unmotivated by money, and careful not to harm anyone.” Hacking and “HackerEthic” (Continued)  Many people who are now identified in the media as hackers are neither brilliant nor accomplished computer experts.  “Early computer hackers” have been described as individuals who aimed at accessing computer systems to see how they worked, and not to cause any harm to those systems.  Were these kinds of hackers also behaving unethically?  These individuals are sometimes described as behaving in accordance with a certain “code of ethics.” ### Hacking and the “Hacker Ethic” (Continued)  Steven Levy (2001) describes the “Hacker Ethic” as comprising the following beliefs: 1. Access to computers should be unlimited and total. 2. All information should be free. 3. Mistrust authority - promote decentralization. 4. Hackers should be judged by their hacking, not bogus criteria such as degrees, age, race, or position. 5. You can create art and beauty on a computer. 6. Computers can change life for the better. ##### Hacking Activities  Some hacking activities can be viewed as examples of three of the principles included in Levy’s “Hacker Ethic”: 1) information should be (totally) free; 2) hackers provide society with a useful and important service; 3) activities in cyberspace are virtual in nature; so they do not cause real harm to people in the real (physical) world. ### “Information Wants to Be Free”  Should all information be totally free?  The view that information should be free is regarded by some critics (for example, Spafford 2004) as naïve, idealistic, or romantic.  Spafford notes that if information were free: ➢ privacy would not be possible because we would not be able to control how information about us was collected and used. ➢ it would not be possible to ensure integrity and accuracy of that information. #### “Hackers Provide Society with an Important Service”  Spafford also provides counterexamples to this version of the “hacker argument.”  He asks whether we would permit someone to start a fire in a crowded shopping mall in order to expose the fact that the mall's sprinkler system was not adequate.  Alternatively, would you be willing to thank a burglar who successfully broke into your house? ➢ For example, would you thank that burglar for showing that your home security system was inadequate? ### “Hacking Causes Only Virtual Harm, Not Real Harm”  Some argue that break - ins and vandalism in cyberspace cause no “real harm” to persons because they are activities that occur only in the virtual realm .  This argument commits a logical fallacy by confusing the connection between the real and the virtual regarding harm by reasoning in the following way: ➢ The virtual world in not the real (physical) world; so any harms that occur in the virtual world are not real harms. ➢ See Chapter 3 for a description of why the reasoning process used in the Virtuality Fallacy is fallacious. ## Can Computer Break-ins Ever Be Ethically Justified?  Spafford suggests that in certain extreme cases, breaking into a computer could be the "right thing to do." ➢ For example, breaking into a computer to get medical records to save one’s life, and the authorized users of the system cannot be found.  However, Spafford also argues that computer break - ins always cause harm, **i.e., sometimes it could be right to do** **something that is ethically unjustifiable.**  Utilitarian? Deontological? Chapter 2! ### Ethically Justifying a Computer Break - in (Continued)  Spafford seems to use a deontological (or nonconsequentialist ) argument to justify the break - in the case of the medical emergency. ➢ For example, Spafford believes that morality is determined by actions not results .  He argues that we cannot evaluate morality based on consequences or results because we would not “know the full scope of those results,” which are based on the “sum total of all future effect.”  Spafford’s argument tends to be based on a version of act deontology (see Chapter 2). ## Cyberterrorism  Dorothy Denning (2004, 2007) defines cyberterrorism as the "convergence of cyberspace and terrorism."  Cyberterrorism covers a range of politically motivated hacking operations intended to cause grave harm that can result in either loss of life or severe economic loss, or both.  In some cases, it is difficult to separate acts of cyberterrorism from cybervandalism and cyberwarfare , and acts of ordinary hacking . #### Cyberterrorism vs. Hacktivism  Denial - of - service (DoS) attacks have been launched for the purpose of preventing users from accessing targeted commercial Web sites.  These attacks have also resulted in severe economic loss for major corporations.  Should these DoS - related attacks necessarily be classified as instances of cyberterrorism?  Or, can some of these attacks be better understood as another form of malicious hacking – i.e., acts perpetrated by persons or groups with a particular political agenda or ideology? #### Hacktivism  Manion and Goodrum (2004) have questioned whether some DoS (and related) cyberattacks might be better understood as instances of hacktivism . ➢ They also question whether the behavior of these persons and groups responsible for the cyberattacks suggests a new form of civil disobedience, which they also describe as hacktivism . ➢ Can acts of hacktivism be justified on the grounds of civil disobedience ? ##### Can Hacktivism be Justified?  Himma (2007) describes the line of reasoning that hacktivists and their supporters tend to use to justify their activities as forms of political activism and “electronic civil disobedience” (or ECD): ##### Can Hacktivism be Justified? ➢ **PREMISE 1**. Because civil disobedience is justifiable as a protest against injustice, it is permissible to commit digital intrusions as a means of protesting injustice. ➢ **PREMISE 2.** In so far as it is permissible to stage a sit - in in a commercial or governmental building to protest, say laws that violate human rights, it is permissible to intrude on commercial or government networks to protest such laws. ➢ **CONCLUSION**. Digital intrusions that would otherwise be morally objectionable are morally permissible if they are politically motivated acts of electronic civil disobedience, or hacktivism. ^^^ VALID ARGUMENT ### Hacktivism as a form of Electronic Civil Disobedience (ECD)  With regard to ECD, Manion and Goodrum (2004) claim that for an act to qualify as “civilly disobedient,” it must satisfy the following conditions: ➢ No damage done to persons or property; ➢ Nonviolent; ➢ Not for personal profit; ➢ Ethical motivation – the strong conviction that a law is unjust, or unfair, to the extreme detriment of the common good; ➢ Willingness to accept personal responsibility for the outcome of actions.  Denning (2008) argues that Manion and Goodrum’s analysis of hacktivism suggests that some acts of Web defacement may also be morally justified as ECD, in so far as they are “ethically motivated.”  But Denning points out that defacing a Web site seems to be incompatible with Manion and Goodrum’s first condition for ECD – i.e., “no damage.” In 2012, a self - described hacktivist group called Anonymous launched a series of DDoS attacks against commercial and government Web sites in response to 2 different incidents. For one thing, the group stated that its attack, called “Operation Payback”, was in retaliation against the US Department of Justice for taking down Megaupload, a massive file - sharing site. For another, Anonymous stated that it was supporting the coordinated January 18, 2012 online protest against two controversial legislative proposals in the US Congress: Protect Intellectual Property Act (PIPA) and Stop Online Piracy Act (SOPA). While most of the participants in this online protest, including Wikipedia and Google, used tactics that were nondisruptive, Anonymous launched DDoS attacks against the websites of organizations that supported the two congressional bills. The sites attacked included not only those of the Recording Industry Association of America (RIAA) and Motion Picture Association of America (MPAA) but also the sites for the US Copyright Office and Broadcast Music, Inc (BMI), which collects fees from businesses that use music.  Can this incident qualify as example of ECD?  Is it an example of hacktivism?  Or, can it possibly qualify as an act of cyberterrorism? ### Hacktivism vs. Cyberterrorism  Denning (2001) attempts to draw some critical distinctions among three related notions: ➢ activism ; ➢ hacktivism ; ➢ cyberterrorism. #### Activism, Hacktivism, and Cyberterrorism  A ctivism includes the normal, non - disruptive use of the Internet to support a cause. ➢ For example, an activist could use the Internet to discuss issues, form coalitions, and plan and coordinate activities.  Activists could engage in a range of activities from browsing the Web to sending e - mail, posting material to a Web site, constructing a Web site dedicated to their political cause or causes, and so forth.  Hacktivism is the convergence of activism and computer hacking.  It uses hacking techniques against a target Internet site with intent to disrupt normal operations, but without intending to cause serious damage.  These disruptions could be caused by "e - mail bombs" and "low grade" viruses that cause only minimal disruption, and would not result in severe economic damage or loss of life.  Cyberterrorism consists of operations that are intended to cause great harm such as loss of life or severe economic damage, or both. ➢ For example, a cyberterrorist might attempt to bring down the U.S. stock market or take control of a transportation unit in order to cause trains to crash.  Denning believes that conceptual distinctions can be used to differentiate various activities included under the headings of activism, hacktivism, and cyberterrorism. ### Denning’s Analysis  Denning admits that as we progress from activism to cyberterrorism the boundaries become "fuzzy." ➢ For example, should an "e - mail bomb" sent by a hacker who is also a political activist be viewed as hacktivism or as an act of cyberterrorism?  Many in law - enforcement argue that more effort should be devoted to finding ways to deter and catch these individuals rather than trying to understand their ideological beliefs, goals, and objectives. ## Cybertechnology and Terrorist Organizations  A major concern in the past has been how and when terrorist organizations might use cybertechnology to carry out attacks.  Some members of al Qaeda and ISIS now possess very sophisticated computer devices, as well as the skills needed to use them effectively.  In the November 2015 terrorist attacks in France, ISIS terrorists used encryption technology to communicate with one another in ways that made it extremely difficult for European authorities to monitor and intercept those communications.  When al Qaeda terrorists flew airplanes into the Twin Towers, on 9/11, they had to take their own lives in the act.  But we can imagine that would happen if terrorists are someday able to gain control of onboard computer systems on airplanes and override the airplane’s computerized controls. ### Information Warfare  Denning (1999) defines information warfare (IW) as "operations that target or exploit information media in order to win some objective over an adversary."  Certain aspects of cyberterrorism also seem to conform to Denning's definition of IW, but IW is a broader concept than cyberterrorism. 1. IW can include cyberattacks that send misleading information to an enemy. 2. While IW is disruptive and sometimes destructive, it need not involve loss of life or severe economic loss, even though such results can occur. 3. IW typically involves cyberattacks launched by sovereign nations as opposed to “rogue” political organizations and terrorist groups.  IW, unlike conventional or physical warfare, tends to be more disruptive than destructive.  The instruments of war in IW typically strike at a nation's infrastructure.  The kinds of "weapons" used typically consist of malware (including viruses and worms), as well as DoS attacks (described earlier).  The disruption caused by malware and DoS attacks can be more damaging, in many respects, than physical damage caused to a nation by conventional weapons. Information Warfare  Moor (2004) notes that in the computer era, the concept of warfare has become “informationally enriched.”  Moor also notes that while information has always played a vital role in warfare, now its importance is overwhelming, because the “battlefield is becoming increasingly computerized.”  He points out that in the future, warfare may have more to do with information and cybertechnology than with human beings going into combat.  Moor and others note that in the past, warfare was conducted by physical means – e.g., human beings engaged in combat, using weapons such as guns, tanks, and aircraft.  But during the first Gulf War, in the early 1990s, we saw for the first time the importance of information technology in contemporary warfare strategies.  Moor notes that the war was won relatively quickly by the multinational coalition because it was able to destroy the Iraqi communications technologies at the outset and thus put the Iraqi army at a severe disadvantage. ## Information Warfare  Review Scenario 6 - 1 (in the textbook) involving the Stuxnet Worm and the “Olympic Games” Operation.  Does “Operation Olympic Games” qualify as an instance of IW (or “cyberwarfare”)?  In so far as the Stuxnet worm sent misleading information to the Iranian government and its scientists, it complies with one aspect of IW.  Also, because this worm was disruptive (regarding Iran’s nuclear program), as well as destructive (i.e., with respect to its effect on Iran’s centrifuges), it complies with another aspect of IW.  Additionally, consider that the Stuxnet attacks were launched (allegedly, at least) by two nation states.  So, Stuxnet complies with all three elements of IW (described above).  It is perhaps also worth noting that in the Olympic Games incident, there had been no formal declaration of war among the three nation states allegedly involved. Potential Consequences for Nations that Engage in IW  Sanger (2012) suggests that the United States did not think through the international implications of its use of cyberwarfare in the Olympic Games operations). ![](Pasted%20image%2020240215164405.png)