Threats To Information Security

Carl J Johnson By Carl J Johnson, 4th May 2013 | Follow this author | RSS Feed | Short URL
Posted in Wikinut>Business>Law

Threats to information security is about different computer crimes. It is also about the extent of computer crimes. Finally it is about the hacker's ethics. We like to point out the most common threats to information security.

Computer Related Crimes

It can be a lot easier for criminal attempts on computer systems to appear in the lack of conventional security precautions. Both the intruder and the person who has not taken appropriate safety measures may be held liable for what happens.

Different Kinds of Computer Crimes

One may divide the average crimes related to computers in four different groups:
1. Assault against the results of the computer processing
2. Damage of the software
3. Computer espionage
4. Damage of the hardware

The Extent of Computer Crimes

The technical qualities of computing are such that it opens possibilities and opportunities for crime in quite a different way than traditional crime does. To locate a computer crime and to follow its path is extremely difficult.
In fact, the computing system is not appropriate in itself. That makes it even harder to determine if there has been a technical disturbance, a natural malfunction, or if an intruder willingly has manipulated the system in a criminal way.
Four separate facts seem to be particularly notable when we try to discover why some people want to commit a crime.
1. The person's attitude towards morals and norms
2. The person’s intention
3. The person's awareness to the risk of discovery and
4. The opportunity
One may ask oneself what reasons we have to do some safety measures in the system. It is necessary to assess the costs of a security system against the importance of a certain technique in the information system. The cost of an intrusion in the computing system may lead to that someone may ask us for damages as a result of the lacking information system and the moral instability. Recently there have been several attacks of viruses pointed against leading companies all around the world. Today we could read in the paper that they discovered a recent security flaw in a program's email clients. According to the author, it would be possible for a hacker using this gap in the system to open up your computer and take control of it through an email sent to the e-mail program. There is no need to open the email; the malicious code would take control of the computer before we even have had a chance to see and delete the email. Recently, there have been some rather difficult alarms about security flaws concerning products of a well-known company. Undoubtedly the question comes to mind if the company deliberately incorporates a low level of security. The customers are those who in this manner try out the products. The company eventually hands out a patch to fix the problem when a defect appears in the security system of a product, Two different parties discovered the vulnerability above independently of each other. They contacted the company that had made the email programs and agreed not to disclose the vulnerability until a patch was in charge.
It gives us something to think about when we learn that even security companies decide to remain silent about email viruses of this kind. With this virus' potential to extend, it is much more dangerous than previous ones. This way of handling a severe attack must be considered highly unethical.
Information security breaches come in six areas of risk:
• Electronic (hacking and related) risk
• Malicious code (virus, Trojan worm and related) threat
• Privacy risk
• Downtime risk
• Physical risk
• Human factors risk

The Hacker's Ethics

In his book, Hackers: Heroes of the Computer Revolution, Steven Levy introduced the following seven guidelines:
1. Access to computers should be endless and total; it should be teaching us something about the way the world works.
2. Always yield to the Hands-On imperative!
3. All information should be available.
4. Mistrust authority -- promote decentralization.
5. Hackers should be judged by their hacking, not bogus criteria such as degrees, age, race or status.
6. We can create art and beauty on a computer.
7. Computers can change your life for the better.
Three principles expanded this ideology published in PHRACK, the "official" hacker newsletter:
First, hackers reject the notion that "businesses" are the only groups entitled to access and use of modern technology.
• Second, hacking is a vital weapon in the fight against encroaching computer technology.
• Finally, the high cost of equipment is beyond the means of most hackers, which results in the perception that hacking and phreaking are the only hope to spreading computer literacy to the masses.
Someone upholding ethical and legal rules of the society cannot use these "rules" seriously. Hackers usually recognize that their activities may sometimes be illegal. Nevertheless, we invest a substantial amount of energy on limiting violations only to those required to gain access and learn a system. The hackers are hostile towards those who go beyond these limits.


Hacker, Information, Personal, Secure Computer, Security, Security Sites, Security System

Meet the author

author avatar Carl J Johnson
Born in Turku, Finland. Now living Sweden. A criminal defence lawyer for almost 40 years. Now retired. Fond of writing and reading. Spears. Swedish, Finnish, German and English.

Share this page

moderator Steve Kinsman moderated this page.
If you have any complaints about this content, please let us know


Add a comment
Can't login?