CptS 401 Adam Carter Section 5.1 & 5.2.

Slides:



Advertisements
Similar presentations
The Internet: Educates Us Entertains Us Connects us False information
Advertisements

UNIT 20 The ex-hacker.
A Case Study on Malware By: Jill Lehman Tracy Clegg Clayton Nichols Nattapon Nattigon Robert Loggins.
A Gift of Fire, 2edChapter 7: Computer Crime1 Computer Crime.
Computer Crimes and Security Professor Matt Thatcher.
Credit Card Fraud. Credit card fraud - situation when an individual uses another individual’s credit card for personal reasons while the owner is not.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
CptS 401 Adam Carter. Discuss Paper Question 4 Anonymizer.com provides tools and services to A. obtain a new identity. B. send and surf the web.
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
Safe IT – Protect your computer and Family from unwanted programs viruses and websites.
Hacker Ethics Kim Bissett Sabrina Short. Hacker Ethic: In General  Freedom of Information The web is not physical; it couldn’t be interpreted as property,
Prepared by: Nahed Al-Salah
1 CHAPTER 1 POLITICS. 2 Definitions Of The Word Hacker Hacker – someone who has achieved some level of expertise with a computer Hacker – someone who.
Computer and Internet Crimes By: Tracey Ross & Tommy Brown.
Hazards of Hacking. Hacking Originally, hacking was used to describe a programmer who was very skilled at his/her profession Often, this person knew programming.
CptS 401, Spring2011 3/24/11 Chapter 5: Crime See Dilbert cartoons about crime:
1 UNIT 20 The ex-hacker Lecturer: Ghadah Aldehim.
 ICT Security › If the firm is a victim of a computer crime, should they pursue prosecution of the criminals at all costs, should they maintain a low.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
CptS 401, Spring /15/2011 Chapter : Freedom of Speech I See Dilbert cartoons about freedom of speech:
Instructions for Weds. Jan Get your Century 21 Jr. textbook 2.Log in to the computers 3.On page 80, read the Objectives listed under “Lesson 13:
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
CptS 401 Adam Carter. Quiz Question 1 According to the book, it is important to legally protect intellectual property for the following reason(s): A.
Trust, Safety, & Reliability Part 2 MALICE. Malware Malware: short for “malicious software” Hackers: people who write and deploy malware Worm: program.
Hacking, Viruses and the Copyright Law. Learning Objectives  Describe what Hacking is and what Viruses are.  List what viruses can do and describe how.
The First Amendment. Actual Text Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging.
Discovering Computers 2010
CS 1308 Computer Literacy and the Internet. How do we look at Social Issues?  Financial  Moral  Ethical  Legal.
1 Ethics of Computing MONT 113G, Spring 2012 Session 37 Digital Order.
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
Security Chapter 8 Objectives Societal impact of information and information technology –Explain the meaning of terms related to computer security and.
CptS 401 Adam Carter Section 4.3.
Computer crime University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot March 2011 March 2011 ITSS 4201 Internet Insurance and.
Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time.
Attacks On systems And Networks To understand how we can protect our system and network we need to know about what kind of attacks a hacker/cracker would.
Types of Electronic Infection
CptS 401 Adam Carter. Change in schedule  Updated online copy  Tomorrow: read
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
CptS 401 Adam Carter. Question  Which of the following is commonly cited as a benefit to telecommuting? A. Increased productivity B. Higher job satisfaction.
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
INTERNET: The Good, The Bad and The Ugly
CptS 401 Adam Carter. Quiz Question 7 Obscene speech is protected by the First Amendment. A. True B. False 2.
Computer security By Isabelle Cooper.
The Computer Misuse Act of1990 The Copyright, Designs & Patents Act of
CptS 401 Adam Carter. Quiz Question The term “Luddite” refers to A. people who are generally in favor of technological progress. B. people who generally.
CS 4001Mary Jean Harrold1 Class 25 ŸComputer crime ŸAssign ŸTerm paper—due 11/20.
CptS 401 Adam Carter. Last Week (yay!)  Last reading on Wednesday  Will go over the exam on Thursday  Exam & Final paper due on Friday!
CHAPTER 2 Laws of Security. Introduction Laws of security enable user make the judgment about the security of a system. Some of the “laws” are not really.
Comprehensive Volume, 18 th Edition Chapter 11: Cyberlaw.
How these affect the use of computers. There are 4 main types of legislation that affect the use of computers. 1.Data Protection Act 2.Copyright 3.Computer.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Mistake, Misrepresentation and Fraud
Computer Laws Data Protection Act 1998 Computer Misuse Act 1990.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Securing the Electronic Frontier Ch. 6 Reading: pp ; ; CS 340.
-SHAMBHAVI PARADKAR TE COMP  PORT SCANNING.  DENIAL OF SERVICE(DoS). - DISTRIBUTED DENIAL OF SERVICE(DDoS). REFER Pg.637 & Pg.638.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Denial of Service Attack Pornography Phising Spoofing Salami Attack Forgery Hackers: enjoy intellectual challenges of overcoming software limitations.
Tyler Rapp.  I strongly believe anonymous posting should be legal  Why? You have the right, guaranteed to you by the 1 st Amendment in the United States.
Add video notes to lecture
Common Methods Used to Commit Computer Crimes
Chapter 11 crime and security in the networked economy
ECCouncil Exam Real Dumps - ECCouncil Exam 100% Passing Guarantee
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
A Gift of Fire Third edition Sara Baase
Chapter 7 – and 8 pp 155 – 202 of Web security by Lincoln D. Stein
Presentation transcript:

CptS 401 Adam Carter Section 5.1 & 5.2

Quiz Question A hacker can be described as a programmer who writes clever or elegant code someone who breaks into computers without authorization someone who modifies web sites to make a political statement All of the above None of the above

Quiz Question Answer D. All of the above All of these versions of a “hacker” can be found in Section 5.2.1 (pp. 253-260).

Quiz Question In this attack, hundreds of thousands of requests for Web pages and other information are issued to a single Web site: Zombie attack Love Bug attack Denial-of-service attack None of the above

Quiz Question Answer C. See p. 260.

Quiz Question In 1998, “the most organized [cyber] attack on the Pentagon” was perpetrated by Al-Qaeda A disgruntled Pentagon employee China Two teenage boys Russia

Answer D (259)

Quiz Question An infected computer is often known as a: Pirate Ninja Zombie Trojan Vampire

Answer C (260)

Question A person that hacks systems for political reasons is known as a: Hactivist Terrorist Anarchist Pacifist Idealist

Answer A (263)

Quiz Question 4 (Extra Credit) Writing computer code that could at some point be used to generate computer viruses or hack into computers is presently illegal in the U.S. True False

Quiz Question 4 Answer B. False The bottom of p. 272 makes it clear that no such law exists, and points out that such a law would make it difficult to defend against such viruses, and may conflict with the First Amendment (Free Speech), since courts have previously ruled that software is a form of speech.

Discussion Exercise: Stance with Respect to Break-Ins (Clicker) Ex. 5.9, p. 300: Young, technically-oriented hackers have argued that, if owners of a computer system want to keep outsiders out, it is their responsibility to provide better security. Ken Thompson, one of the inventors of UNIX, said, “The act of breaking into a computer system has to have the same social stigma as breaking into a neighbor’s house. It should not matter that the neighbor’s door is unlocked.” Which position do you agree with more? Why? A: Young hackers’ position B: Ken Thompson’s position C: Neither D: Not sure

Hacktivism Hactivism a legitimate form of civil disobedience Strongly Agree Agree Neutral Disagree Strongly Disagree

Class discussion How should we punish young hackers?

Clicker Poll Suppose a 16 year old hacker commits a denial of service attack on the 911 telephone system. How should he be punished? No punishment Weak punishment On-par with other teen hackers More penalties than usual

Class discussion Should we ban the creation of hacking tools and computer viruses?

Class discussion Many stores do not require signatures or do not verify signatures on credit card purchases. As the book pointed out, it is very easy to obtain credit card numbers. Given this fact, is this a safe practice by the stores?

Clicker question People should be required to obtain a “Computer License” that guarantees a minimum amount of competence, similar to a drivers license. Strongly Agree Agree Neutral Disagree Strongly Disagree