ETHICS IN COMPUTER SCIENCE Hacking and identity theft.

Slides:



Advertisements
Similar presentations
Experimental Security Analysis of a Modern Automobile
Advertisements

1 If You Are Me, Then Who Am I? Tips on Identity Theft Prevention California Office of Privacy Protection.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Identity Theft What you need to know Betty White, April 2010.
Identity Theft Someone steals your personal information for his/her own gain It’s a crime!
IDENTITY THEFT By Beaudan S and Tazwaar A. Identity Theft Identity theft is hard to protect against because hackers are getting better and better and.
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
Hackers, Crackers, and Network Intruders: Heroes, villains, or delinquents? Tim McLaren Thursday, September 28, 2000 McMaster University.
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
Comprehensive Experimental Analyses of Automotive Attack Surfaces Authors: Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham,
7.1 Copyright © 2011 Pearson Education, Inc. 7 Chapter Securing Information Systems.
Ethical Hacking Introduction.  What is Ethical Hacking?  Types of Ethical Hacking  Responsibilities of a ethical hacker  Customer Expectations  Skills.
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
 The hackers is a persons that they have a many knowledge in the area of ​​ computer and are capable of deceive the security.
Don’t Lose Your Identity – Protect Yourself from Spyware Dan Frommer Sherry Minton.
Copyright © 2002 Pearson Education, Inc. Slide 5-1 PERTEMUAN 8.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
DIYTP What is Cybercrime?  Using the Internet to commit a crime.  Identity Theft  Hacking  Viruses  Facilitation of traditional criminal activity.
Comprehensive Experimental Analyses of Automotive Attack Surfaces
ETHICS IN COMPUTER SCIENCE Hacking and identity theft.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
External Threats to Healthcare Data Joshua Spencer, CPHIMS, C | EH.
Safe computing and Malware Presentation done by Tylor Hardwick, Alex Gilsdorf, Code Forrester, Xander Winans.
Internet Safety By Stephanie Jarrard. What is the Internet?  “Internet” is a shortened name for “Interconnected networks”  The internet is a global.
Cyber Crimes.
PART THREE E-commerce in Action Norton University E-commerce in Action.
Discussion Topics What is Identity Theft? Ways to Commit Identity Theft How Identity Thieves uses Victim’s Information Guarding your personal Information.
Identity Theft By: Chelsea Thompson. What is identity theft? The crime of obtaining the personal or financial information of another person for the purpose.
Abstraction Computer Science and Software Engineering
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
PARTFOLIO: BY GROUP MOHAMAD SHAZWAN BIN DAUD NUR’ ARINA ATIQAH BT ASRAR
Management Information Systems Chapter Eight Securing Information Systems Md. Golam Kibria Lecturer, Southeast University.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Chapter TIK XII Science. DATABASE MANAGEMENT.
The School of Electrical Engineering and Computer Science (EECS) CS/ECE Advanced Network Security Dr. Attila Altay Yavuz Topic 1.2 Course and Project Overview.
Chapter 7 Phishing, Pharming, and Spam. Phishing Phishing is a criminal activity using computer security techniques. Phishers try to acquire information.
SCAMS & SCHEMES PROTECTING YOUR IDENTITY. SCAMS WHAT IS A SCAM? ATTEMPT TO TRICK SOMEONE, USUALLY WITH THE INTENTION OF STEALING MONEY OR PRIVATE INFORMATION.
You. are at risk for the fastest growing crimes crime.
Protecting Your Identity © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
Computer crimes.
INTRODUCTION & QUESTIONS.
By: Nikki Tucker MARSHALL MIDDLE SCHOOL 7 TH GRADE MR. DRYER.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
The Dangers and Consequences of Identity Theft By: Deandre Bennett.
5 different ways to get tricked on the internet. 1. Viruses A virus is a computer malware program that copies it’s files to the computer. This may allow.
Cybersecurity Test Review Introduction to Digital Technology.
Any criminal action perpetrated primarily through the use of a computer.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
1 Figure 1-3: Attack Trends Growing Incident Frequency  Incidents reported to the Computer Emergency Response Team/Coordination Center  1997: 2,134.
DEPARTMENT OF COMPUTER SCIENCE INTRODUCTION TO CYBER AND SECURITY.
Internet Security TEAMS March 18 th, ISP:Internet Service Provider.
Social Impacts of IT: P6 By André Sammut. Social Impacts IT impacts our life both in good ways and bad ways. Multiplayer Games Social Networks Anti-social.
HACKING Submitted By: Ch. Leela Sasi, I M.C.A, Y11MC29011, CJJC P.G College.
Allison Gladkowski.  About privacy and why it matters  Spyware and spam vocabulary and examples  Identity theft  Unapproved access  Today's big issues.
Security Risks Todays Lesson Security Risks Security Precautions
Comprehensive Experimental Analyses of Automotive Attack Surfaces
Identity Theft It’s a crime!
Mrs. Esman Computer Special
IT Security  .
Threats By Dr. Shadi Masadeh.
How to Protect Yourself from ID Theft and Social Engineering
Ethical hacking
Christopher romano & Courtney Sullivan 18 September 2017 Ia445
Computer Security.
Introduction to Cybercrime and Security
Unit 1 Fundamentals of IT
Who am I?. Information Security and You: Identity Theft and Credit Card Encryption.
Security in mobile technologies
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

ETHICS IN COMPUTER SCIENCE Hacking and identity theft

Driverless cars  Possible benefits?

Driverless cars  Possible benefits?  Possible dangers?

Automobile hacking  A research team was able to remotely:  disable the brakes, selectively brake individual wheels on demand, stop the engine  Carry out an attack that embeds malicious code in a car’s telematics unit and completely erases any evidence of its presence after a crash.  “We were able to release the brakes and actually prevent our driver from braking; no amount of pressure on the brake pedal was able to activate the brakes”  “We discuss the complex challenges in addressing these vulnerabilities” Experimental Security Analysis of a Modern Automobile Karl Koscher, Alexei Czeskis, Franziska Roesner, Shwetak Patel, Tadayoshi Kohno, Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, and Stefan Savage 2010 IEEE Symposium on Security and Privacy

How does this impact your thinking on driverless cars?

 Is this different from physically cutting someone’s brake lines?

 Is stealing someone’s credit card number different from stealing their wallet?

Is it OK for security researchers to expose vulnerabilities in existing systems?  Black hat vs white hat

Identity theft  You can buy credit card numbers over the internet for $1-$30 each  How many of you have credit cards?  Have you gotten a call from the identity protection unit? Large data breaches are a relatively small contributor  Phishing, spoofing, skimmers  Keystroke loggers  Improperly sanitized ewaste  Guessing social security numbers from fb info  Hackers buy malware  Low-tech: garbage, fake phone calls…  Also: Criminal identity theft

Hacking is really different from writing code

Grace Hopper  Invented the first compiler  One of the inventors of the first compiled computer programming language (COBOL)  Navy rear admiral  Has a Navy Destroyer named after her  Oldest active-duty commissioned officer in the Navy  code/ code/