A Gift of Fire, 2edChapter 7: Computer Crime1 PowerPoint ® Slides to Accompany A Gift of Fire : Social, Legal, and Ethical Issues for Computers and the.

Slides:



Advertisements
Similar presentations
Internet Safety Rockingham County Public Schools
Advertisements

By Andy Scott, Michael Murray and Adam Kanopa
A Gift of Fire, 2edChapter 8: Computers and Work1 PowerPoint ® Slides to Accompany A Gift of Fire : Social, Legal, and Ethical Issues for Computers and.
A Gift of Fire, 2edChapter 8: Computers and Work1 PowerPoint ® Slides to Accompany A Gift of Fire : Social, Legal, and Ethical Issues for Computers and.
Northside I.S.D. Acceptable Use Policy
1.8 Malpractice and Crime In this section you must be able to: Explain the consequences of malpractice and crime on information systems. Describe the possible.
Adapted by Melinda Buterbaugh Teacher Librarian.  Be polite when you are sending messages to people.  Treat other people the way you would like to be.
A Gift of Fire, 2edChapter 4: Can We Trust the Computer?1 PowerPoint ® Slides to Accompany A Gift of Fire : Social, Legal, and Ethical Issues for Computers.
Computer Fraud and Abuse Act (CFAA) Preventing the Destruction of eDocuments Team 8 – Jason Conrad, Ben Sweeney, Jeff Woodward.
A Gift of Fire, 2edChapter 7: Computer Crime1 A Gift of Fire Computer Crime Introduction Hacking Online Scams Fraud, Embezzlement, Sabotage, Information.
A Gift of Fire, 2edChapter 3: Encryption and Interception of Communications1 PowerPoint ® Slides to Accompany A Gift of Fire : Social, Legal, and Ethical.
PowerPoint® Slides to Accompany
A Gift of Fire, 2edChapter 10: Professional Ethics and Responsibilities1 PowerPoint ® Slides to Accompany A Gift of Fire : Social, Legal, and Ethical Issues.
Hacker Ethics Kim Bissett Sabrina Short. Hacker Ethic: In General  Freedom of Information The web is not physical; it couldn’t be interpreted as property,
Security, Privacy, and Ethics Online Computer Crimes.
Ethical Hacking by Shivam.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
A Gift of Fire, 2edChapter 9: Broader Issues on the Impact and Control of Computers1 PowerPoint ® Slides to Accompany A Gift of Fire : Social, Legal, and.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
A Gift of Fire, 2edChapter 3: Encryption and Interception of Communications1 PowerPoint ® Slides to Accompany A Gift of Fire : Social, Legal, and Ethical.
A Gift of Fire, 2edChapter 5: Freedom of Speech in Cyberspace1 PowerPoint ® Slides to Accompany A Gift of Fire : Social, Legal, and Ethical Issues for.
CS301 Discussion Topic. Asmt. 1: Hacking to improve security A Dutch hacker, who said he worked in computer security, sent to Microsoft warning.
Internet Guidelines. Cyberspace Cyberspace is like a big city. libraries, universities, museums, places to have fun, Places to meet people. But, like.
Issues Raised by ICT.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
Cyber Crimes.
 Computer Hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose.  the act.
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
6 th Grade. a. Identify Internet safety and security concerns (Cyber Predators, etc) b. Discuss illegal aspects of software piracy, hacking, and computer.
A Gift of Fire, 2edChapter 1: Unwrapping the Gift1 PowerPoint ® Slides to Accompany A Gift of Fire : Social, Legal, and Ethical Issues for Computers and.
“The act of gaining unauthorized access to computer systems (cracking) should not be criminalized assuming that there is no damage.” Dan Garrison Megan.
8/2: Managing IT: Security & Ethics Security: Controls –Information Systems controls Input, processing (hardware, software), output, storage –Facility.
10/3/08 Miller CSC309 1 Overview. 10/10/08 Miller CSC309 2 Evolution of this Course Accreditation was the motivation for this course and I probably started.
1 Legal and Ethical Aspects of Computer Hacking ECE4112 – Internetwork Security Georgia Institute of Technology Acknowledgement: Kiran Tajani.
The way to avoid being trap into cyber crime. What is cyber crime? The Department of Justice categorizes computer crime in three ways: 1. The computer.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Ethics. Ethics are the principles and standards we use to decide how to act.
Data protection This means ensuring that stored data does not get changed, removed or accessed accidentally or by unauthorised people. Data can be corrupted,
Security Debate Why cracking should be criminalized.
Credit:  Cyber law refers to any laws relating to protecting the Internet and other online communication technologies.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Cyberlaw. “The moving finger writes; and, having writ Moves on: nor all thy piety nor wit Shall lure it back to cancel half a line. Nor all thy tears.
Lecture 3 Ethics in the Workplace Privacy and Social Networks.
Whats it all about?.  C omputer crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Cyber crimes is the most popular news we come across daily In good olden days there were no development in the usage of computers as we have now As.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Todays’ Agenda What is the Tenafly AUP? Answer the following: What do the letters AUP stand for? What is the definition of an AUP? What are the 2 main.
To Know what Cyber crime is
Hacking: public policy
PowerPoint® Slides to Accompany
PowerPoint® Slides to Accompany
PowerPoint® Slides to Accompany
PowerPoint® Slides to Accompany
Chapter 11 crime and security in the networked economy
PowerPoint® Slides to Accompany
Section 19.1 Cyberlaw and Cybercrime. Section 19.1 Cyberlaw and Cybercrime.
COMPUTER CRIME.
PowerPoint® Slides to Accompany
PowerPoint® Slides to Accompany
A Gift of Fire Third edition Sara Baase
PowerPoint® Slides to Accompany
PowerPoint® Slides to Accompany
Computers: Tools for an Information Age
What is Information Security?
Chapter 7 – and 8 pp 155 – 202 of Web security by Lincoln D. Stein
Objectives: Create a personal page about yourself on GoZips
Public Records in Portugal
Presentation transcript:

A Gift of Fire, 2edChapter 7: Computer Crime1 PowerPoint ® Slides to Accompany A Gift of Fire : Social, Legal, and Ethical Issues for Computers and the Internet (2nd Edition) by Sara Baase San Diego State University Modified and Presented by Cuong Tham PowerPoint slides created by Sherry Clark Copyright 2003 Prentice Hall

A Gift of Fire, 2edChapter 7: Computer Crime2 Topic Asmt. 1: Hacking to improve security A Dutch hacker, who said he worked in computer security, sent e- mail to Microsoft warning that some of its Web sites were vulnerable to break-ins. Microsoft did not reply until after he broke in to one of the Web sites about a week later and left a taunting message as proof. Was his action ethical? Did he do Microsoft and the public a favor? What might be some reasons why Microsoft did not respond to his ? Group 1: Argue in support of the hacker. Group 2: Argue against the hacker.

A Gift of Fire, 2edChapter 7: Computer Crime3 Group 2 against the hacker Congress passed Computer Fraud and Abuse Act in 1986 (CFAA) According to CFAA, activities are legitimate when performed with authorization, but are illegal when done intentionally without authorization or by exceeding one’s authorization The action of the Dutch hack is against law

A Gift of Fire, 2edChapter 7: Computer Crime4 His action is not ethical As an intruder, his intention is uncertain. Because his action, the system administrator had to spend time and money to make sure the file is not modified in order to keep consistency

A Gift of Fire, 2edChapter 7: Computer Crime5 Even if his intention is good, that’s a possibility that he can accidentally damage the system he’s hacking.