IS 490 Notes for Baase Textbook, Chapter 5. Corresponding page number:  Hacking  Identity Theft and Credit Card Fraud  Whose Laws Rule the Web

Slides:



Advertisements
Similar presentations
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Advertisements

A Gift of Fire, 2edChapter 7: Computer Crime1 Computer Crime.
Ethical Issues of Computer Networks
 Someone who exercises playful ingenuity  Misusers of the internet who try to obtain or corrupt information; people who try to prevent it.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Slides prepared by Cyndi Chie and Sarah Frye Adapted for use in LSU course CSC-1200 “Ethics in Computing” A Gift of Fire Third edition Sara Baase Chapter.
A Gift of Fire Third edition Sara Baase
Breaking Trust On The Internet
1 COMPUTER SECURITY AND ETHICS Chapter Five. Computer Security Risks 2.
Legal and Ethical Issues: Privacy and Security Chapter Five.
E-Commerce Security Issues. General E-Business Security Issues Any E-Business needs to be concerned about network security. The Internet is a “ public.
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
Chapter 9: Privacy, Crime, and Security
EXAMINING CYBER/COMPUTER LAW BUSINESS LAW. EXPLAIN CYBER LAW AND THE VARIOUS TYPES OF CYBER CRIMES.
Mod H-1 Examples of Computer Crimes. Mod H-2 Stuxnet.
Prepared by: Nahed Al-Salah
A Gift of Fire Fourth edition Sara Baase
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 5: Crime.
Security, Privacy, and Ethics Online Computer Crimes.
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Crime CS4020.
Copyright © 2002 Pearson Education, Inc. Slide 5-1 PERTEMUAN 8.
Wonga example Register Question- What risks do you think businesses face due to IT developments?
Computer Viruses. Where the name came from This is a phrase coined from biology to describe a piece of software that behaves very much like a real virus.
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Copyright © 2014 Pearson Education, Inc. 1 IS Security is a critical aspect of managing in the digital world Chapter 10 - Securing Information Systems.
Chapter 11 Security and Privacy: Computers and the Internet.
Securing Information Systems
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Cyber Crimes.
PART THREE E-commerce in Action Norton University E-commerce in Action.
BUSINESS B1 Information Security.
Computer crime University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot March 2011 March 2011 ITSS 4201 Internet Insurance and.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B6 Information Security.
CSE/ISE 312 Chapter 5: Computer Crime. Outline  Hacking  Identity Theft and Credit Card Fraud  Laws that Rule the Web.
ED 505 Educational Technology By James Moore.  What is the definition of Netiquette and how does it apply to social media sites? ◦ Netiquette is the.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
Do you believe in this? Due to its very nature, the Internet is NOT a safe or secure environment. It is an ever-changing medium where anyone and everyone.
Trojan Horses on the Web. Definition: A Trojan horse a piece of software that allows the user think that it does a certain task, while actually does an.
COPYRIGHT © 2011 South-Western/Cengage Learning. 1 Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears,
Electronic Marketing: Integrating Electronic Resources into the Marketing Process, 2e 11/5/2015  2004 Joel Reedy and Shauna Schullo Electronic Marketing.
A Gift of Fire Third edition Sara Baase Chapter 5: Crime.
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Topic 5: Basic Security.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 5: Crime.
Cybercrime What is it, what does it cost, & how is it regulated?
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2013 CCH Incorporated. All Rights Reserved W. Peterson Ave.
MANAGING RISK. CYBER CRIME The use of the internet and developments in IT bring with it a risk of cyber crime. Credit card details are stolen, hackers.
CONTROLLING INFORMATION SYSTEMS
Computer Security By Duncan Hall.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Be Safe Online. Agree, Disagree, Maybe if…  Worksheet Activity  Discussion.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 5: Crime.
A Gift of Fire Fourth edition Sara Baase
Chapter 11 crime and security in the networked economy
Securing Information Systems
A Gift of Fire Third edition Sara Baase
A Gift of Fire Third edition Sara Baase
Forensic and Investigative Accounting
A Gift of Fire Third edition Sara Baase
A Gift of Fire Third edition Sara Baase
Presentation transcript:

IS 490 Notes for Baase Textbook, Chapter 5

Corresponding page number:  Hacking  Identity Theft and Credit Card Fraud  Whose Laws Rule the Web What We Will Cover 229

Corresponding page number:  Intentional, unauthorized access to computer systems  The term has changed over time  Phase 1: The joy of programming  Early 1960s to 1970s  It was a positive term  A "hacker" was a creative programmer who wrote elegant or clever code  A "hack" was an especially clever piece of code Hacking

Corresponding page number: Phase 2: 1970s to mid 1990s  Hacking took on negative connotations  Breaking into computers for which the hacker does not have authorized access  Still primarily individuals  Includes the spreading of computer worms and viruses and ‘phone phreaking’  Companies began using hackers to analyze and improve security Hacking

Corresponding page number: Phase 3: The growth of the Web and mobile devices  Beginning in mid 1990s  The growth of the Web changed hacking; viruses and worms could be spread rapidly  Political hacking (Hacktivism) surfaced  Denial-of-service (DoS) attacks used to shut down Web sites  Large scale theft of personal and financial information Hacking

Corresponding page number: Is “harmless hacking” harmless?  Responding to nonmalicious or prank hacking uses resources.  Hackers could accidentally do significant damage.  Almost all hacking is a form of trespass. Hacking 235

Corresponding page number: Hacktivism, or Political Hacking  Use of hacking to promote a political cause  Disagreement about whether it is a form of civil disobedience and how (whether) it should be punished  Some use the appearance of hacktivism to hide other criminal activities  How do you determine whether something is hacktivism or simple vandalism? Hacking

Corresponding page number: Hackers as Security Researchers  “White hat hackers” use their skills to demonstrate system vulnerabilities and improve security Hacking

Corresponding page number: Hacking as Foreign Policy  Hacking by governments has increased  Pentagon has announced it would consider and treat some cyber attacks as acts of war, and the U.S. might respond with military force.  How can we make critical systems safer from attacks? Hacking

Corresponding page number: Stuxnet  An extremely sophisticated worm  Targets a particular type of control system  Beginning in 2008, damaged equipment in a uranium enrichment plant in Iran Hacking 240

Corresponding page number: Security  Hacking is a problem, but so is poor security.  Variety of factors contribute to security weaknesses:  History of the Internet and the Web  Inherent complexity of computer systems  Speed at which new applications develop  Economic and business factors  Human nature Hacking

Corresponding page number: Security  Internet started with open access as a means of sharing information for research.  Attitudes about security were slow to catch up with the risks.  Firewalls are used to monitor and filter out communication from untrusted sites or that fit a profile of suspicious activity.  Security is often playing catch-up to hackers as new vulnerabilities are discovered and exploited. Hacking

Corresponding page number: Responsibility for Security  Developers have a responsibility to develop with security as a goal.  Businesses have a responsibility to use security tools and monitor their systems to prevent attacks from succeeding.  Home users have a responsibility to ask questions and educate themselves on the tools to maintain security (personal firewalls, anti-virus and anti- spyware). Hacking

Corresponding page number: Discussion Questions  Is hacking that does no direct damage a victimless crime?  Do you think hiring former hackers to enhance security is a good idea or a bad idea? Why? Hacking

Corresponding page number: The Law: Catching and Punishing Hackers  1984 Congress passed the Computer Fraud and Abuse Act (CFAA)  Covers government computers, financial and medical systems, and activities that involve computers in more than one state, including computers connected to the Internet  Under CFAA, it is illegal to access a computer without authorization  The USA PATRIOT Act expanded the definition of loss to include the cost of responding to an attack, assessing damage and restoring systems Hacking 245

Corresponding page number: The Law: Catching and Punishing Hackers  Catching hackers  Law enforcement agents read hacker newsletters and participate in chat rooms undercover  They can often track a handle by looking through newsgroup or other archives  Security professionals set up ‘honey pots’ which are Web sites that attract hackers, to record and study  Computer forensics specialists can retrieve evidence from computers, even if the user has deleted files and erased the disks  Investigators trace viruses and hacking attacks by using ISP records and router logs Hacking 246

Corresponding page number: The Law: Catching and Punishing Hackers  Penalties for young hackers  Many young hackers have matured and gone on to productive and responsible careers  Temptation to over or under punish  Sentencing depends on intent and damage done  Most young hackers receive probation, community service, and/or fines  Not until 2000 did a young hacker receive time in juvenile detention Hacking

Corresponding page number: The Law: Catching and Punishing Hackers  Criminalize virus writing and hacker tools? Hacking

Corresponding page number: The Law: Catching and Punishing Hackers  Expansion of the Computer Fraud and Abuse Act  The CFAA predates social networks, smartphones, and sophisticated invisible information gathering.  Some prosecutors use the CFAA to bring charges against people or businesses that do unauthorized data collection.  Is violating terms of agreement a form of hacking? Hacking

Corresponding page number: Stealing Identities  Identity Theft –various crimes in which criminals use the identity of an unknowing, innocent person  Use credit/debit card numbers, personal information, and social security numbers  year-olds are the most common victims because they use the Web most and are unaware of risks  E-commerce has made it easier to steal and use card numbers without having the physical card Identity Theft and Credit Card Fraud

Corresponding page number: Stealing Identities  Techniques used to steal personal and financial information  Requests for personal and financial information disguised as legitimate business communication  Phishing –  Smishing – text messaging  Vishing – voice phishing  Pharming – false Web sites that fish for personal and financial information by planting false URLs in Domain Name Servers  Online resumes and job hunting sites may reveal SSNs, work history, birth dates and other information that can be used in identity theft Identity Theft and Credit Card Fraud

Corresponding page number: Responses to Identity Theft  Authentication of and Web sites  Use of encryption to securely store data, so it is useless if stolen  Authenticating customers to prevent use of stolen numbers, may trade convenience for security  In the event information is stolen, a fraud alert can flag your credit report; some businesses will cover the cost of a credit report if your information has been stolen Identity Theft and Credit Card Fraud

Corresponding page number: Responses to Identity Theft  Authenticating customers and preventing use of stolen numbers  Activation for new credit cards  Retailers do not print the full card number and expiration date on receipts  Software detects unusual spending activities and will prompt retailers to ask for identifying information  Services, like PayPal, act as third party allowing a customer to make a purchase without revealing their credit card information to a stranger Identity Theft and Credit Card Fraud

Corresponding page number: Biometrics  Biological characteristics unique to an individual  No external item (card, keys, etc.) to be stolen  Used in areas where security needs to be high, such as identifying airport personnel  Biometrics can be fooled, but more difficult to do so, especially as more sophisticated systems are developed Identity Theft and Credit Card Fraud

Corresponding page number: When Digital Actions Cross Borders  Laws vary from country to country.  Corporations that do business in multiple countries must comply with the laws of all the countries involved.  Someone whose actions are legal in their own country may face prosecution in another country where their actions are illegal. Whose Laws Rule the Web

Corresponding page number: Yahoo and French censorship  Display and sale of Nazi memorabilia illegal in France and Germany  Yahoo was sued in French court because French citizens could view Nazi memorabilia offered on Yahoo’s U.S.-based auction sites  Legal issue is whether the French law should apply to Yahoo auction sites on Yahoo’s computers located outside of France. Whose Laws Rule the Web

Corresponding page number: Applying U.S. copyright law to foreign companies  Russian company sold a computer program that circumvents controls embedded in electronic books to prevent copyright infringement.  Program was legal in Russia, but illegal in U.S.  Program’s author, Dmitry Sklyarov, arrested when arrived in U.S. to present a talk on the weaknesses in control software used in ebooks.  After protests in U.S. and other countries, he was allowed to return to Russia. Whose Laws Rule the Web 261

Corresponding page number: Arresting executives of online gambling and payment companies  An executive of a British online gambling site was arrested as he transferred planes in Dallas. (Online sports betting is not illegal in Britain.)  Unlawful Internet Gambling Enforcement Act prohibits credit card and online-payment companies from processing transactions between bettors and gambling sites. 262 Whose Laws Rule the Web

Corresponding page number: Libel, Speech and Commercial Law  Even if something is illegal in both countries, the exact law and associated penalties may vary.  In cases of libel, the burden of proof differs in different countries Whose Laws Rule the Web

Corresponding page number: Libel, Speech and Commercial Law  Libel tourism  Traveling to places with strict libel laws in order to sue  SPEECH Act of 2010 makes foreign libel judgments unenforceable in the U.S. if they would violate the First Amendment.  Foreign governments can still seize assets  Where a trial is held is important not just for differences in the law, but also the costs associated with travel between the countries; cases can take some time to come to trial and may require numerous trips.  Freedom of speech suffers if businesses follow laws of the most restrictive countries Whose Laws Rule the Web

Corresponding page number: Libel, Speech and Commercial Law  Some countries have strict regulations on commercial speech and advertising. 264 Whose Laws Rule the Web

Corresponding page number: Discussion Questions  What suggestions do you have for resolving the issues created by differences in laws between different countries?  What do you think would work, and what do you think would not? Whose Laws Rule the Web

Corresponding page number:  Respecting cultural differences is not the same as respecting laws  Where a large majority of people in a country support prohibitions on certain content, is it ethically proper to abandon the basic human rights of free expression and freedom of religion for minorities? Culture, Law, and Ethics 265

Corresponding page number: International agreements  Countries of the World Trade Organization (WTO) agree not to prevent their citizens from buying certain services from other countries if those services are legal in their own.  The WTO agreement does not help when a product, service, or information is legal in one country and not another. Potential Solutions 266

Corresponding page number: Alternative principles  Responsibility-to-prevent-access  Publishers must prevent material or services from being accessed in countries where they are illegal.  Authority-to-prevent entry  Government of Country A can act within Country A to try to block the entrance of material that is illegal there, but may not apply its laws to the people who create and publish the material, or provide a service, in Country B if it is legal there. Potential Solutions