Security Debate Why cracking should be criminalized.

Slides:



Advertisements
Similar presentations
Computer Crimes A criminal act committed through the use of a computer. It can also involve the theft of a computer and any equipment associated with the.
Advertisements

By Andy Scott, Michael Murray and Adam Kanopa
Torts.
Shelby County Technology Scope and Sequence 6-8 #8: AUP Computer Fraud Copyright Violations Penalties Nancy Law Columbiana Middle School.
AUP Acceptable Use Policy Summarized by Mr. Kirsch from the Sioux Falls School District Technology Plan.
News Gathering & the Law The Role of the First Amendment The text of the First Amendment, by its terms, says nothing about a right to gather news or a.
Cyber Law & Islamic Ethics CICT3523 COMPUTER CRIMES.
Legal Implications of ICT. In this section will look at: Legal Implications of ICT: ☼ Data Protection Act 1998 ◦ The 8 Principles, ◦ The Data Subject.
Acceptable Use Policy (or Fair Use): For Users of Computers and other technology.
Crimes Against Property 1.Grab an iPad 2. Tap on the Big L app 3. Log into the blog (log-ins) 4. Answer the Crimes Against Property Questions.
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Chapter 10 Crimes Against Property. How has our society developed techniques or habits that have lowered the number of property related crimes?
United States v. Nosal. The Nosal Fact Pattern Korn/Ferry computer Confidential information and trade secrets Authorized access by users logging in with.
Chapter 4 Legal Liability
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Computers and Crime Breaking and Entering Eavesdropping Harassment Vandalism Destruction of Private Property Possession of Stolen Goods Theft.
U.S criminal law’s reinforcement of technological measures protecting property: where the DMCA fits in Elliot N. Turrini Assistant U.S. Attorney Computer.
Hacker Ethics Kim Bissett Sabrina Short. Hacker Ethic: In General  Freedom of Information The web is not physical; it couldn’t be interpreted as property,
1 CHAPTER 1 POLITICS. 2 Definitions Of The Word Hacker Hacker – someone who has achieved some level of expertise with a computer Hacker – someone who.
Hazards of Hacking. Hacking Originally, hacking was used to describe a programmer who was very skilled at his/her profession Often, this person knew programming.
Security, Privacy, and Ethics Online Computer Crimes.
Current Information Technology Issues Norbert Mika NJ Mika Consulting Inc.
Chapter 10 White-Collar and Organized Crime. Introduction ► White-collar crimes – criminal offenses committed by people in upper socioeconomic strata.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
9 99 CHAPTER Privacy and Security. 9 © The McGraw-Hill Companies, Inc Objectives 1.Privacy 2.Security 3.Ergonomics 4.Environment.
GROUP 7 RAHUL JIMMY RONEY GEORGE SHABNAM EKKA SHEETHAL JOSEPH Cyber Laws in India- IT Act, 2000; 2004.
Copyright © 2014 Pearson Education, Inc. 1 IS Security is a critical aspect of managing in the digital world Chapter 10 - Securing Information Systems.
What distinguishes cyber crime from “traditional” crime? What distinguishes cyber crime from “traditional” crime? How has the Internet expanded opportunities.
BUS1MIS Management Information Systems Semester 1, 2012 Week 7 Lecture 1.
Spam and The Computer Fraud and Abuse Act Richard Warner.
 Computer Hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose.  the act.
Chapter 10.  Two groups of crimes against property.  Crimes in which property is destroyed Arson, vandalism  Crimes in which property is taken against.
Cyber crime & Security Prepared by : Rughani Zarana.
Computer Crime Confucius say: "Cracker who gets busted doing one of these crimes, will spend long time in jail house soup."
Unethical use of Computers and Networks
00870B2F.0/Internet%20Safety.jpg.
Use of U.T. Austin Property Computers: Security & Acceptable Use The University of Texas at Austin General Compliance Training Program.
The Computer Labs are a valuable tool for learning at Prattville High School While in the labs, students will Follow appropriate code of conduct. Adhere.
Chapter 9 Enhancing Information/Computer Security.
“The act of gaining unauthorized access to computer systems (cracking) should not be criminalized assuming that there is no damage.” Dan Garrison Megan.
Information Security What is Information Security?
Ethics. Ethics are the principles and standards we use to decide how to act.
ACCEPTABLE INTERNET USE POLICY BY: BRANDON POLK, SUBHAN NADEEM.
Computer Fraud and Abuse Act Richard Warner. Liability under the CFAA  1030(a)(2)(C) imposes liability on whoever “intentionally accesses a computer.
 What do you use the internet for?  Discuss the positive and negative aspects of the internet.  Provide examples of 3 positive aspects and 3 negative.
Copyright 2000, Marchany Computer Law Threats and Issues VA Computer Crime Act Randy Marchany VA Tech Computing Center ©Marchany,2001.
INTERNET SAFETY.
CONTROLLING INFORMATION SYSTEMS
Credit:  Cyber law refers to any laws relating to protecting the Internet and other online communication technologies.
DATA PROTECTION 2003 THEORY AND PRACTICE OF HANDLING WITH THE COMPUTER CRIME IN THE REPUBLIC OF MACEDONIA Belgrad.
Chapter 10 – Crimes Against Property. Arson The willful and malicious burning of a person’s property Intentionally burning a building to defraud the insurance.
PREPARED BY : Harsh patel dhruv patel sreejit sundaram.
Whats it all about?.  C omputer crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of.
ICT Legislation  Copyright, Designs and Patents Act (1988);  Computer Misuse Act (1990);  Health and Safety at Work Act (1974);  EU Health and Safety.
WHAT IS CYBER SECURITY? Governments, military, corporations, financial institutions, hospitals and other businesses collect, process and store a great.
Xin Xie Fan Yang Dorlly Cruz PRIVACY ACT. Invasion of our rights We like Technology but we also want our privacy.
Civil Law An overview of Tort Law – the largest branch of civil law Highlight the differences between tort law and criminal law How torts developed historically.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Google Form Report Presentation Fatin Kamilia Mohd Arif Natasha Zaireen Zubir Anis Marjan Azmimurad Nurakhma Shabani Jasni.
Advanced System Security Dr. Wayne Summers Department of Computer Science Columbus State University
Add video notes to lecture
Hacking: public policy
The 4th Amendment Notes 5-3.
Genuine Agreement Contracts Part 2.
Year 10 ICT ECDL/ICDL IT Security.
Chapter 13 Security and Ethical Challenges.
The 4th Amendment Notes 5-3.
Security of network and information systems
“Slides with answers will be online for review”
Presentation transcript:

Security Debate Why cracking should be criminalized

Security  “ protection of a computer or network system from damage or violation from an unauthorized source ”  Important that this includes both damage and violation (breaking into a system even if no damage is done)  “ protection of a computer or network system from damage or violation from an unauthorized source ”  Important that this includes both damage and violation (breaking into a system even if no damage is done)

“Cracking”  “ a person who breaks into security systems illegally ” is considered a cracker or hacker  Anyone who gets onto a system illegally needs to be punished (there are no exceptions specified for people that do not inflict damage)  “ a person who breaks into security systems illegally ” is considered a cracker or hacker  Anyone who gets onto a system illegally needs to be punished (there are no exceptions specified for people that do not inflict damage)

What is a computer system?  include hardware, software, network transmission paths, and people who interact with these components. By this definition, everything from a desktop workstation to the Internet qualifies as a computer system.  About protection of private property  include hardware, software, network transmission paths, and people who interact with these components. By this definition, everything from a desktop workstation to the Internet qualifies as a computer system.  About protection of private property

Real World Examples  Breaking into a house  Even if no damage is done, it is still unauthorized access and punishable  Breaking into a house  Even if no damage is done, it is still unauthorized access and punishable

Another Example  Kristin and Marina said in their position statement: “ We maintain that if there are no damages that can be proven … the cracker has committed no crime ”  However we believe we can use a real world example to counter this point  Kristin and Marina said in their position statement: “ We maintain that if there are no damages that can be proven … the cracker has committed no crime ”  However we believe we can use a real world example to counter this point

Dan’s Diary  If we were to crack into Dan’s computer and read his diary, but no one knew and we didn’t change it couldn’t there still be damage done?  Should always be an assumption on privacy  If we were to crack into Dan’s computer and read his diary, but no one knew and we didn’t change it couldn’t there still be damage done?  Should always be an assumption on privacy

Monitoring  People are allowed to monitor their own systems  Government has authority over many systems, not considered hacking/cracking and therefore is not illegal  It is only unauthorized access that should be punished  People are allowed to monitor their own systems  Government has authority over many systems, not considered hacking/cracking and therefore is not illegal  It is only unauthorized access that should be punished

Privacy Rights  Too narrow a definition of privacy  We are defining this as unauthorized access is what should be punished, if you are accessing something to fix it, then you should have authority to do so  This should never happen without your knowledge, always need consent  Too narrow a definition of privacy  We are defining this as unauthorized access is what should be punished, if you are accessing something to fix it, then you should have authority to do so  This should never happen without your knowledge, always need consent

What should be considered crime?  computer system crime: "any crime involving inappropriate interference with rights or other assets resulting from computer system use."  The National Information Infrastructure Protection Act of 1996  Thanks for bringing this up because according to our definition of the act:  “ One cannot knowingly and with intent to defraud, access a protected computer without authorization, or exceed authorized access, and by means of such conduct further the intended fraud and obtain anything of value ”  Any personal info can be considered “ of value ”  computer system crime: "any crime involving inappropriate interference with rights or other assets resulting from computer system use."  The National Information Infrastructure Protection Act of 1996  Thanks for bringing this up because according to our definition of the act:  “ One cannot knowingly and with intent to defraud, access a protected computer without authorization, or exceed authorized access, and by means of such conduct further the intended fraud and obtain anything of value ”  Any personal info can be considered “ of value ”