Presentation is loading. Please wait.

Presentation is loading. Please wait.

Chapter 12: Social Implications of IT

Similar presentations


Presentation on theme: "Chapter 12: Social Implications of IT"— Presentation transcript:

1 Chapter 12: Social Implications of IT
October 29, 2008

2 Today Chapter 12: Social Implications of IT Intellectual property
Software piracy P2P music sharing Hacking Viruses Worms Passwords

3 Just because it’s on the web, doesn’t mean it’s free for any use
IP & Copyright Just because it’s on the web, doesn’t mean it’s free for any use

4 Definitions of IP Intellectual Property (IP)
Property that enjoys legal protection and stems from the exercise of the mind. Content of the human intellect deemed to be unique and original and to have marketplace value — and thus to warrant protection under the law. Intellectual property includes but is not limited to ideas; inventions; literary works; chemical, business, or computer processes; and company or product names and logos.

5 IP Protection Intellectual property protections fall into four categories: Copyright (for literary works, art, and music), Trademarks (for company and product names and logos), Patents (for inventions and processes), and Trade secrets (for recipes, code, and processes).

6 Software Piracy Some Asian nations such as Vietnam and China boast a 90%+ piracy rate The US Piracy rate was estimated around 25% in 2002 SIIA estimates $2 billion in losses from North American piracy each year Western Europe accounts for $2.5-3 billion in losses annually

7 Napster, P2P File Sharing
What’s the damage to the music industry? Is there really any evidence that the music industry has been hurt? 2002 album sales down 9.8 percent Biggest ever decline Worldwide sales declined 22% between 1999 and 2004 The British singles market was cut in half over

8 Hacking Terminology Specific viruses and worms Passwords

9 What is a Virus? A self-replicating program that inserts copies of itself into other executable code (or document) Viruses cannot spread unless the executable code (or document) is transmitted to another machine Can be imbedded in macros (in Microsoft Word .docs) for instance Viruses can reside in executable files (.exe, .com) and the boot sectors of floppy disks

10 What is a Worm? Worms do not piggy-back on other programs
They are self-replicating and take advantage of security flaws in networked systems Worms may install backdoors in the infected computers.

11 The SoBig worm 2003 Both a worm and a Trojan Horse
Came attached as (Microsoft Outlook) Contained an attachment that when run would search through the files on the infected computer looking for addresses Then it would send to all of those addresses Worldwide, 15% of large companies and 30% of small companies were affected by SoBig.

12 The myDoom worm 2004… fastest spreading worm ever
In addition to attaching to Would also infect files in Peer-to-Peer shared directories (such as KaZaA). Implanted two backdoors: A backdoor on port 3127/tcp to allow remote control of the subverted PC A denial of service attack against the website of the company SCO Group, timed to commence 1 February 2004. January 26, 2004 For a period of a few hours mid-day, the worm's rapid spread slows overall internet performance by approximately ten percent and average web page load times by approximately fifty percent. Computer security companies report that Mydoom is responsible for approximately one in ten messages at this time.

13 Some More Terminology Denial of Service (Attack) Back door
If you send enough network traffic to a machine, it gets bogged down Spam Self-replicating worms Back door A hidden software or hardware mechanism used to circumvent security control Not always malicious Related to “software cheats”

14 Terms Firewall – A machine (or software) residing between the Internet and a subnetwork. Its job is to monitor all traffic in/out. Screens out all network messages that aren’t “certified” Proxy You can surf by proxy… meaning that you visit other websites through a proxy It is the proxy’s IP address that is reported

15 Key Logging Key logging
Software (or hardware) that records the keystrokes of a user Keylogging software will be undetectable Hardware keyloggers can be installed without even logging on to machine

16 Trojan Horse Trojan Horse
An apparently useful and innocent program containing additional hidden code which allows the unauthorized collection, exploitation, falsification, or destruction of data

17 CERT Who or what is CERT? http://www.cert.org/
The reporting center for internet security problems National response team

18 Passwords One of the most vulnerable part of computer systems is user passwords Because we have to remember so many passwords, people tend to use the same passwords and they are tend to be based on names and words. In lab we’ll look at how to rate good passwords But in general, don’t use words, names Mix upper and lower case Use digits too Use non-alpha numeric characters

19 … And now for the Lab As often as humanly possible
Run Windows Update on your computer Go to that site now and see what’s involved

20 Learning about Worms Read about the W32.Slugin.A virus
Go to Symantec’s Security Response site: Read about the W32.Slugin.A virus How does it work? See “technical details” How do you fix it?

21 Password Activities The following password analyzer site is great (but not always available): Try out some simple passwords

22 Looking ahead Chapters 12 and Chapter 13 Questions due 10/30
Chapters 14 & Chapter 16, 11/05 Chapter 17, 11/09


Download ppt "Chapter 12: Social Implications of IT"

Similar presentations


Ads by Google