Download presentation
Presentation is loading. Please wait.
Published byEvan Carroll Modified over 9 years ago
1
ETHICS IN COMPUTER SCIENCE Hacking and identity theft
2
Driverless cars Possible benefits?
3
Driverless cars Possible benefits? Possible dangers?
4
Automobile hacking A research team was able to remotely: disable the brakes, selectively brake individual wheels on demand, stop the engine Carry out an attack that embeds malicious code in a car’s telematics unit and completely erases any evidence of its presence after a crash. “We were able to release the brakes and actually prevent our driver from braking; no amount of pressure on the brake pedal was able to activate the brakes” “We discuss the complex challenges in addressing these vulnerabilities” Experimental Security Analysis of a Modern Automobile Karl Koscher, Alexei Czeskis, Franziska Roesner, Shwetak Patel, Tadayoshi Kohno, Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, and Stefan Savage 2010 IEEE Symposium on Security and Privacy
5
How does this impact your thinking on driverless cars?
6
Is this different from physically cutting someone’s brake lines?
7
Is stealing someone’s credit card number different from stealing their wallet?
8
Is it OK for security researchers to expose vulnerabilities in existing systems? Black hat vs white hat
9
Identity theft You can buy credit card numbers over the internet for $1-$30 each How many of you have credit cards? Have you gotten a call from the identity protection unit? Large data breaches are a relatively small contributor Phishing, spoofing, skimmers Keystroke loggers Improperly sanitized ewaste Guessing social security numbers from fb info Hackers buy malware Low-tech: garbage, fake phone calls… Also: Criminal identity theft
10
Hacking is really different from writing code
11
Grace Hopper Invented the first compiler One of the inventors of the first compiled computer programming language (COBOL) Navy rear admiral Has a Navy Destroyer named after her Oldest active-duty commissioned officer in the Navy http://fivethirtyeight.com/features/the-queen-of- code/ http://fivethirtyeight.com/features/the-queen-of- code/
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.