欢迎来到麦多课文档分享! | 帮助中心 海量文档,免费浏览,给你所需,享你所想!
麦多课文档分享
全部分类
  • 标准规范>
  • 教学课件>
  • 考试资料>
  • 办公文档>
  • 学术论文>
  • 行业资料>
  • 易语言源码>
  • ImageVerifierCode 换一换
    首页 麦多课文档分享 > 资源分类 > PPT文档下载
    分享到微信 分享到微博 分享到QQ空间

    A Gift of FireThird editionSara Baase.ppt

    • 资源ID:373153       资源大小:63KB        全文页数:27页
    • 资源格式: PPT        下载积分:2000积分
    快捷下载 游客一键下载
    账号登录下载
    微信登录下载
    二维码
    微信扫一扫登录
    下载资源需要2000积分(如需开发票,请勿充值!)
    邮箱/手机:
    温馨提示:
    如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
    如需开发票,请勿充值!如填写123,账号就是123,密码也是123。
    支付方式: 支付宝扫码支付    微信扫码支付   
    验证码:   换一换

    加入VIP,交流精品资源
     
    账号:
    密码:
    验证码:   换一换
      忘记密码?
        
    友情提示
    2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,就可以正常下载了。
    3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
    4、本站资源下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。
    5、试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。

    A Gift of FireThird editionSara Baase.ppt

    1、Slides prepared by Cyndi Chie and Sarah Frye,A Gift of Fire Third edition Sara Baase,Chapter 5: Crime,What We Will Cover,Hacking Identity Theft and Credit Card Fraud Scams and Forgery Crime Fighting Versus Privacy and Civil Liberties Laws That Rule the Web,Hacking,Hacking currently defined as to gai

    2、n illegal or unauthorized access to a file, computer, or network The term has changed over time Phase 1: early 1960s to 1970s It was a positive term A “hacker“ was a creative programmer who wrote elegant or clever code A “hack“ was an especially clever piece of code,Hacking (cont.),Phase 2: 1970s to

    3、 mid 1990s Hacking took on negative connotations Breaking into computers for which the hacker does not have authorized access Still primarily individuals Includes the spreading of computer worms and viruses and phone phreaking Companies began using hackers to analyze and improve security,Hacking (co

    4、nt.),Phase 3: beginning with the mid 1990s The growth of the Web changed hacking; viruses and worms could be spread rapidly Political hacking (Hacktivism) surfaced Denial-of-service (DoS) attacks used to shut down Web sites Large scale theft of personal and financial information,Hacking (cont.),Hack

    5、tivism, or Political Hacking: Use of hacking to promote a political cause Disagreement about whether it is a form of civil disobedience and how (whether) it should be punished Some use the appearance of hacktivism to hide other criminal activities How do you determine whether something is hacktivism

    6、 or simple vandalism?,Hacking (cont.),The Law: Catching and Punishing Hackers: 1986 Congress passed the Computer Fraud and Abuse Act (CFAA) Covers government computers, financial and medical systems, and activities that involve computers in more than one state, including computers connected to the I

    7、nternet The USA Patriot Act expanded the definition of loss to include the cost of responding to an attack, assessing damage and restoring systems,Hacking (cont.),The Law: Catching and Punishing Hackers (cont.): A variety of methods for catching hackers Law enforcement agents read hacker newsletters

    8、 and participate in chat rooms undercover They can often track a handle by looking through newsgroup archives Security professionals set up honey pots which are Web sites that attract hackers, to record and study Computer forensics is used to retrieve evidence from computers,Hacking (cont.),The Law:

    9、 Catching and Punishing Hackers (cont.): Penalties for young hackers Many young hackers have matured and gone on to productive and responsible careers Temptation to over or under punish Sentencing depends on intent and damage done Most young hackers receive probation, community service, and/or fines

    10、 Not until 2000 did a young hacker receive time in juvenile detention,Hacking (cont.),The Law: Catching and Punishing Hackers (cont.): Security Internet started with open access as a means of sharing information for research Attitudes about security were slow to catch up with the risks Firewalls are

    11、 used to monitor and filter out communication from untrusted sites or that fit a profile of suspicious activity Security is often playing catch-up to hackers as new vulnerabilities are discovered and exploited,Hacking (cont.),The Law: Catching and Punishing Hackers (cont.): Responsibility for Securi

    12、ty Developers have a responsibility to develop with security as a goal Businesses have a responsibility to use security tools and monitor their systems to prevent attacks from succeeding Home users have a responsibility to ask questions and educate themselves on the tools to maintain security (perso

    13、nal firewalls, anti-virus and anti-spyware),Hacking Discussion Questions,Is hacking that does no direct damage or theft a victimless crime? Do you think hiring former hackers to enhance security is a good idea or a bad idea? Why?,Identity Theft and Credit Card Fraud,Stealing Identities: Identity The

    14、ft various crimes in which a criminal or large group uses the identity of an unknowing, innocent person Use credit/debit card numbers, personal information, and social security numbers 18-29 year-olds are the most common victims because they use the web most and are unaware of risks E-commerce has m

    15、ade it easier to steal card numbers and use without having the physical card,Identity Theft and Credit Card Fraud (cont.),Stealing Identities (cont.): Techniques used to steal personal and financial information Phishing - e-mail fishing for personal and financial information disguised as legitimate

    16、business e-mail Pharming - false Web sites that fish for personal and financial information by planting false URLs in Domain Name Servers Online resumes and job hunting sites may reveal SSNs, work history, birth dates and other information that can be used in identity theft,Identity Theft and Credit

    17、 Card Fraud (cont.),Stealing Identities (cont.): Techniques used to protect personal and financial information Activation for new credit cards Retailers do not print the full card number and expiration date on receipts Software detects unusual spending activities and will prompt retailers to ask for

    18、 identifying information Services, like PayPal, act as third party allowing a customer to make a purchase without revealing their credit card information to a stranger,Identity Theft and Credit Card Fraud (cont.),Responses to Identity Theft: Authentication of e-mail and Web sites Use of encryption t

    19、o securely store data, so it is useless if stolen Authenticating customers to prevent use of stolen numbers, may trade convenience for security In the event information is stolen, a fraud alert can flag your credit report; some businesses will cover the cost of a credit report if your information ha

    20、s been stolen,Identity Theft and Credit Card Fraud (cont.),Biometrics: Biological characteristics unique to an individual No external item (card, keys, etc.) to be stolen Used in areas where security needs to be high, such as identifying airport personnel Biometrics can be fooled, but more difficult

    21、 to do so, especially as more sophisticated systems are developed,Identity Theft and Credit Card Fraud Discussion Questions,What steps can you take to protect yourself from identity theft and credit card fraud? How can you distinguish between an e-mail that is a phishing attempt and an e-mail from a

    22、 legitimate business?,Scams and Forgery,Auctions: FTC reports that online auction sites are one of the top sources of fraud complaints Some sellers do not send items or send inferior products Shill bidding is used to artificially raise prices Sellers give themselves or friends glowing reviews to gar

    23、ner consumer trust Auction sites use various techniques to counter dishonest sellers,Scams and Forgery (cont.),Click fraud - repeated clicking on an ad to either increase a sites revenue or to use up a competitors advertising budget Stock fraud - most common method is to buy a stock low, send out e-

    24、mails urging others to buy, and then sell when the price goes up, usually only for a short time Digital Forgery - new technologies (scanners and high quality printers) are used to create fake checks, passports, visas, birth certificates, etc., with little skill and investment,Crime Fighting Versus P

    25、rivacy and Civil Liberties,Search and Seizure of Computers: Requires a warrant to search and seize a computer Court rulings inconclusive about whether information found on computers, but not covered by a warrant, is considered in plain view Automated searches Can monitor constantly and less likely t

    26、o miss suspicious activity Can be programmed to only look for what is covered in a warrant,Crime Fighting Versus Privacy and . . . (cont.),The Issue of Venue: Charges are generally filed where the crime occurs Laws differ between states and countries Where charges are filed may have significant impa

    27、ct if community standards apply The FBI usually files in the state where the crime was discovered and the investigation began,Crime Fighting Versus Privacy and . . . (cont.),Cybercrime Treaty: International agreement to foster international cooperation among law enforcement agencies of different cou

    28、ntries in fighting copyright violations, pornography, fraud, hacking and other online fraud Treaty sets common standards or ways to resolve international cases,Whose Laws Rule the Web,When Digital Actions Cross Borders: Laws vary from country to country Corporations that do business in multiple coun

    29、tries must comply with the laws of all the countries involved Someone whose actions are legal in their own country may face prosecution in another country where their actions are illegal,Whose Laws Rule the Web (Cont.),Arresting Foreign Visitors: A Russian citizen was arrested for violating the DMCA

    30、 when he visited the U.S. to present a paper at a conference; his software was not illegal in Russia An executive of a British online gambling site was arrested as he transferred planes in Dallas (online sports betting is not illegal in Britain),Whose Laws Rule the Web (Cont.),Libel, Speech and Comm

    31、ercial Law: Even if something is illegal in both countries, the exact law and associated penalties may vary Where a trial is held is important not just for differences in the law, but also the costs associated with travel between the countries; cases can take some time to come to trial and may requi

    32、re numerous trips Freedom of speech suffers if businesses follow laws of the most restrictive countries,Whose Laws Rule the Web Discussion Questions,What suggestions do you have for resolving the issues created by differences in laws between different countries? What do you think would work, and what do you think would not?,


    注意事项

    本文(A Gift of FireThird editionSara Baase.ppt)为本站会员(吴艺期)主动上传,麦多课文档分享仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文档分享(点击联系客服),我们立即给予删除!




    关于我们 - 网站声明 - 网站地图 - 资源地图 - 友情链接 - 网站客服 - 联系我们

    copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
    备案/许可证编号:苏ICP备17064731号-1 

    收起
    展开