A Gift of FireThird editionSara Baase.ppt
《A Gift of FireThird editionSara Baase.ppt》由会员分享,可在线阅读,更多相关《A Gift of FireThird editionSara Baase.ppt(27页珍藏版)》请在麦多课文档分享上搜索。
1、Slides prepared by Cyndi Chie and Sarah Frye,A Gift of Fire Third edition Sara Baase,Chapter 5: Crime,What We Will Cover,Hacking Identity Theft and Credit Card Fraud Scams and Forgery Crime Fighting Versus Privacy and Civil Liberties Laws That Rule the Web,Hacking,Hacking currently defined as to gai
2、n illegal or unauthorized access to a file, computer, or network The term has changed over time Phase 1: early 1960s to 1970s It was a positive term A “hacker“ was a creative programmer who wrote elegant or clever code A “hack“ was an especially clever piece of code,Hacking (cont.),Phase 2: 1970s to
3、 mid 1990s Hacking took on negative connotations Breaking into computers for which the hacker does not have authorized access Still primarily individuals Includes the spreading of computer worms and viruses and phone phreaking Companies began using hackers to analyze and improve security,Hacking (co
4、nt.),Phase 3: beginning with the mid 1990s The growth of the Web changed hacking; viruses and worms could be spread rapidly Political hacking (Hacktivism) surfaced Denial-of-service (DoS) attacks used to shut down Web sites Large scale theft of personal and financial information,Hacking (cont.),Hack
5、tivism, or Political Hacking: Use of hacking to promote a political cause Disagreement about whether it is a form of civil disobedience and how (whether) it should be punished Some use the appearance of hacktivism to hide other criminal activities How do you determine whether something is hacktivism
6、 or simple vandalism?,Hacking (cont.),The Law: Catching and Punishing Hackers: 1986 Congress passed the Computer Fraud and Abuse Act (CFAA) Covers government computers, financial and medical systems, and activities that involve computers in more than one state, including computers connected to the I
7、nternet The USA Patriot Act expanded the definition of loss to include the cost of responding to an attack, assessing damage and restoring systems,Hacking (cont.),The Law: Catching and Punishing Hackers (cont.): A variety of methods for catching hackers Law enforcement agents read hacker newsletters
8、 and participate in chat rooms undercover They can often track a handle by looking through newsgroup archives Security professionals set up honey pots which are Web sites that attract hackers, to record and study Computer forensics is used to retrieve evidence from computers,Hacking (cont.),The Law:
9、 Catching and Punishing Hackers (cont.): Penalties for young hackers Many young hackers have matured and gone on to productive and responsible careers Temptation to over or under punish Sentencing depends on intent and damage done Most young hackers receive probation, community service, and/or fines
10、 Not until 2000 did a young hacker receive time in juvenile detention,Hacking (cont.),The Law: Catching and Punishing Hackers (cont.): Security Internet started with open access as a means of sharing information for research Attitudes about security were slow to catch up with the risks Firewalls are
11、 used to monitor and filter out communication from untrusted sites or that fit a profile of suspicious activity Security is often playing catch-up to hackers as new vulnerabilities are discovered and exploited,Hacking (cont.),The Law: Catching and Punishing Hackers (cont.): Responsibility for Securi
12、ty Developers have a responsibility to develop with security as a goal Businesses have a responsibility to use security tools and monitor their systems to prevent attacks from succeeding Home users have a responsibility to ask questions and educate themselves on the tools to maintain security (perso
13、nal firewalls, anti-virus and anti-spyware),Hacking Discussion Questions,Is hacking that does no direct damage or theft a victimless crime? Do you think hiring former hackers to enhance security is a good idea or a bad idea? Why?,Identity Theft and Credit Card Fraud,Stealing Identities: Identity The
14、ft various crimes in which a criminal or large group uses the identity of an unknowing, innocent person Use credit/debit card numbers, personal information, and social security numbers 18-29 year-olds are the most common victims because they use the web most and are unaware of risks E-commerce has m
15、ade it easier to steal card numbers and use without having the physical card,Identity Theft and Credit Card Fraud (cont.),Stealing Identities (cont.): Techniques used to steal personal and financial information Phishing - e-mail fishing for personal and financial information disguised as legitimate
16、business e-mail Pharming - false Web sites that fish for personal and financial information by planting false URLs in Domain Name Servers Online resumes and job hunting sites may reveal SSNs, work history, birth dates and other information that can be used in identity theft,Identity Theft and Credit
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
2000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- AGIFTOFFIRETHIRDEDITIONSARABAASEPPT
