1 / 28

Chapter 5: Crime

Chapter 5: Crime. See Dilbert cartoons about crime: http://dilbert.com/strips/comic/2009-09-18/ http://dilbert.com/strips/comic/2009-05-12/. Announcements. Video scene assignment is posted

declan
Télécharger la présentation

Chapter 5: Crime

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Chapter 5: Crime See Dilbert cartoons about crime: http://dilbert.com/strips/comic/2009-09-18/ http://dilbert.com/strips/comic/2009-05-12/

  2. Announcements Video scene assignment is posted Tutorial on iMovie and Final Cut Pro will be held a week from today (March 31) at 4:15 in Avery Microcomputer Lab • More info and sign-up sheet on Tuesday Midterm exam grades posted on Monday (will be curved)

  3. Reading Quiz on Ch. 5 Covers 5.1, 5.2.1,5.2.3, 5.3, 5.5, 5.6 Please put all materials away except for cheat sheet.

  4. Quiz Question 1 A hacker can be described as a programmer who writes clever or elegant code someone who breaks into computers without authorization someone who modifies web sites to make a political statement All of the above None of the above

  5. Quiz Question 1 Answer D. All of the above All of these versions of a “hacker” can be found in Section 5.2.1 (pp. 253-260).

  6. Quiz Question 2 In this attack, hundreds of thousands of requests for Web pages and other information are issued to a single Web site: Zombie attack Love Bug attack Denial-of-service attack None of the above

  7. Quiz Question 2 Answer C. See p. 260.

  8. Quiz Question 3 The Computer Fraud and Abuse Act (CFAA) of 1986 applies to activities performed on computers connected to the internet applies to activities performed on private computers not connected to the internet applies to computers in foreign countries None of the above All of the above

  9. Quiz Question 3 Answer A. See p. 265 What does the CFAA address?

  10. Quiz Question 4 (Extra Credit) Writing computer code that could at some point be used to generate computer viruses or hack into computers is presently illegal in the U.S. True False

  11. Quiz Question 4 Answer B. False The bottom of p. 272 makes it clear that no such law exists, and points out that such a law would make it difficult to defend against such viruses, and may conflict with the First Amendment (Free Speech), since courts have previously ruled that software is a form of speech.

  12. Quiz Question 5 In this identity theft scheme, false IP addresses are planted in DNS tables, causing users to be unknowingly directed to fake sites: Phishing Pharming Spyware All of the above None of the above

  13. Quiz Question 5 Answer B. Pharming See pp. 274-275. What is a DNS? Is Pharming easier than Phishing?

  14. Quiz Question 6 Biometrics are the unique biological characteristics of a specific group of people, such as blood type or hair color the unique biological characteristics of a specific individual, such as fingerprint, eye patterns, or DNA. the unique measurements of an individual, such as height, weight, or arm length. All of the above None of the above

  15. Quiz Question 6 Answer B. Can biometric scanning devices be tricked? Why or why not? (Discuss with team.)

  16. Quiz Question 7 The purpose of the so-called Cyber-Crime Treaty is to help law enforcement agencies in different countries cooperate in the prosecution of cyber crimes. standardize the laws against cyber crimes in different U.S. states. toughen existing international laws against cyber crimes. None of the above

  17. Quiz Question 7 Answer A. See p. 291. What is a dual-criminality provision? What are arguments for and against such a provision?

  18. Quiz Question 8 Providers of services and information must make sure that their material is not accessible in countries where it is illegal—this principle is known as “authority to prevent entry” “responsibility to prevent access” “responsibility to regulate content” “mandate to block access” None of the above

  19. Quiz Question 8 Answer B. See p. 293 What prominent court case have we studied that assumed this principle?

  20. Quiz Question 9 The “authority to prevent entry” principle states that information providers must prevent their materials from being accessible in countries where the materials are illegal. individuals are solely responsible for blocking access to materials they find personally objectionable. governments may block access to material that is illegal in their country, but may not prosecute the providers of such material if the material is legal in the country in which it is produced. None of the above

  21. Quiz Question 9 Answer C. See p. 299 Do you think“responsibility to block access” or “authority to prevent entry” is a better policy? Why?

  22. Question 10 Whereas Ch. 5 of the book focuses mainly on , Mike Gaffney’s guest lecture focused mainly on. Cybercrime, Computer-Aided Dispatch Cybercrime, Crime detection Cybercrime, Crime prevention Cybercrime, Use of technology to identify, investigate and prosecute crimes None of the above

  23. Quiz Question 10 Answer C. (I hope anyone who was here on Tuesday got this right. )

  24. Update: Use of Lab Files Showed More than 100 Baseball Players Used Steroids On p. 289, the book mentions a well-known case involving the potential release of information on players who, according to lab files, used steroids The original search warrant was for 10 specific players, yet the law enforcement agents wanted to release info on 100 players who used steroids. How was the case settled? Let’s look: http://www.latimes.com/sports/la-sp-balco-ballplayers-20100914,0,1279725.story

  25. Discussion Exercise: Use of Car vs. Computer (Clicker) 5.8, p. 300: A friend logs on to your computer at night while you are asleep and uses some of your software. Another friend takes your car at night and drives it around for a while. (Neither has your permission; neither does damage.) List characteristics (ethics, legality, risks) of the two events that are similar and different. Which would offend you more? A: A friend using your computer software B: A friend driving your car C: Both would offend me equally D: Neither would offend me

  26. Discussion Exercise:Stance with Respect to Break-Ins (Clicker) Ex. 5.9, p. 300: Young, technically-oriented hackers have argued that, if owners of a computer system want to keep outsiders out, it is their responsibility to provide better security. Ken Thompson, one of the inventors of UNIX, said, “The act of breaking into a computer system has to have the same social stigma as breaking into a neighbor’s house. It should not matter that the neighbor’s door is unlocked.” Which position do you agree with more? Why? A: Young hackers’ position B: Ken Thompson’s position C: Neither D: Not sure

  27. Discussion Exercise:Surveillance Software to Monitor the Web (Clicker) Ex. 5.22, p. 301: Commenting on constitutional objections to the SEC’s plan to use surveillance software to monitor the Web for possible fraud (Section 5.5.1), an SEC offical said “the Consitution doesn’t give people the right to use the Internet to commit fraud.” Evaluate this response. Is it a good argument? A: Yes B: No C: Not sure

  28. Discussion Exercise:Computer Virus a Crime? (Clicker) Ex. 5.15, p. 300: Evaluate arguments in favor of and against passage of a law making the writing and publication of a computer virus a crime. (See Section 5.2.4.) Would you support such a law? Why? A: Yes, I would support such a law B: No, I wouldn’t support such a law C: I’m not sure

More Related