1 / 18

Chapter 5

Chapter 5. Crime. Hacking. Hacker Trophy hacking Phone phreaking Cracker White-hat hackers & black-hat hackers Script kiddies Sniffers Social engineering. Hacking Cases. 1970s – John Draper (“Captain Crunch”) April 27, 1987 – “Captain Midnight”

dinah
Télécharger la présentation

Chapter 5

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Chapter 5 Crime

  2. Hacking • Hacker • Trophy hacking • Phone phreaking • Cracker • White-hat hackers & black-hat hackers • Script kiddies • Sniffers • Social engineering

  3. Hacking Cases • 1970s – John Draper (“Captain Crunch”) • April 27, 1987 – “Captain Midnight” • Good Evening HBO from Captain Midnight. $12.95 a month? No way!(Show-time/Movie Channel, Beware!) • Late 1980s – “Fry Guy” • Russian man & Citicorp • 1991 – “Michelangelo” virus • Viruses, time bombs, logic bombs • Gambling web site • Air traffic controllers in England • 1999 – “Melissa” virus • 2000 – The “Love Bug” or “ILOVEYOU” virus

  4. Hacking Cases • 2000 – Mafiaboy • Denial of service attack (DoS); distributed denial of service attack (DDoS); Trojan Horses • 10.10.08 PCWorld article: http://www.pcworld.com/businesscenter/article/152176/mafiaboy_grows_up_a_hacker_seeks_redemption.html • 2001 – Hacktivism • 2001 – “Code Red” worm • worm • 2003 – “Sapphire” worm or “Slammer” • 2003 – “Blaster” worm • 2004 – “Sasser” worm • 2001 – “Choke” & “Hello” worms • 2008 – Sarah Palin’s email hacked http://news.yahoo.com/s/ap/20081008/ap_on_el_pr/palin_hacked

  5. Firewalls • Windows Firewall – Start, Control Panel, Security • MacOS – System Preferences, Personal Security • 3rd Party Firewalls • Zone Alarm (free version – http://www.zonelabs.com) • PC Magazine page with more info: http://www.pcmag.com/category2/0,2806,4722,00.asp • Top 5: http://www.all-internet-security.com/top_10_firewall_software.html)

  6. First Amendment • Software is a form of speech. • The First Amendment does not protect some kinds of speech, such as inciting a riot. • Should virus software on the Web be protected under the First Amendment or should it be considered in the same class as that of inciting a riot?

  7. Virus Code Online The families of two hospital patients that died as the result of a virus in a hospital computer are suing each of the people listed below and urging the government to bring criminal charges for negligence against each of them: • A student in a course on computer security at a small college who posted a copy of the virus program on the class Web site, with a discussion of how it works. • The student who activated the virus and released it onto the Internet. • The president of the college. • The president of the college’s ISP. • The director of the hospital whose computer system the virus infected, causing the patient medical records to be unavailable for a full day, resulting in the deaths of the two patients.

  8. Identity Theft • Stolen credit/debit card numbers to purchase things with or to sell • SSN numbers used to open new accounts • Take out loans in someone else’s name • Raid the victim’s bank account • Pass bad checks

  9. Methods of Identity Theft • Phishing http://www.sonicwall.com/phishing/ • Vishing • Pharming • Whaling • Resumes online • SSNs • Dumpster diving • Mailbox theft • Pretexting • Shoulder surfing

  10. Methods of Identity Theft • Social networking sites • Filesharing and peer-to-peer software • Bogus job offers • Fake sweepstakes or lotteries • Hacking • Lost or stolen property • Workers in your home • Changing your address • Copying information from a transaction • Credit reports • RFID readers

  11. How the Victim is Affected • May result in monetary losses • Anguish, disruption of his or her life • Legal fees • Loss of a good credit rating • Be prevented from borrowing money or cashing checks • Lose a job • Unable to rent an apartment • Sued by creditors to whom the criminal owes money • And… the authorities are slow to act on your behalf

  12. How To Protect Yourself • Don’t carry checkbook, SSN card, or all your credit cards with you all the time • Keep your SSN private • Shred your credit card offers, etc. • Use updated anti-spyware/anti-theft software on your computer • Never give out personal info over the phone • Monitor your credit reports • Be careful of using your credit cards in restaurants

  13. If You Think You’ve Been a Victim of Identity Theft: • Police report • Fraud alert • Credit freeze

  14. Establishing Good Credit • College students are targets • Checking account • Department store cards • Prepaid cards • Co-signer on applications • http://www.annualcreditreport.com • http://www.myfico.com

  15. What Are Your Rights? • Fair Credit Reporting Act – says that you must be told what’s in your credit file and have any errors corrected. If you notify the bureau of any error, they have 30 days to resolve the dispute. • Fair Credit Billing Act – creditors are required to promptly credit your payments and correct billing mistakes and you can withhold payments on defective goods. Examples of errors: http://www.federalreserve.gov/pubs/consumerhdbk/aspects.htm • Truth in Lending – this is the 3 day right of rescission that you have to change your mind about certain credit transactions that use your home as collateral, such as on a home equity loan or if you refinance your mortgage with a different lender (but not a mortgage for an original purchase)

  16. Scams & Forgery • Auctions • Shill bidding • Click Fraud • Stock Fraud • Digital Forgery

  17. Crime Fighting v Privacy & Civil Liberties • 4th Amendment requires that search warrants be specific about what is to be searched or seized • … so what happens when authorities are searching a computer for one thing and finds other illegal activities, or illegal activities by other people who use that same computer? • … or when a computer technician is servicing someone’s computer and finds what he believes is illegal material on the person’s computer – see if you can find out whatever happened in the Washington State vs Westbrook case, where this happened and the technician reported it to authorities

  18. Whose Laws Rule the Web? • ILOVEYOU virus infected millions of computers worldwide, destroying files, collecting passwords, and shutting down computer systems at major corporations and government agencies • this was the one written by a student from the Phillippines – charges were dropped because they had no laws against releasing a virus at the time … what should happen to him if he were to travel to the U.S., Canada, France, Germany, or any other country where the virus did damage? • Other cases in the book… pages 293-294

More Related