Cis1 Chapter 15 Computer Crime and Ethics



Similar documents
COB 302 Management Information System (Lesson 8)

CHAPTER 10: COMPUTER SECURITY AND RISKS

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

PROTECT YOUR COMPUTER AND YOUR PRIVACY!

SECURITY ISSUES INTERNET WORLD WIDE WEB FOR THE AND THE

UNIVERSAL INSURANCE HOLDINGS, INC. CODE OF BUSINESS CONDUCT AND ETHICS. Revised as of March 3, 2014

Cracking and Computer Security

Acceptable Use Policy ("AUP")

White Paper - Crypto Virus. A guide to protecting your IT

9. Information Assurance and Security, Protecting Information Resources. Janeela Maraj. Tutorial 9 21/11/2014 INFO 1500

CIS3210 Computer Networks. Ethics in Networking

Ethical Issues in Cyberspace and IT Society

Intellectual Property

Medford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee

Professional, legal, ethical and social issues

Chapter 11 Computers and Society, Security, Privacy, and Ethics

Insider Threats in the Real World Eavesdropping and Unauthorized Access

C-SAVE. Scenario #1 Jake and the Bad Virus. The two major C3 concepts this scenario illustrates are:

Part I: Ethics. Moral guidelines that govern use of computers and information systems. Unauthorized use of computer systems

APPROPRIATE USE OF INFORMATION POLICY 3511 TECHNOLOGY RESOURCES ADOPTED: 06/17/08 PAGE 1 of 5

Information Security

Chapter 12 Objectives. Chapter 12 Computers and Society: Security and Privacy

COMPUTER AND NETWORK USAGE POLICY

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com

How To Handle A Fraud At Psc

Chapter 6: Computer and Network Security

region16.net Acceptable Use Policy ( AUP )

CAMBRIDGE PROPERTY & CASUALTY SPECIAL REPORT

IQware's Approach to Software and IT security Issues

Ethics in Internet. Joshi AG Centre for Information and Network Security University of Pune

Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training - Session One

Computer Crime. University of Victoria Department of Computer Science. SENG 401: Social and Professional Issues Computer Crime: Slide 1

Don t Fall Victim to Cybercrime:

Professional Ethics for Computer Science. Lecture 2: Ethics for IT Professionals and IT Users


How To Monitor The Internet In Idaho

CHAPTER 5 COMPUTER FRAUD AND SECURITY

Odessa College Use of Computer Resources Policy Policy Date: November 2010

Threats and Attacks. Modifications by Prof. Dong Xuan and Adam C. Champion. Principles of Information Security, 5th Edition 1

IT Security Management 100 Success Secrets

BROADALBIN-PERTH CENTRAL SCHOOL ADOPTED 1/22/00 3 RD READING AND ADOPTION 5/21/12. Employee Computer Use Agreement. Terms and Conditions

NEW ZEALAND S CYBER SECURITY STRATEGY

CYBER CRIME AWARENESS

Information Technology Acceptable Use Policy

Subject: Computers & Electronic Records. Responsible Party: Part C Coordinator

SUBJECT: INFORMATION TECHNOLOGY RESOURCES I. PURPOSE

4. Identify the security measures provided by Microsoft Office Access. 5. Identify the methods for securing a DBMS on the Web.

Conditions of Use. Communications and IT Facilities

31 Ways To Make Your Computer System More Secure

Pretty Good Privacy (PGP)

DUVAL COUNTY PUBLIC SCHOOLS (DCPS) INFORMATION SECURITY PROGRAM SUBJECT: ACCEPTABLE USE POLICY (AUP) POLICY NUMBER: 8.71

WASHINGTON IDENTITY THEFT RANKING BY STATE: Rank 13, 76.4 Complaints Per 100,000 Population, 4942 Complaints (2007) Updated January 11, 2009

GALLAGHER CYBER LIABILITY PRACTICE. Tailored Solutions for Cyber Liability and Professional Liability

Chapter 11 Manage Computing Securely, Safely and Ethically. Discovering Computers Your Interactive Guide to the Digital World

Insuring Innovation. CyberFirst Coverage for Technology Companies

2.5.1 Policy on Responsible Use of University Computing Resources Introduction This policy governs the proper use and management of all University of

PLEASE READ THIS AGREEMENT CAREFULLY, AS IT CONTAINS IMPORTANT INFORMATION REGARDING YOUR LEGAL RIGHTS AND REMEDIES.

Appendix A. 1 Copyright 2012, Oracle and/or its affiliates. All rights reserved.

HTC Communications Acceptable Use Policy High Speed Internet Service Page 1 of 5. HTC Communications

Risk Mitigation Strategies: Lessons Learned from Actual Insider Attacks

Forward Secrecy: How to Secure SSL from Attacks by Government Agencies

E-commerce. Security. Learning objectives. Internet Security Issues: Overview. Managing Risk-1. Managing Risk-2. Computer Security Classifications

Hyde School Student Computer Systems Acceptable Use Policy

INTERENT SAFETY AND RESPONSIBILITY CYBER SECURITY

Open an attachment and bring down your network?

Policy for the Acceptable Use of Information Technology Resources

United Tribes Technical College Acceptable Use Policies for United Tribes Computer System

Running head: INFORMATION TECHNOLOGY, SECURITY AND ETHICS 1. Kevin Mitnick: How His Story Affected Information Technology, Security and Ethics

CODE OF ETHICS AND BUSINESS CONDUCT

What are the common online dangers?

Topic 1 Lesson 1: Importance of network security

Cyber Risks and Insurance Solutions Malaysia, November 2013

Transcription:

Cis1 Chapter 15 Computer Crime and Ethics 1

Book recommendation: A Gift of Fire Social, Legal, and Ethical Issues in Computing Sara Baase 2

Software Piracy [illegal usage of software] The Industry group Business Software Alliance* (BSA) estimates piracy losses at $11.8 billion worldwide in 2000. 1 in 3 business software was pirated in 2000 Worst offenders: Vietnam 97% China 94% Indonesia 89% (United States 24%) Individual consumers are not the problem *includes Adobe, Apple, Autodesk, Macromedia, Microsoft and Symantec Software and Information Industry Association www.spa.org 3

Viruses Virus - A software program that spreads from one computer to another computer in order to infect and corrupt other software files and data May spread via files, disks, or over a network (email) Viruses are not bugs, and are written on purpose. 4

Preventing Infection Abstinence is the only 100% effective prevention method. Anti-virus software - Programs designed to search for viruses, notify uses when they are found, and remove them from infected files and disks. They can also monitor systems for suspicious activity, i.e. files being modified, disks being formatted, etc. CERT- the Computer Emergency Response Team www.cert.org Information about viruses and Security vulnerabilities 5

Computer Crime Fraud and Embezzlement Sabotage and Information Theft Hacking and Cracking Digital Forgery Software Piracy Viruses 6

1. Fraud and Embezzlement The most significant losses to businesses from computer crime come from employees. Losses from credit card fraud are estimated to be between $1and $4 billion per year. ATM fraud accounts for losses of about $60 million a year Telecommunications fraud $1 to $9 billion each year. Why? Tradeoff between convenience and security 7

2. Sabotage and Information Theft Direct destruction of hardware, software or information Use of logic bombs An employee fired from an insurance company was convicted for destroying more than 160,000 records. British Airways paid a competitor $4 million after hacking into their computers and stealing passenger lists. Identity Theft (Information Collection, Privacy 8

3. Hacking and Cracking In the 1970 s John Draper discovered that the whistle in a cereal box could be used to fool the telephone system into giving free long-distance calls. Clifford Stoll s The Cuckoo s Egg written about tracking a German hacker. Kevin Mitnick, a notorious hacker, was arrested in 1995. He allegedly stole thousands of files from a computer security expert, credit card numbers, and unreleased software. (Book: Takedown by T. Shimomura) High-Tech Low-Tech tricks: Social Engineering, Shoulder Surfing, Dumpster Diving 9

4. Digital Forgery Information accuracy? Forgery and counterfeiting Time magazine: Darkening of O.J. Simpson s skin National Geographic Moved pyramids closer to fit on cover Solution: Be aware of the possibility Learn to have reasonable skepticism 10

11

Public Key Cryptography Lets you communicate with someone secretly without exchanging a code first. Developed in 1972 by Diffie and Hellman Rivest, Shamir and Adleman (RSA) implemented it 1991 Philip Zimmerman developed a program (PGP) and gave it away for free widely distributed over Internet now most popular program for encryption in the world why? Put encryption in the hands of the people 12

Can we trust Computers? Nationwide AT&T telephone service was disrupted for nine hours in 1990 because of a software error. U.S. Kane Carpet Company (4 th largest) went out of business due to a bad computerized inventory control system Denver Airport computer-controlled luggage system helped keep the airport closed for 2 years about $700million lost The Therac-25 software-controlled radiation machine killed three and injured several in 1985-87 Why? Lack of testing, honesty, ethics Perfection is not an option. 13

Ethics Many schools report that plagiarism is on the rise (explicit copyright notices not required by international law) Computer Ethics Institute of the Brookings Institution Ten Commandments ACM Code of Conduct 14

http://www.brook.edu/its/cei/cei_hp.htm Ten Commandments Of Computer Ethics 1. Thou Shalt Not Use A Computer To Harm Other People. 2. Thou Shalt Not Interfere With Other People s Computer Work. 3. Thou Shalt Not Snoop Around In Other People s Computer Files. 4. Thou Shalt Not Use A Computer To Steal. 5. Thou Shalt Not Use A Computer To Bear False Witness. 6. Thou Shalt Not Copy Or Use Proprietary Software For Which You have Not Paid. 7. Thou Shalt Not Use Other People s Computer Resources Without Authorization Or Proper Compensation. 8. Thou Shalt Not Appropriate Other People s Intellectual Output. 9. Thou Shalt Think About The Social Consequences Of The Program You Are Writing Or The System You Are Designing. 10. Thou Shalt Always Use A Computer In Ways That Insure Consideration And Respect For Your Fellow Humans. 15

The ACM Code of Conduct ACM Code of Ethics and Professional Conduct available at http://www.acm.org/constitution/code.html As an ACM member I will... 1.1 Contribute to society and human wellbeing. 1.2 Avoid harm to others. 1.3 Be honest and trustworthy. 1.4 Be fair and take action not to discriminate. 1.5 Honor property rights including copyrights and patent. 1.6 Give proper credit for intellectual property. 1.7 Respect the privacy of others. 1.8 Honor confidentiality. 16

For more information Electronic Frontier Foundation www.eff.org Protecting Rights and Promoting Freedom on the Electronic Frontier Electronic Privacy Information Center www.epic.org The Association of Computing Machinery (ACM) www.acm.org ACM Code of Ethics and Professional Conduct available at http://www.acm.org/constitution/code.html Computer Professionals for Social Responsibility www.cpsr.org A public-interest alliance of computer scientists and others concerned about the impact of computer technology on society 17