Podcast
Questions and Answers
What small business was affected by the Target Security Breach in Fall 2013?
What small business was affected by the Target Security Breach in Fall 2013?
Which demographic is most commonly victimized by identity theft?
Which demographic is most commonly victimized by identity theft?
What is phishing?
What is phishing?
Which of the following actions can lead to security breaches?
Which of the following actions can lead to security breaches?
Signup and view all the answers
What is the potential consequence for small businesses after a security breach?
What is the potential consequence for small businesses after a security breach?
Signup and view all the answers
What is pharming in the context of identity theft?
What is pharming in the context of identity theft?
Signup and view all the answers
What is a significant risk factor for identity theft related to E-commerce?
What is a significant risk factor for identity theft related to E-commerce?
Signup and view all the answers
Which method is used to deceive individuals via text messages to obtain personal information?
Which method is used to deceive individuals via text messages to obtain personal information?
Signup and view all the answers
What does the Computer Fraud and Abuse Act (CFAA) primarily address?
What does the Computer Fraud and Abuse Act (CFAA) primarily address?
Signup and view all the answers
How did the USA PATRIOT Act modify the consequences of hacking?
How did the USA PATRIOT Act modify the consequences of hacking?
Signup and view all the answers
Which method do security professionals NOT use to catch hackers?
Which method do security professionals NOT use to catch hackers?
Signup and view all the answers
What is one common outcome for young hackers who are caught?
What is one common outcome for young hackers who are caught?
Signup and view all the answers
What was a significant change in the treatment of young hackers by the year 2000?
What was a significant change in the treatment of young hackers by the year 2000?
Signup and view all the answers
How do investigators often trace hacking attacks?
How do investigators often trace hacking attacks?
Signup and view all the answers
What difficulty arises in sentencing young hackers?
What difficulty arises in sentencing young hackers?
Signup and view all the answers
What is the primary purpose of white hat hackers?
What is the primary purpose of white hat hackers?
Signup and view all the answers
What element is NOT part of the CFAA's expanded coverage?
What element is NOT part of the CFAA's expanded coverage?
Signup and view all the answers
What stance has the Pentagon taken regarding certain cyber attacks?
What stance has the Pentagon taken regarding certain cyber attacks?
Signup and view all the answers
What type of system did Stuxnet specifically target?
What type of system did Stuxnet specifically target?
Signup and view all the answers
Which factor does NOT contribute to security weaknesses?
Which factor does NOT contribute to security weaknesses?
Signup and view all the answers
What is a common use of firewalls in security?
What is a common use of firewalls in security?
Signup and view all the answers
Who is responsible for maintaining system security?
Who is responsible for maintaining system security?
Signup and view all the answers
What did historical attitudes toward security initially fail to account for?
What did historical attitudes toward security initially fail to account for?
Signup and view all the answers
What is the main issue with the security measures implemented in response to hacking?
What is the main issue with the security measures implemented in response to hacking?
Signup and view all the answers
What definition best describes hacking in its original context during the early 1960s to 1970s?
What definition best describes hacking in its original context during the early 1960s to 1970s?
Signup and view all the answers
Which phase marks the transition of hacking from a positive to a negative connotation?
Which phase marks the transition of hacking from a positive to a negative connotation?
Signup and view all the answers
Which of the following is an example of hacktivism?
Which of the following is an example of hacktivism?
Signup and view all the answers
What significant risk is associated with 'harmless hacking'?
What significant risk is associated with 'harmless hacking'?
Signup and view all the answers
What is a common consequence of the growth of the Web on hacking practices?
What is a common consequence of the growth of the Web on hacking practices?
Signup and view all the answers
Which activity is specifically associated with 'phone phreaking'?
Which activity is specifically associated with 'phone phreaking'?
Signup and view all the answers
What is a serious concern regarding large-scale theft of information as seen in recent hacking incidents?
What is a serious concern regarding large-scale theft of information as seen in recent hacking incidents?
Signup and view all the answers
What differentiates hacktivism from vandalism?
What differentiates hacktivism from vandalism?
Signup and view all the answers
What is one method used to authenticate customers and prevent the use of stolen numbers?
What is one method used to authenticate customers and prevent the use of stolen numbers?
Signup and view all the answers
What is the purpose of a fraud alert in the context of identity theft?
What is the purpose of a fraud alert in the context of identity theft?
Signup and view all the answers
What technology is used to securely store data so that it becomes useless if stolen?
What technology is used to securely store data so that it becomes useless if stolen?
Signup and view all the answers
Which of the following is a characteristic of biometric systems?
Which of the following is a characteristic of biometric systems?
Signup and view all the answers
What can happen to corporations that operate in multiple countries regarding legal compliance?
What can happen to corporations that operate in multiple countries regarding legal compliance?
Signup and view all the answers
What was the legal issue faced by Yahoo regarding the sale of Nazi memorabilia?
What was the legal issue faced by Yahoo regarding the sale of Nazi memorabilia?
Signup and view all the answers
What is a service designed to protect the user's credit card information during online transactions?
What is a service designed to protect the user's credit card information during online transactions?
Signup and view all the answers
What is one disadvantage of authenticating customers more stringently when preventing the use of stolen numbers?
What is one disadvantage of authenticating customers more stringently when preventing the use of stolen numbers?
Signup and view all the answers
What is one principle that suggests publishers must block access to illegal material in certain countries?
What is one principle that suggests publishers must block access to illegal material in certain countries?
Signup and view all the answers
Which of the following describes a limitation of the WTO agreement regarding cross-border services?
Which of the following describes a limitation of the WTO agreement regarding cross-border services?
Signup and view all the answers
What ethical dilemma arises when a majority supports prohibitions on certain content?
What ethical dilemma arises when a majority supports prohibitions on certain content?
Signup and view all the answers
What action can the government of Country A take regarding illegal material?
What action can the government of Country A take regarding illegal material?
Signup and view all the answers
What is meant by 'respecting cultural differences' in the context of law and ethics?
What is meant by 'respecting cultural differences' in the context of law and ethics?
Signup and view all the answers
What can be inferred about the dissemination and sale of copyrighted educational work?
What can be inferred about the dissemination and sale of copyrighted educational work?
Signup and view all the answers
How does the international community often resolve discrepancies in laws regarding online content?
How does the international community often resolve discrepancies in laws regarding online content?
Signup and view all the answers
What is one potential consequence of a country blocking access to legal content from another country?
What is one potential consequence of a country blocking access to legal content from another country?
Signup and view all the answers
Study Notes
Chapter 5: Crime and Security
- The chapter covers hacking, identity theft, and laws governing the web.
What We Will Cover
- Hacking
- Identity theft and credit card fraud
- Whose laws rule the web
Hacking (1 of 17)
- Intentional unauthorized access to computer systems.
- The term "hacking" has evolved over time.
- Phase 1 (1960s-1970s): "Hacking" was a positive term, referring to creative programmers and clever code.
- Phase 2 (1970s-mid 1990s): "Hacking" took on negative connotations associated with unauthorized access and spreading computer viruses/worms.
- Phase 3 (mid 1990s to present): The growth of the web and mobile devices led to new hacking techniques. Increased spread of viruses/worms, political hacking (hacktivism), denial-of-service (DOS) attacks, and large-scale theft of financial/personal information became prominent.
Hacking (4 of 17)
- Is "harmless hacking" harmless?
- Responding to nonmalicious hacking still uses resources.
- Hacking can cause accidental, significant damage.
- Most hacking is a form of trespass.
Hacking (5 of 17)
- Hacktivism (political hacking): Use of hacking to promote a political cause.
- Debates exist about whether it is a form of civil disobedience.
- Some actors hide criminal activities under a mask of hacktivism.
- Determining the difference between hacktivism and vandalism remains a challenge.
Hacking (6 of 17)
- Hackers as security researchers ("White Hat Hackers"): Use their skills to demonstrate system vulnerabilities.
- Aim is to improve system security.
Hacking (7 of 17)
- Hacking as foreign policy.
- The increase in government hacking.
- Potential for cyber attacks to be viewed as acts of war, prompting potential military responses.
- Need for making critical systems more secure.
Hacking (8 of 17)
- Stuxnet: An extremely sophisticated worm targeting specific control systems.
- Damaged equipment in a uranium enrichment plant in Iran (2008).
Hacking (9 of 17)
- Security: Hacking is a problem, as is also poor security.
- Factors contributing to security weaknesses:
- History of the internet and the web
- Complexity of computer systems
- Speed of new application development
- Economic and business factors
- Human nature
Hacking (10 of 17)
- Internet's openness as a means of information sharing.
- Attitudes toward security were slow to catch the risk of these systems.
- Use of firewalls to monitor/filter communication from untrusted sources.
- Cybersecurity is reactive to vulnerabilities as they are discovered and exploited..
Hacking (11 of 17)
- Responsibility for security:
- Developers: Develop systems with security as a goal.
- Businesses: Use security tools and monitor their systems.
- Home users: Educate themselves and use security tools.
Hacking (12 of 17)
- Discussion questions:
- Is hacking that has no direct damage a victimless crime?
- Is hiring former hackers to improve security a good or bad idea and why?
Hacking (13 of 17)
- The Law: Catching and punishing hackers.
- 1984: The Computer Fraud and Abuse Act (CFAA).
- Covers computers of government, finance, and medicine that connect to the internet.
- Includes accessing a computer without authorization under the CFAA is illegal.
- The USA Patriot Act expanded the definition of loss to include the cost of responding to an attack and assessing damage and restoring systems.
Hacking (14 of 17)
- Catching Hackers.
- Law enforcement use of hacker newsletters and undercover techniques.
- Identifying hackers by tracking online handles (newsgroup/archives).
- Use of "honey pots" (web sites) to attract hackers for study and record.
- Computer forensics for retrieving evidence from computers.
- Tracking hacking attacks using ISP records and router logs.
Hacking (15 of 17):
- Penalties for young hackers:
- Many young hackers mature and become productive and responsible.
- Sentencing varies on intent and damage done.
- Probation, community service, and/or fines are typical penalties.
- Juvenile detention is rare for young hackers.
Hacking (16 of 17)
- Criminalizing virus writing and hacker tools: Is this a good idea and why?
Hacking (17 of 17)
- Expansion of the Computer Fraud and Abuse Act (CFAA) to encompass newer/sophisticated ways to access and gather information.
- Use of CFAA to prosecute companies/individuals with unauthorized information gathering, and data collection.
- Is violating terms of agreement a form of hacking?
Small Business Insecurity (1 of 2)
- Fazio Mechanical: Specialized in supermarket refrigeration systems, an example of small business insecurity.
- Target Security Breach (2013) exposed issues with large scale data breaches from small businesses being gateways to larger systems.
- Consequences of breach could lead to the closure of affected small businesses.
Small Business Insecurity (2 of 2)
- Small businesses often lack resources for security staff.
- They are often gateways to larger systems.
- Often go out of business after a breach.
Security
- Security breaches are often due to poorly written software and poorly configured networks/applications.
- Security researchers/Cybersecurity professionals deal with whistle-blowing versus responsible disclosure.
Identity Theft and Credit Card Fraud (1 of 5)
- Identity theft: Criminals use an unknowing individual's identity.
- Common victims are young adults (18-29).
- e-commerce makes stealing/using card numbers easier without a physical card.
Identity Theft and Credit Card Fraud (2 of 5)
- Techniques used to steal information include:
- Phishing (email)
- Smishing (text messaging)
- Vishing (voice phishing)
- Pharming (false websites).
Identity Theft and Credit Card Fraud (3 of 5)
- Responses to identity theft include:
- Authentication of email and websites.
- Encryption to secure data.
- Authenticating customers to prevent stolen numbers.
- Fraud alerts to flag credit reports.
Identity Theft and Credit Card Fraud (4 of 5)
- Responses to identity theft (continued):
- Activation for new credit cards.
- Retailers not printing full card numbers/expiration dates.
- Software that detects unusual spending.
- Services like PayPal prevent direct credit card information exchange.
Identity Theft and Credit Card Fraud (5 of 5)
- Biometrics: Unique physiological characteristics.
- No external items are stolen; useful for highly secured areas (ex. airport).
- Systems are becoming more sophisticated to prevent being fooled.
Whose Laws Rule the Web (1 of 8)
- Laws vary between countries.
- Corporations doing business in multiple countries must comply with the laws in each country involved.
- Actions legal in one country could be illegal in another.
Whose Laws Rule the Web (2 of 8)
- Yahoo and French censorship.
- Yahoo company was sued for French citizens accessing Nazi memorabilia on their websites, while the actual website was in the US not France.
- French law was questioned.
Whose Laws Rule the Web (3 of 8)
- Applying US copyright law to foreign companies.
- Russian company circumvented controls embedded in electronic books.
- The program, even if legal in Russia, was illegal in the US.
- Author, Dmitry Sklyarov, was arrested, then after protests he was able to return to Russia.
Whose Laws Rule the Web (4 of 8)
- Arresting executives of online gambling and payment companies.
- British executive arrested in Dallas while transferring planes.
- The executive's action did not directly break US law since the sports betting in Britain is considered acceptable under British Law.
Whose Laws Rule the Web (5 of 8)
- Libel, speech, and commercial law.
- Exact laws and associated penalties vary between countries.
- The burden of proof differs in libel cases.
Whose Laws Rule the Web (6 of 8)
- Libel tourism practices.
- Traveling to a country with stricter libel laws in order to pursue a legal action.
- The speech act of 2010 makes foreign libel judgements unenforceable in the US, and does not violate the 1st Amendment.
- Foreign governments retain ability to seize assets.
- The costs of travel could be associated in cases that take time in court, and may require numerous trips.
- Freedom of speech is restricted when companies adhere to laws from the most restrictive countries.
Whose Laws Rule the Web (7 of 8)
- Some countries have strict regulations on commercial speech and advertising.
Whose Laws Rule the Web (8 of 8)
- Discussion questions:
- Suggest solutions for resolving issues that arise from differing laws in various countries.
- Suggest what is likely to work, and what is likely to fail.
Culture, Law, and Ethics
- Respecting cultural differences is not equivalent to respecting laws.
- If a majority of people support restrictions on content in a given country, does it make sense to then violate the basic human rights of minorities around the world?
Potential Solutions (1 of 2)
- International agreements between countries, particularly those related to the World Trade Organization (WTO) might help.
- The WTO does not help when a specific product, service, or information are legal in one country and not another.
Potential Solutions (2 of 2)
- Alternative principles.
- Responsibility-to-Prevent-Access: Publishers must restrict access to material/services.
- Authority-to-Prevent-Entry: Country A can act within its borders, but may not be able to enforce its laws on Country B, even when the action is illegal in country A.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
Test your knowledge on the impacts of cybersecurity, particularly focusing on identity theft and security breaches. This quiz covers essential concepts such as phishing, pharming, and the legal frameworks that address hacking. Learn about the risks facing small businesses and the demographic trends in identity theft.