Top Banner
CHAPTER 7: PRIVACY, CRIME, AND SECURITY Prepared by: T. Ibtissem Ajmi
17

Chapter 7: Privacy, Crime, and Security

Jan 06, 2016

Download

Documents

Yosef

Chapter 7: Privacy, Crime, and Security. Prepared by: T. Ibtissem Ajmi. Privacy in Cyberspace. Privacy: an individual’s ability to restrict or eliminate the collection, use and sale of confidential personal information The problem: collection of information without consent - PowerPoint PPT Presentation
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Chapter 7: Privacy, Crime, and Security

CHAPTER 7: PRIVACY, CRIME, AND SECURITY

Prepared by: T. Ibtissem Ajmi

Page 2: Chapter 7: Privacy, Crime, and Security

Privacy in Cyberspace

Privacy: an individual’s ability to restrict or eliminate the collection, use and sale of confidential personal information

The problem: collection of information without consent

Anonymity: the ability to convey a message without disclosing your name or identity

2

T. Ibtissem Ajmi

Page 3: Chapter 7: Privacy, Crime, and Security

Privacy in Cyberspace

Cookies: small files that are written to your computer’s hard disk by many of the Web sites you visit

3

T. Ibtissem Ajmi

Page 4: Chapter 7: Privacy, Crime, and Security

Privacy in Cyberspace

Cookies are text files stored in the

Temporary Internet Files folder.

4

T. Ibtissem Ajmi

Page 5: Chapter 7: Privacy, Crime, and Security

Global Unique Identifier (GUID): an identification number that is generated by a hardware component or a program

Privacy in Cyberspace5

T. Ibtissem Ajmi

Page 6: Chapter 7: Privacy, Crime, and Security

Protecting Your Privacy

Browse anonymously by surfing from www.anonymizer.com

Disable cookies on your Web browser Use a free e-mail address to place on Web

pages, mailing lists, chat rooms, or other public Internet spaces

Do not fill out site registration forms unless you see a privacy statement indicating that the information gathered will not be sold to 3rd parties

6

T. Ibtissem Ajmi

Page 7: Chapter 7: Privacy, Crime, and Security

Types of Computer Crime

Identity Theft

Computer Virus: a hidden code within a program that may damage or destroy infected files

Example: Typically, virus infections spread when an infected file or program is downloaded onto a computer . When the program is executed, the viruses spreads to other programs on the user s hard disk. If you copy a file on your computer to a USB drive, CD, or DVD and give it to someone, the infection spreads even further.

Time Bomb (Logic Bomb): a virus that sits harmlessly on a system until a certain event causes the program to become active

7

T. Ibtissem Ajmi

Page 8: Chapter 7: Privacy, Crime, and Security

Worm: a program that can spread from one computer to another and can propagate over a computer network

Trojan Horse: a rogue program disguised as a useful program but contains hidden instructions to perform a malicious task instead

Types of Computer Crime8

T. Ibtissem Ajmi

Page 9: Chapter 7: Privacy, Crime, and Security

Types of Computer Crime

Salami Shaving: a method that a programmer alters a program to subtract a very small amount of money from an account and divests the funds to the embezzler’s account

Data Diddling: a method that insiders modify data by altering accounts or database records so that it is difficult to tell that they have stolen funds or equipments

Forgery: a method that a user makes Internet data appear to come from one place when it is really coming from another

Blackmail

9

T. Ibtissem Ajmi

Page 10: Chapter 7: Privacy, Crime, and Security

Attackers

Hackers, Crackers (Black hats), Cybergangs, Virus Authors, Ethical Hackers (White Hats)

Swindlers

Shills

10

T. Ibtissem Ajmi

Page 11: Chapter 7: Privacy, Crime, and Security

Security Risks

Wireless Network

War Driving: an individual drives around with a wireless device to look for wireless networks

Corporate Espionage: the unauthorized access of corporate information, usually to the benefit of a competitor

Information Warfare: the use of information technologies to corrupt or destroy an enemy’s information and infrastructure

Security Loophole Detection Program: a program that automatically search for unprotected or poorly protected computers

11

T. Ibtissem Ajmi

Page 12: Chapter 7: Privacy, Crime, and Security

Protecting Computer Systems

Power-Related Problems: by using Uninterruptible Power Supply (UPS)

Controlling Access: by using password authentication, know-and-have authentication, or biometric authentication

Firewall: a computer program or device that permits an organization’s internal computer users to access the external Internet but severely limits the ability of outsiders to access internal data

12

T. Ibtissem Ajmi

Page 13: Chapter 7: Privacy, Crime, and Security

Avoiding Scams

Preventing Cyber stalking

Protecting Computer Systems

13

T. Ibtissem Ajmi

Page 14: Chapter 7: Privacy, Crime, and Security

Encryption

Encryption: a coding or scrambling process that renders a message unreadable by anyone except the intended recipient

Public Key Encryption Encryption Key (Public Key) Decryption Key (Private Key)

14

T. Ibtissem Ajmi

Page 15: Chapter 7: Privacy, Crime, and Security

Encryption

Digital Signature: a technique that guarantees a message has not been tampered with

15

Page 16: Chapter 7: Privacy, Crime, and Security

Digital Certificate: a technique for validating one’s identity

Encryption16

Page 17: Chapter 7: Privacy, Crime, and Security

Public Key Infrastructure (PKI): a uniform set of encryption standards that specify how public key encryption, digital signatures, digital certificates should be implemented in computer systems and on the Internet

Encryption17

T. Ibtissem Ajmi