Chapter 7: Privacy, Crime, and Security
description
Transcript of Chapter 7: Privacy, Crime, and Security
![Page 1: Chapter 7: Privacy, Crime, and Security](https://reader034.fdocuments.us/reader034/viewer/2022052701/56813b7f550346895da49fb4/html5/thumbnails/1.jpg)
CHAPTER 7: PRIVACY, CRIME, AND SECURITY
Prepared by: T. Ibtissem Ajmi
![Page 2: Chapter 7: Privacy, Crime, and Security](https://reader034.fdocuments.us/reader034/viewer/2022052701/56813b7f550346895da49fb4/html5/thumbnails/2.jpg)
Privacy in Cyberspace
Privacy: an individual’s ability to restrict or eliminate the collection, use and sale of confidential personal information
The problem: collection of information without consent
Anonymity: the ability to convey a message without disclosing your name or identity
2
T. Ibtissem Ajmi
![Page 3: Chapter 7: Privacy, Crime, and Security](https://reader034.fdocuments.us/reader034/viewer/2022052701/56813b7f550346895da49fb4/html5/thumbnails/3.jpg)
Privacy in Cyberspace
Cookies: small files that are written to your computer’s hard disk by many of the Web sites you visit
3
T. Ibtissem Ajmi
![Page 4: Chapter 7: Privacy, Crime, and Security](https://reader034.fdocuments.us/reader034/viewer/2022052701/56813b7f550346895da49fb4/html5/thumbnails/4.jpg)
Privacy in Cyberspace
Cookies are text files stored in the
Temporary Internet Files folder.
4
T. Ibtissem Ajmi
![Page 5: Chapter 7: Privacy, Crime, and Security](https://reader034.fdocuments.us/reader034/viewer/2022052701/56813b7f550346895da49fb4/html5/thumbnails/5.jpg)
Global Unique Identifier (GUID): an identification number that is generated by a hardware component or a program
Privacy in Cyberspace5
T. Ibtissem Ajmi
![Page 6: Chapter 7: Privacy, Crime, and Security](https://reader034.fdocuments.us/reader034/viewer/2022052701/56813b7f550346895da49fb4/html5/thumbnails/6.jpg)
Protecting Your Privacy
Browse anonymously by surfing from www.anonymizer.com
Disable cookies on your Web browser Use a free e-mail address to place on Web
pages, mailing lists, chat rooms, or other public Internet spaces
Do not fill out site registration forms unless you see a privacy statement indicating that the information gathered will not be sold to 3rd parties
6
T. Ibtissem Ajmi
![Page 7: Chapter 7: Privacy, Crime, and Security](https://reader034.fdocuments.us/reader034/viewer/2022052701/56813b7f550346895da49fb4/html5/thumbnails/7.jpg)
Types of Computer Crime
Identity Theft
Computer Virus: a hidden code within a program that may damage or destroy infected files
Example: Typically, virus infections spread when an infected file or program is downloaded onto a computer . When the program is executed, the viruses spreads to other programs on the user s hard disk. If you copy a file on your computer to a USB drive, CD, or DVD and give it to someone, the infection spreads even further.
Time Bomb (Logic Bomb): a virus that sits harmlessly on a system until a certain event causes the program to become active
7
T. Ibtissem Ajmi
![Page 8: Chapter 7: Privacy, Crime, and Security](https://reader034.fdocuments.us/reader034/viewer/2022052701/56813b7f550346895da49fb4/html5/thumbnails/8.jpg)
Worm: a program that can spread from one computer to another and can propagate over a computer network
Trojan Horse: a rogue program disguised as a useful program but contains hidden instructions to perform a malicious task instead
Types of Computer Crime8
T. Ibtissem Ajmi
![Page 9: Chapter 7: Privacy, Crime, and Security](https://reader034.fdocuments.us/reader034/viewer/2022052701/56813b7f550346895da49fb4/html5/thumbnails/9.jpg)
Types of Computer Crime
Salami Shaving: a method that a programmer alters a program to subtract a very small amount of money from an account and divests the funds to the embezzler’s account
Data Diddling: a method that insiders modify data by altering accounts or database records so that it is difficult to tell that they have stolen funds or equipments
Forgery: a method that a user makes Internet data appear to come from one place when it is really coming from another
Blackmail
9
T. Ibtissem Ajmi
![Page 10: Chapter 7: Privacy, Crime, and Security](https://reader034.fdocuments.us/reader034/viewer/2022052701/56813b7f550346895da49fb4/html5/thumbnails/10.jpg)
Attackers
Hackers, Crackers (Black hats), Cybergangs, Virus Authors, Ethical Hackers (White Hats)
Swindlers
Shills
10
T. Ibtissem Ajmi
![Page 11: Chapter 7: Privacy, Crime, and Security](https://reader034.fdocuments.us/reader034/viewer/2022052701/56813b7f550346895da49fb4/html5/thumbnails/11.jpg)
Security Risks
Wireless Network
War Driving: an individual drives around with a wireless device to look for wireless networks
Corporate Espionage: the unauthorized access of corporate information, usually to the benefit of a competitor
Information Warfare: the use of information technologies to corrupt or destroy an enemy’s information and infrastructure
Security Loophole Detection Program: a program that automatically search for unprotected or poorly protected computers
11
T. Ibtissem Ajmi
![Page 12: Chapter 7: Privacy, Crime, and Security](https://reader034.fdocuments.us/reader034/viewer/2022052701/56813b7f550346895da49fb4/html5/thumbnails/12.jpg)
Protecting Computer Systems
Power-Related Problems: by using Uninterruptible Power Supply (UPS)
Controlling Access: by using password authentication, know-and-have authentication, or biometric authentication
Firewall: a computer program or device that permits an organization’s internal computer users to access the external Internet but severely limits the ability of outsiders to access internal data
12
T. Ibtissem Ajmi
![Page 13: Chapter 7: Privacy, Crime, and Security](https://reader034.fdocuments.us/reader034/viewer/2022052701/56813b7f550346895da49fb4/html5/thumbnails/13.jpg)
Avoiding Scams
Preventing Cyber stalking
Protecting Computer Systems
13
T. Ibtissem Ajmi
![Page 14: Chapter 7: Privacy, Crime, and Security](https://reader034.fdocuments.us/reader034/viewer/2022052701/56813b7f550346895da49fb4/html5/thumbnails/14.jpg)
Encryption
Encryption: a coding or scrambling process that renders a message unreadable by anyone except the intended recipient
Public Key Encryption Encryption Key (Public Key) Decryption Key (Private Key)
14
T. Ibtissem Ajmi
![Page 15: Chapter 7: Privacy, Crime, and Security](https://reader034.fdocuments.us/reader034/viewer/2022052701/56813b7f550346895da49fb4/html5/thumbnails/15.jpg)
Encryption
Digital Signature: a technique that guarantees a message has not been tampered with
15
![Page 16: Chapter 7: Privacy, Crime, and Security](https://reader034.fdocuments.us/reader034/viewer/2022052701/56813b7f550346895da49fb4/html5/thumbnails/16.jpg)
Digital Certificate: a technique for validating one’s identity
Encryption16
![Page 17: Chapter 7: Privacy, Crime, and Security](https://reader034.fdocuments.us/reader034/viewer/2022052701/56813b7f550346895da49fb4/html5/thumbnails/17.jpg)
Public Key Infrastructure (PKI): a uniform set of encryption standards that specify how public key encryption, digital signatures, digital certificates should be implemented in computer systems and on the Internet
Encryption17
T. Ibtissem Ajmi