13.Computer Ethics and Protection
13.Computer Ethics and Protection
Dumpster
Diving
http://oreilly.co
m/catalog/crime
/chapter/cri_02.
html
http://www.thesecurityawarenesscompany.com/
Ethics.html
Hackers
Hacking means finding out weaknesses in a computer or
computer network and exploiting them, though the term can also
refer to someone with an advanced understanding of computers
and computer networks.
A white hat hacker breaks security for non-
malicious reasons, perhaps to test their own
security system or while working for a security
company which make security software. The term
"white hat" in Internet slang refers to an ethical
hacker. This classification also includes individuals
who perform penetration tests and vulnerability
assessments within a contractual agreement. The
International Council of Electronic Commerce
Consultants, also known as the EC-Council has
developed certifications, courseware, classes, and
online training covering the diverse arena of
Ethical Hacking.
A Black Hat Hacker is a hacker who "violates
computer security for little reason beyond
maliciousness or for personal gain" Black Hat
Hackers form the stereotypical, illegal hacking
groups often portrayed in popular culture, and are
"the epitome of all that the public fears in a
computer criminal". Black Hat Hackers break
into secure networks to destroy data or make the
network unusable for those who are authorized to
use the network. They choose their targets using
a two-pronged process known as the "pre-
hacking stage."
A grey hat hacker is a combination of a Black Hat and a White
Hat Hacker. A Grey Hat Hacker may surf the internet and hack
into a computer system for the sole purpose of notifying the
administrator that their system has been hacked, for example.
Then they may offer to repair their system for a small fee
A script kiddie (or skiddie) is a non-
expert who breaks into computer
systems by using pre-packaged
automated tools written by others,
usually with little understanding of
the underlying concept—hence the
term script (i.e. a prearranged plan or
set of activities) kiddie (i.e. kid,
child—an individual lacking
knowledge and experience,
immature).
Jules has walked away from a lab computer without logging
off. Trish sits down and, still logged in as Jules, sends
inflammatory e-mail messages out to a number of students and
posts similar messages on the class newsgroup.
Industrial espionage
◦ theft of business information
Masquerading
◦ Illegally obtaining user passwords and accounts
Tailgating
◦ Sitting at a terminal that a legitimate user forgot to sign off
of
Masquerading
http://oreilly.com/catalog/crime/chapter/c
ri_02.html
Password Sniffing
http://oreilly.com/catalog/crime/chapter/c
ri_02.html
Trapdoor
◦ Trojan horse that provides undetected access to the
computer system
Scanning
◦ using a computer to step through possible four-digit access
code
Superzapping
◦ using a computer program to bypass security on a system
Scanning
http://oreilly.com/catalog/crime/chapter/c
ri_02.html
It seems like every time Melanie logs on to her account,
Stanley knows about it and sends messages that cover her
screen with text. At first she thinks it is funny, but now its
really starting to bother her. The messages reformat the text on
her screen and, besides, its kind of creepy the way he always
knows she’s logged on.
• Pumping and dumping
◦ giving bogus information about publicly traded companies
• Cyberstalking
◦ when a stalker uses the Internet to find victims
• Identity theft
Piracy the unauthorized reproduction or use of a copyrighted
book, recording, television program, patented invention,
trademarked product, etc.: The record industry is beset with
piracy.
Copyright infringement is the unauthorized use
of works under copyright, infringing the copyright
holder's "exclusive rights", such as the right to
reproduce or perform the copyrighted work, spread
the information contained within copyrighted
works, or to make derivative works. It often refers
to copying "intellectual property" without written
permission from the copyright holder, which is
typically a publisher or other business representing
or assigned by the work's creator.
• Site license
allows a company to install software on more than one
computer
• Pilferage
when a company does not buy a site license, but performs
multiple installs
Crimes that involve the theft of hardware