Download security_6

yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Cracking of wireless networks wikipedia , lookup

Cross-site scripting wikipedia , lookup

Trusted Computing wikipedia , lookup

Malware wikipedia , lookup

Spyware wikipedia , lookup

Carrier IQ wikipedia , lookup

Cyberattack wikipedia , lookup

Mobile security wikipedia , lookup

Hacker wikipedia , lookup

Computer security wikipedia , lookup

Medical privacy wikipedia , lookup

Information privacy law wikipedia , lookup

Do Not Track legislation wikipedia , lookup

Cybercrime wikipedia , lookup

Privacy International wikipedia , lookup

Computer and network surveillance wikipedia , lookup

Cybercrime countermeasures wikipedia , lookup

Law, Ethical Impacts, and
Internet Security
Legal Issues vs. Ethical
Ethics—the branch of philosophy that
deals with what is considered to be
right and wrong
What is unethical in one culture may be
perfectly acceptable in another
Legal Issues vs. Ethical
The Major Ethical and Legal Issues
Discussed in this lecture
Intellectual property rights and online piracy
Unsolicited electronic ads and spamming
Free speech versus censorship
Consumer and merchant protection against
Privacy—the right to be left alone and
the right to be free of unreasonable
personal intrusions
Two rules have been followed closely in
court decisions:
The right of privacy is not absolute. Privacy
must be balanced against the needs of
The public ’s right to know is superior to the
individual’s right of privacy
Collecting Information about
Web Site Registration
Spyware and Similar Methods
Privacy of Employees
Privacy of Patients
Allows a web site to store data on the
user's PC. When the customer returns
to the website, the cookies can be
used to find what the customer did in
the past.
What is Spyware?
Software that gathers user's information without the
user's knowledge.
Originally designed to allow freeware authors to make
money on their products
Spyware stays on the user's hard drive and continually
tracks the user's actions, periodically sending information
on the user's activities to the owner of the spyware and
then used for advertising purposes.
Intellectual Property Rights
Intellectual property (IP)—creations
of the mind, such as inventions,
literary and artistic works, and
symbols, names, images, and designs
used in commerce
Unsolicited Electronic Ads:
Problems and Solutions
E-Mail Spamming
unsolicited commercial e-mail (UCE)
The use of e-mail to send unwanted ads
Free Speech Versus Censorship
and Other Legal Issues
On the Internet, censorship refers to
government’s attempt to control, in one
way or another, the material that is
EC Fraud -Identity Theft
A criminal act in which someone
presents himself (herself) as
another person and uses that
person’s social security number,
bank account numbers, and so
on, to obtain loans, purchase
items, sell stocks, etc.
EC Fraud-Phishing
It refers to a person or a group of
cyber-criminals who use email, popup messages or an imitation or copy
of an existing legitimate webpage to
trick users into providing sensitive
personal information such as credit
card numbers, bank account
numbers, and passwords.
Security Issues
It is a computer program that protects a computer or network from
unauthorized access by hackers.
Computer Virus
He is a person who accesses networks and the computers on the
network without authorization.
It is a computer program that damages your computer system.
It is a computer program that protects a computer from viruses.
Transactional risks
Data can be stolen when exchanged, encryption can be used to
protect data while it is transferred
Encryption is changing readable data to unreadable data to prevent steal
Types of Technical Attacks
Denial-of-Service attacks
an attack on a web site in which an attacker uses specialized
software to send a flood of data packets to the target computer
with the aim of overloading its resources.
Malicious Code:
Trojan Horses: a program that appears to have a useful
function but that contains a hidden function that presents a
security risk.
Other Security and Privacy
Concerns in EC
Some of the methods used in market research
and for tracking customers:
 Cookies
 Spyware
 Transaction logs: created by a log file and
records the used activities at the company's
web site (where visitors are coming from, how
often they return, how they navigate through a
site and data from shopping cart)