Upload
others
View
6
Download
0
Embed Size (px)
Citation preview
1
1. To discover ethical issues in electronic
media and the Internet.
2. To identify different areas of Internet
crime.
3. To assess where one should go to
report Internet crime.
4. To recommend computer security
measures to students.
2
• One in five Web surfing children have been sexually solicited online
– Journal of the American Medical Association
• 35% of software today is used without licenses
• Nine million Americans will have their identity stolen this year
Federal Trade Commission: http://www.ftc.gov/bcp/edu/microsites/idtheft/consumers/about-identity-theft.html
3
• The study of moral values
and rules in electronic
media and the Internet
4
• pirating
• online predators
• hacking
• identity theft
• wire fraud
• phishing
• counterfeit auctions
• spyware
• viruses
• password trafficking
• internet harassment
• cyber bullying
• hate mail
• copyright infringement
5
• Are needed to avoid the spread of electronic crimes,
such as:
• Is defined as any crime involving computers including:
– pirating
– online predators
– cracking
– identity theft
– wire fraud
– phishing
– counterfeiting goods online
– creating malicious viruses
– stealing passwords
– Internet harassment
– cyberbullying
6
• Is the illegal stealing, copying or exchanging of
media including:
– software
– movies
– music
• Accounts for almost 35% of software today
• Can result in fines of millions of dollars
7
• Take advantage of children by:
– using instant messaging, e-mail and social
network sites
– gaining victims trust and engaging in
sexually explicit conversations
– trying to arrange face-to-face meetings
8
• Is modifying electronics such as an Xbox®, cell phone
or iPod®
• Hacker: an individual who alters electronics legally
– someone who modifies their computer for better
performance
• Cracker: an individual who illegally alters computer
hardware or breaches computer systems
– crackers are often mislabeled “hackers” in mass-
media
9
• Is when someone steals your personal
information to commit fraud or other crimes
including:
– your name
– credit card information
– Social Security number
• Nine million Americans have their
identities stolen each year
10
• Is illegally stealing money or property
using interstate “wires”
• Is considered a federal crime because
the crime goes across state lines
11
• Involves e-mails pretending to originate from banks or
online retailers such as eBay ® or PayPal ®
• Looks very similar to an actual e-mail originating from
retailer
• Tries to gather financial information, user names and
passwords from victims
– if recipient visits the fake retailer they may receive
malicious viruses or spyware
12
• Have become hotbeds for counterfeit goods
– eBay ® has recently been sued by
companies for auctioning counterfeit goods.
• These companies include the following:
• L’Oreal ®
• Louis Vuitton ®
• Dior Couture ®
• Gucci ®
13
• Is software installed discreetly altering the
usability of a computer
• Usually installs with other programs, such as
file sharing programs
• Includes side-effects such as pop-up
advertisements and crashing of the computer
14
• Are software programs which spread from computer to
computer
• Are malicious in nature
• Can delete information on your computer
• Spread through e-mail and Internet downloads
• Alter the normal functions of your computer
15
• Steps to prevent viruses include:
– use virus protection software
– implement an Internet firewall, a buffer between
your computer and the Internet
– install security updates
– be careful opening e-mail and downloading
materials online
16
• Is the illegal obtaining, giving or selling of
passwords
17
An American Eagle® employee was indicted for
giving out passwords to the American Eagle®
computer network to a Yahoo® message board.
The indictment carries a penalty of 11 years in
prison and/or a $350,000 fine. http://www.usdoj.gov/criminal/cybercrime/pattersonIndict.htm
• Is the online counterpart of harassment
• Can happen when e-mails are abusive
• May occur with unwanted e-mails (SPAM)
• Arises if conversations in instant messenger
turn hostile
• May occur if talk in online forums becomes
threatening
18
• Is a form of cybercrime where offensive letters
are sent through e-mail
• Involve e-mails including the following:
– racism prejudice
– sexism
• Can result in jail time
19
A Washington man was sent to jail for 41 months after he was
convicted of sending at least 700 people hate mail.
• Is Internet harassment
• Tips for dealing with a cyberbully:
– take a break to reduce tension and calm
down
– cut off all communication with the cyberbully
– tell an adult
20
• Should be reported to the following
authorities depending on the seriousness
of the crime:
– Federal Bureau of Investigation
– U.S. Secret Service
– IC3 Internet Crime Complaint Center
21
• Protect your personal information
• Use anti-virus software
• Back up important files
• Learn who to contact if cybercrime
occurs
22
• Protect your Social Security number
- use it only when absolutely required
• Secure your trash by the following:
- cutting up credit cards, tearing up receipts
and shredding bank statements
• Safeguard your passwords
- place passwords on your vital accounts
- use a combination of letters and numbers
to increase security
23
• Are small files stored on your computer
• Saved when a user visits Web sites
• Collect information used for:
– customizing Web sites
– collecting demographic information for
advertisers
– tracking user preferences
24
• Could be considered an invasion of privacy
• Track which Web sites you visit
• Track where you go on the Web site
• Can be pulled from multiple sources to build
a “profile” of your habits
– users may be unaware any of these
actions are taking place
25
• Are useful for customizing
advertisements
– prevent young people from being targeted
with walkers and the elderly do not end up
with banner ads for skydiving
26
At what point do cookies go from helping advertisers to invading
your privacy?
• Is a security measure used on today’s Internet
• Is labeled as SSL –Secure Sockets Layer
• Insures data is secure
• Is shown as a lock in the right hand corner of a
browser
• Assures the site is authentic and not a fake,
deterring phishers
• Is common in banks and other financial
institutions
27
• Protect an authors original work
– automatically held when a work is created
– denoted by the symbol ©
• Provide protection only in the United States
• No longer require the symbol to be protected
• Are no longer valid on works created before 1989
• Are automatic on any work produced
28
• Professional productions
– 95 years from publication or 120 years from
creation, whichever is shorter
• Individual productions
– protected for life of author plus 70 years
after authors death
29
30
Copyrights Patents Trademarks
protect original
works
protect
inventions and
discoveries
protect words
or symbols
used to identify
the source of
goods and
services
Collectively copyrights, patents and trademarks are known as
“intellectual property”
• Are governed by the Fourth Amendment to the
U.S. Constitution
– because computers are historically young,
future court decisions will become landmark
cases
31
•The Fourth Amendment:
-designed to control searches and seizures of homes
and property
-will now be adapted and applied to searches and
seizures of computers
• Created the Identity Theft Program in
1998 to handle the skyrocketing increase
of identity theft reports
• Regulates identity theft
• Handles identity theft complaints at
FTC.gov
32
• Is a partnership between the FBI and the
National White Collar Crime Center
– serves as a place for individuals and
law enforcement to file complaints
about cybercrime
– http://www.ic3.gov/
33
• Integrates department resources from the following:
– Executive Office of the President
– U.S. Department of Commerce
– U.S. Department of Justice
– U.S. Department of Homeland Security
– U.S. Department of State
• Works to provide copyright protection abroad
• Attempts to stop the counterfeit of goods
34
• Is a partnership between the Department of
Homeland Security and the public and private
sectors
• Protects our nation against cyber attacks
– examine cyber attacks
– spread warnings to public
– organize response actions
35