Professional Documents
Culture Documents
in IT – HNDIT2403
Faroos Fashee 5
Hacking
• Hacking – currently defined as to gain illegal or
unauthorized access to a file, computer, or
network
• The term has changed over time
• Security
– Internet started with open access as a means of
sharing information for research
– Attitudes about security were slow to catch up
with the risks
– Firewalls are used to monitor and filter out
communication from untrusted sites or that fit a
profile of suspicious activity
– Security is often playing catch-up to hackers as
new vulnerabilities are discovered and exploited
Faroos Fashee 12
Hacking (cont.)
The Law: Catching and Punishing Hackers (cont.):
Faroos Fashee 14
Identity Theft and Credit Card Fraud
Stealing Identities:
• Identity Theft –various crimes in which a criminal or
large group uses the identity of an unknowing,
innocent person
– Use credit/debit card numbers, personal
information, and social security numbers
– 18-29 year-olds are the most common victims
because they use the web most and are unaware
of risks
– E-commerce has made it easier to steal card
numbers and use without having the physical card
Faroos Fashee 15
Identity Theft and Credit Card Fraud (cont.)
Stealing Identities (cont.):
• Techniques used to steal personal and financial
information
– Phishing - e-mail fishing for personal and financial
information disguised as legitimate business e-
mail
– Pharming - false Web sites that fish for personal
and financial information by planting false URLs in
Domain Name Servers
– Online resumes and job hunting sites may reveal
ID numbers, work history, birth dates and other
information that can be used in identity theft
Faroos Fashee 16
Identity Theft and Credit Card Fraud (cont.)
Faroos Fashee 20
Scams and Forgery (cont.)
• Click fraud - repeated clicking on an ad to either
increase a site’s revenue or to use up a competitor's
advertising budget
• Stock fraud - most common method is to buy a stock
low, send out e-mails urging others to buy, and then
sell when the price goes up, usually only for a short
time
• Digital Forgery - new technologies (scanners and high
quality printers) are used to create fake checks,
passports, visas, birth certificates, etc., with little skill
and investment
Faroos Fashee 21
Whose Laws Rule the Web
Faroos Fashee 22
Censorship on the Global Net
• Global Impact of Censorship:
– Global nature of the Internet protects against censorship (banned in one
country, move to another)
– May impose more restrictive censorship (block everything in an attempt to
block one thing)
– Yahoo, eBay and others make decisions to comply with foreign laws for
business reasons
• Censorship in Other Nations:
– Attempts to limit the flow of information on the Internet similar to earlier
attempts to place limits on other communications media
– Some countries own the Internet backbone within their countries, block at the
border specific sites and content
– Some countries ban all or certain types of access to the Internet
• Aiding Foreign Censors:
– Companies who do business in countries that control Internet access must
comply with the local laws
Faroos Fashee 23
– Google argued that some access is better than no access
Anonymity
• Anonymity on the Internet applies to any interaction a user has on the Internet
that protects his or her identity from being shared with another user or with a
third party.
• Services available to send anonymous email (Anonymizer.com).
• Anonymizing services used by individuals, businesses, law enforcement agencies,
and government intelligence services.
• Different levels of anonymity exist and examples of anonymity can be seen all
over the Internet.
• Some basic examples of anonymity on the Internet
– Secure Billing: When a user purchases something with PayPal or on Ebay, the user
does not reveal his or her personal information to the distributor. Thus, PayPal
protects the user's anonymity.
– Question-And-Answer Sites: Users make use of anonymity with sites like Formspring,
which allows people to ask anonymous questions of known users, and obtain
responses.
– . Anonymous blogging and posting: Perhaps most importantly or prevalently, users are
able to blog anonymously (anonymous Twitter accounts), comment anonymously (on
blogspot), or post links anonymously.
Faroos Fashee 24
Anonymity
Against Anonymity:
• Fears
– It hides crime or protects criminals
– Glowing reviews (such as those posted on eBay or
Amazon.com) may actually be from the author,
publisher, seller, or their friends
Faroos Fashee 27