Privacy in Cyberspace After a user visits a Web site, a small text file known as a cookie may be written to the user’s hard disk by the Web site. Although some cookies are used for justifiable reasons, this is not always the case. Some cookies are used to gather personal information without the user’s consent.
Privacy in Cyberspace To protect society, governments should provide privacy rights including but not limited to: Informing users of the collection of information and its intended use. Allowing users to give or deny their consent to have their information collected.
Privacy in Cyberspace Privacy online: Use protective software or devices such as Anonymous Surfing or IronKey Secure USB flash drives when using the Internet. Create e-mail addresses from free Web- based services whenever you use your e- mail address for such things as chat rooms and mailing lists.
Privacy in Cyberspace Privacy online (continued): Teach children the importance of getting permission prior to giving out personal information over the Internet. Before you fill out any online registration forms, make sure the privacy policy statement of a Web site states that the information provided will not be sold.
Privacy in Cyberspace Privacy at home: GPS capabilities are embedded in newer cell phones so they can be located. Services such as Wherify and uLocate can determine the precise location of a cell phone. Software is available to determine and provide notification when a cell phone leaves a specific geographic area.
Privacy in Cyberspace Privacy at work: Refrain from making personal calls on a work phone. Avoid using a company e-mail account for personal purposes. Assume that your actions at work are being monitored.
Computer Crime & Cybercrime Types of computer crime Identify theft: A criminal gains access to personal information in order to impersonate another Phishing: Legitimate-looking e-mails or Web sites are created in an attempt to obtain confidential data about a person for illegal purposes.
Computer Crime & Cybercrime Types of computer crime (continued) Malware (short for malicious software): programs developed to intentionally harm or gain access to a computer system without permission. Includes spyware, viruses, worms, zombies, and Trojan horses
Computer Crime & Cybercrime Types of computer crime (continued) Spyware: software that gathers private information and tracks Web use, and provides that information to third parties Adware: a form of spyware that generates annoying pop-up and banner ads Keyloggers: keep track of keystrokes to provide cybercriminals with confidential data
Computer Crime & Cybercrime Types of computer crime (continued) Computer virus: code that is concealed inside a program and intended to harm or destroy files File infectors attach themselves to files. Boot sector viruses attach to the first tracks on a hard drive and execute each time you start the computer. Macro viruses attach to data files and take advantage of application macros.
Computer Crime & Cybercrime Rogue forms of malware include: Time bomb: A virus program that remains dormant on a computer system until it is activated by a specific event Worm: Similar to a virus but does not need the action of a user to execute the code and cause damage
Computer Crime & Cybercrime Denial of service (DoS) attack Assaults an Internet server with so many requests that it cannot function Accomplished through zombies, individual computers in a botnet—a group of “hijacked” computers.
Computer Crime & Cybercrime As the stealing of private and confidential information increases, the possibility of fraud also increases. The physical stealing of computer equipment is also growing, especially computer components such as microprocessors and chips.
Computer Crime & Cybercrime Types of fraud and theft Memory shaving: only a portion of RAM is stolen to make the theft less evident Password stealing: unauthorized gathering of passwords
Computer Crime & Cybercrime Types of fraud and theft (continued) Salami shaving: an embezzlement tool in which a program takes a little money from numerous accounts Data diddling: individuals change data so that it is hard to determine that the resulting theft has occurred
Computer Crime & Cybercrime Types of fraud and theft (continued) Forgery: information is transmitted over the Internet as if from a user by an illegal source that appears to be legitimate. A high percentage of cybercrimes go unreported because of blackmail.
Security Threats to the security of computer systems include: Corporate espionage Information warfare Security loophole detection programs Attacks on safety-critical systems Terrorism
What You’ve Learned Although no computer system can be totally safe, you can take simple steps to protect your computer and data. Encryption can be used to guard privacy online through public key encryption. The government must keep trying to find a balance between its need to know and the privacy rights of individuals.
Looking Out For Future Shocks in Resilience and National Security in An Uncertain World, Ed. Centre of Excellence For National Security, (Singapore: CENS-RSIS, 2011)