Textbook Notes (280,000)
CA (160,000)
York (10,000)
NATS (400)
Chapter

NATS 1700 Chapter Notes -Online Predator, Dumpster Diving, Cyberbullying


Department
Natural Science
Course Code
NATS 1700
Professor
Dov Lungu

This preview shows pages 1-2. to view the full 7 pages of the document.
Class Assignment #5 - Computer Crime
Power Point
Computer Crime is accomplished through knowledge or use of computer technology
Computers can be used:
As the target of the crime
Electronic trespassing
Software piracy
Sabotage
To facilitate an other crime
Fraud, forgery, crimes against children
Malicious Destruction
Malware / Malicious Software:
Viruses - a software program that can harm files or program to which it attaches itself (modifies or
overwrites) - can spread ONLY with human assistance
Worms - a virus that can copy itself quickly and spread from one computer to another WITHOUT
human assistance (consumes system memory disallowing it to respond to requests)
Allows malicious users to control other computers remotely
Time (logic) bombs - infection programmed to appear on certain date or ran certain amount of times
Trojan horses - appears to be good program but is coded with virus or worm
Botnets - collection of software robots that run on may computers, eternally controlled (zombie
computers)
Searches for weak passwords and propagates it
Sends spams, fraud, data theft, cyber attacks (denial of service) on one target
Amplify and automate effects of viruses
Ex. / ZeuS (4 mil. Comp in US) - Key-logging & fake html forums to steal usernames, pass-
words, account #s, creditcard #s (can buy kits online)
Stealing
Employees:
Insurance companies make phoney accounts and make claims
Financial institutions transfers money to swiss banks than disappear
Fake purchase orders from fake companies and cash the checks
Steal data and sell it
Identity theft (white collar crime)
Using someones personal information to takeover accounts, fraudulent applications (credit card,
loans, purchases) via hacking, spyware, phishing, discarded information, theft (dumpster diving)
Easy credit, bad application verification, easily obtained ID, bad security / law enforcement, poor
penalties
Cyber freedom or cyber security
Hackers
Initial meaning : to hack - to cut through thick foliage

Only pages 1-2 are available for preview. Some parts have been intentionally blurred.

Later meaning: to hack - attempt to make use of technology in original, simple yet highly inventive
ways going against the rule
Can hack anything that presents a challenge to intelligence
Answering machines , Telephone lines , Traffic lights , Tv broadcasts
Computer and computer networks
Computer hackers are generally used for all groups
Two groups of hackers:
Old school hackers New school hackers (crackers)
-1960s
- tinkering and showing their programming
- Being close to internal computer which they understand
- Ethical / no criminal intent
- Ideological and militant in 1980s
- Claim to be real hackers,compared to crackers->
- Coders and virus writers: write mali-
cious software but let others intro it to
networks
- Cyber vandals: download ready made
viruses & launch them / hack into systems
& disrupt them
- Profession criminals: break into system
to steal / sell info or control botnets
- Cyber terrorist: damage out of ideologic-
al reasons
Ethical principles:
- access to computers should be unlimited
- Information should be free
- Mistrust authority - promote decentralization
- Create art on a computer
- Computers make lives better
Todays real hackers:
- expose security vulnerabilities in our computer systems
that could stop civilization
- Dont engage in viruses or denial of service
- Share knowledge with authorities
Most hackers/ crackers engage in crimes from trespassing / cyber vandalism and cyber terrorism
RECAP
Hackers are a subculture of the information society
Some engage in criminal / terrorist activites
Others challenge our sociotechnological reality
****QUESTIONS:
- is all subversion of authority and criminal resistance bad? - yes?
- Who should fight the way technology is used? - government and the people
- Who should expose the dangers of information age? - government and the people
- Do those who control technology dispose of disproportionate power? - no bc now they have more power
- Do we need new institutions to control and direct technological development? - yes unbiased ones
- Do hackers do a public service by finding and publicizing computer security and weaknesses? - yes if
they just report it and dont take advantage of the weaknesses they can create a more secure society
Sara Baase - Crime
21st century work from personal computer (PC) or laptop
Computers and the internet make many activities easier for us and also illegal activities easier for crim-
inals
You're Reading a Preview

Unlock to view full version