CSC 1200 Chapter : Powerpoint Slides - Chapter 6
Chapter 6
Securing the Electronic
Frontier
Vulnerabilities of the Net
•Data breaches
–Sony Pictures, Home Depot, Target, etc.
•Phishing attacks: online identity theft
•Viruses
–Macroviruses
•Worm and Trojan horse
–Morris and the Internet Worm
Cybercrime(1 of 2)
•Cybercrime
–Crimes committed through the utilization of
computer and network technologies
•Includes three categories:
–Software piracy
•Unauthorized duplication of proprietary software
•e.g., Megaupload web site
Document Summary
Sony pictures, home depot, target, etc: phishing attacks: online identity theft, viruses. Crimes committed through the utilization of computer and network technologies: includes three categories: Software piracy: unauthorized duplication of proprietary software, e. g. , megaupload web site. Computer sabotage: denial of service (dos) attacks, malware (worms, viruses) Unauthorized access to computer systems, usually by hackers. Anti-piracy architectures: digital rights management (drm) systems. Use of computer hacking to advance political or social causes. Wrong to trespass even if no damage is done or intended: break-ins uncover security flaws, but, damage could occur accidentally. Term traced to cult of the dead, which fights. Security measures in cyberspace (1 of 2: firewalls, antivirus software, filtering systems. Security measures in cyberspace (2 of 2: encryption: encoding information so it can be read only by someone with the proper key. Private vs. public key encryption: public key systems rsa and pgp. Encryption disputes (1 of 2: the clipper chip.