hacker

advertisement
Chapter 5:
Crime
See Dilbert cartoons about crime:
http://dilbert.com/strips/comic/2009-09-18/
http://dilbert.com/strips/comic/2009-05-12/
CptS 401, Spring2011
3/24/11
1
Announcements
• Video scene assignment is posted
• Tutorial on iMovie and Final Cut Pro will be
held a week from today (March 31) at 4:15 in
Avery Microcomputer Lab
– More info and sign-up sheet on Tuesday
• Midterm exam grades posted on Monday (will
be curved)
CptS 401, Spring2011
3/24/11
2
Reading Quiz on Ch. 5
• Covers 5.1, 5.2.1,5.2.3, 5.3, 5.5, 5.6
• Please put all materials away except for cheat
sheet.
CptS 401, Spring2011
3/24/11
3
Quiz Question 1
A hacker can be described as
A. a programmer who writes clever or elegant code
B. someone who breaks into computers without
authorization
C. someone who modifies web sites to make a
political statement
D. All of the above
E. None of the above
CptS 401, Spring2011
3/24/11
4
Quiz Question 1 Answer
D. All of the above
All of these versions of a “hacker” can be found
in Section 5.2.1 (pp. 253-260).
CptS 401, Spring2011
3/24/11
5
Quiz Question 2
In this attack, hundreds of thousands of
requests for Web pages and other information
are issued to a single Web site:
A. Zombie attack
B. Love Bug attack
C. Denial-of-service attack
D. None of the above
CptS 401, Spring2011
3/24/11
6
Quiz Question 2 Answer
C.
See p. 260.
CptS 401, Spring2011
3/24/11
7
Quiz Question 3
The Computer Fraud and Abuse Act (CFAA) of 1986
A. applies to activities performed on computers
connected to the internet
B. applies to activities performed on private
computers not connected to the internet
C. applies to computers in foreign countries
D. None of the above
E. All of the above
CptS 401, Spring2011
3/24/11
8
Quiz Question 3 Answer
A.
See p. 265
What does the CFAA address?
CptS 401, Spring2011
3/24/11
9
Quiz Question 4 (Extra Credit)
Writing computer code that could at some point
be used to generate computer viruses or hack
into computers is presently illegal in the U.S.
A. True
B. False
CptS 401, Spring2011
3/24/11
10
Quiz Question 4 Answer
B. False
The bottom of p. 272 makes it clear that no such
law exists, and points out that such a law would
make it difficult to defend against such viruses,
and may conflict with the First Amendment
(Free Speech), since courts have previously ruled
that software is a form of speech.
CptS 401, Spring2011
3/24/11
11
Quiz Question 5
In this identity theft scheme, false IP addresses
are planted in DNS tables, causing users to be
unknowingly directed to fake sites:
A. Phishing
B. Pharming
C. Spyware
D. All of the above
E. None of the above
CptS 401, Spring2011
3/24/11
12
Quiz Question 5 Answer
B. Pharming
See pp. 274-275.
What is a DNS? Is Pharming easier than
Phishing?
CptS 401, Spring2011
3/24/11
13
Quiz Question 6
Biometrics are
A. the unique biological characteristics of a specific
group of people, such as blood type or hair color
B. the unique biological characteristics of a specific
individual, such as fingerprint, eye patterns, or
DNA.
C. the unique measurements of an individual, such
as height, weight, or arm length.
D. All of the above
E. None of the above
CptS 401, Spring2011
3/24/11
14
Quiz Question 6 Answer
B.
Can biometric scanning devices be tricked? Why
or why not? (Discuss with team.)
CptS 401, Spring2011
3/24/11
15
Quiz Question 7
The purpose of the so-called Cyber-Crime Treaty is
to
A. help law enforcement agencies in different
countries cooperate in the prosecution of cyber
crimes.
B. standardize the laws against cyber crimes in
different U.S. states.
C. toughen existing international laws against cyber
crimes.
D. None of the above
CptS 401, Spring2011
3/24/11
16
Quiz Question 7 Answer
A.
See p. 291.
What is a dual-criminality provision? What are
arguments for and against such a provision?
CptS 401, Spring2011
3/24/11
17
Quiz Question 8
Providers of services and information must make
sure that their material is not accessible in
countries where it is illegal—this principle is known
as
A. “authority to prevent entry”
B. “responsibility to prevent access”
C. “responsibility to regulate content”
D. “mandate to block access”
E. None of the above
CptS 401, Spring2011
3/24/11
18
Quiz Question 8 Answer
B.
See p. 293
What prominent court case have we studied
that assumed this principle?
CptS 401, Spring2011
3/24/11
19
Quiz Question 9
The “authority to prevent entry” principle states that
A. information providers must prevent their materials
from being accessible in countries where the
materials are illegal.
B. individuals are solely responsible for blocking access
to materials they find personally objectionable.
C. governments may block access to material that is
illegal in their country, but may not prosecute the
providers of such material if the material is legal in
the country in which it is produced.
D. None of the above
CptS 401, Spring2011
3/24/11
20
Quiz Question 9 Answer
C.
See p. 299
Do you think“responsibility to block access” or
“authority to prevent entry” is a better policy?
Why?
CptS 401, Spring2011
3/24/11
21
Question 10
Whereas Ch. 5 of the book focuses mainly on
, Mike Gaffney’s guest lecture focused
mainly on
.
A. Cybercrime, Computer-Aided Dispatch
B. Cybercrime, Crime detection
C. Cybercrime, Crime prevention
D. Cybercrime, Use of technology to identify,
investigate and prosecute crimes
E. None of the above
CptS 401, Spring2011
3/24/11
22
Quiz Question 10 Answer
C.
(I hope anyone who was here on Tuesday got
this right. )
CptS 401, Spring2011
3/24/11
23
Update: Use of Lab Files Showed More
than 100 Baseball Players Used Steroids
• On p. 289, the book mentions a well-known case
involving the potential release of information on
players who, according to lab files, used steroids
• The original search warrant was for 10 specific
players, yet the law enforcement agents wanted
to release info on 100 players who used steroids.
• How was the case settled? Let’s look:
http://www.latimes.com/sports/la-sp-balco-ballplayers-20100914,0,1279725.story
CptS 401, Spring2011
3/24/11
24
Discussion Exercise: Use of Car vs.
Computer (Clicker)
5.8, p. 300: A friend logs on to your computer at night
while you are asleep and uses some of your software.
Another friend takes your car at night and drives it
around for a while. (Neither has your permission; neither
does damage.) List characteristics (ethics, legality, risks) of
the two events that are similar and different. Which
would offend you more?
A: A friend using your computer software
B: A friend driving your car
C: Both would offend me equally
D: Neither would offend me
CptS 401, Spring2011
3/24/11
25
Discussion Exercise:
Stance with Respect to Break-Ins (Clicker)
Ex. 5.9, p. 300: Young, technically-oriented hackers have argued
that, if owners of a computer system want to keep outsiders out,
it is their responsibility to provide better security. Ken
Thompson, one of the inventors of UNIX, said, “The act of
breaking into a computer system has to have the same social
stigma as breaking into a neighbor’s house. It should not matter
that the neighbor’s door is unlocked.” Which position do you
agree with more? Why?
A: Young hackers’ position
B: Ken Thompson’s position
C: Neither
D: Not sure
CptS 401, Spring2011
3/24/11
26
Discussion Exercise:
Surveillance Software to Monitor the Web (Clicker)
Ex. 5.22, p. 301: Commenting on constitutional objections to the
SEC’s plan to use surveillance software to monitor the Web for
possible fraud (Section 5.5.1), an SEC offical said “the
Consitution doesn’t give people the right to use the Internet to
commit fraud.” Evaluate this response. Is it a good argument?
A: Yes
B: No
C: Not sure
CptS 401, Spring2011
3/24/11
27
Discussion Exercise:
Computer Virus a Crime? (Clicker)
Ex. 5.15, p. 300: Evaluate arguments in favor of
and against passage of a law making the writing
and publication of a computer virus a crime.
(See Section 5.2.4.) Would you support such a
law? Why?
A: Yes, I would support such a law
B: No, I wouldn’t support such a law
C: I’m not sure
CptS 401, Spring2011
3/24/11
28
Download