Uploaded by olamidedeborah26

IT Law & Ethics Course Outline

advertisement
INFORMATION TECHNOLOGY LAW AND
ETHICS
Courtesy: Computer Science
Department
CSC 225 / CSC
Prof. O. Folorunso
Mrs. C.O Tinubu
1
COURSE OUTLINE
• Proliferation of Computers in our World: Computers and the Business
World, Computers and Health, Computers and Education, Computers and
e-Government
• Ethics and Professionalism
• Regulatory Approaches to Information Technology
• Cyber Crimes
• Intellectual Property Rights
Recommended text book: Ethics In Information Technology, Fourth
Edition. George W. Reynolds
2
LEARNING OUTCOMES
Upon successful completion of this course, you should be able to:
1. Discuss the ethical issues related to Information Technology
2. Discuss the principles of intellectual property and issues related to
the infringement of intellectual property.
3. Identify major national and international laws relating to
Information Technology
3
•
Information Technology (IT) is an umbrella term that covers a vast array
of computer disciplines that permit organizations to manage their
information resources.
•
•
Information Technology (IT) can be defined as the use of systems
(especially computers and telecommunications) for storing, retrieving,
processing and sending information.
IT is beneficial to many domains, such as Education, Health, Business,
Governance, etc.
Discuss the roles of IT in various domains.
Impact of Information Technology in the Workplace
1.
2.
3.
4.
5.
Creation of new business models, products and services
enhances communication with customers, vendors and other business
partners
increases sales
improves productivity
efficiency of operations:
• Telecommuting enables work from home option
• Organizations can use the best and most cost-effective human resources in a large
geographical region
6.
Job deskilling: occurs when skilled labor is eliminated due to high
technology.
Information Technology (IT) Laws
Laws are rules and regulations governing the behaviors and operations of
people in the society.
• Information Technology law (also called cyberlaw) concerns the laws of
Information Technology, including computing and the internet.
•
IT law consists of the laws (statutes, regulations, and caselaw) which
governs the digital dissemination of both information and software itself,
and legal aspects of information technology more broadly.
• IT law covers mainly the digital information (including information
security and electronic commerce). It raises specific issues of intellectual
property in computing and online, privacy, freedom of expression and
jurisdiction.
•
6
What is Ethics?
•
Ethics is a set of beliefs about right and wrong behaviors within a society.
Ethical behavior conforms to generally accepted norms, many of which are
almost universal. However, although nearly everyone would agree that lying
and cheating are unethical, opinions about what constitutes ethical behavior
often vary dramatically. For example, attitudes toward software piracy that is,
the practice of illegally making copies of software or enabling others to
access software to which they are not entitled- range from strong opposition
to acceptance of the practice as a standard approach to conducting business.
7
Ethical Issues of Information Technologies
•
Information Technology Ethics is the field that investigates the ethical issues
arising from the development and application of information technologies.
•
Information Technology offers opportunities for unethical behaviors due to
ease of collecting and disseminating information.
This leads to increase of cybercrime, cyberfraud, identity theft and
intellectual property theft
•
Organizations can reduce unethical behavior of employees by developing
and enforcing codes of ethics.
The Difference between Morals, Ethics, and Laws
Morals are one’s personal beliefs about what is right and wrong.
• Ethics describes standards or codes of behavior expected of an individual
by a group (nation, organization, profession) to which an individual belongs.
• Law is a system of rules that tells us what we can and cannot do. Laws are
enforced by a set of institutions (the police, courts, law-making bodies).
•
Legal acts are acts that conform to the law. Moral acts conform to what an
individual believes to be the right thing to do.
9
A code of ethics is a statement that highlights an organization’s key ethical
issues and identifies the overarching values and principles that are important
to the organization and its decision making.
• The code frequently includes a set of formal, written statements about the
purpose of the organization, its values, and the principles that should guide
its employees’ actions. An organization’s code of ethics applies to its
directors, officers and employees.
• The code of ethics focuses employees on areas of ethical risk relating to
their role in the organization, offers guidance to help them recognize and
deal with ethical issues, and provides mechanisms for reporting unethical
conduct and fostering a culture of honesty and accountability within the
organization.
• The code of ethics helps ensure that employees abide by the law, follow
necessary regulations and behave in an ethical manner.
•
10
11
Four common approaches to ethical decision making
Philosophers have developed many approaches to aid in ethical decision
making. Four of the most common approaches are:
1. Virtue ethics approach: The ethical choice best reflects moral virtues in
yourself and your community.
Virtue ethics approach to decision making focuses on how you should behave
and think about relationships if you are concerned with your daily life in a
community.
It does not define a formula for ethical decision making, but suggests that
when faced with a complex ethical dilemma, people do either what they are
most comfortable doing or what they think a person they admire would do.
12
2. Utilitarian approach: The ethical choice produces the greatest excess of
benefits over harm. The utilitarian approach to ethical decision making states
that you should choose the action or policy that has the best overall
consequences for all people who are directly or indirectly affected.
The goal is to find the single greatest good by balancing the interests of all
affected parties.
3. Fairness approach: The ethical choice treats everyone the same and shows
no favoritism or discrimination. The fairness approach focuses on how fairly
actions and policies distribute benefits and burdens among people affected by
the decision. The guiding principle of this approach is to treat all people the
same. However, decisions made with this approach can be influenced by
personal bias toward a particular group, and the decision makers may not even
realize their bias.
13
4. Common good approach: The ethical choice advances the common good.
The common good approach to decision making is based on a vision of
society as a community whose members work together to achieve a common
set of values and goals.
Decisions and policies that use this approach attempt to implement social
systems, institutions, and environments that everyone depends on and that
benefit all people. Examples include an effective education system, a safe and
efficient transportation system, and accessible and affordable health care.
14
INFORMATION TECHNOLOGY LAW AND
ETHICS
CSC 225 / CSC
Prof. O. Folorunso
Mrs. C.O Tinubu
1
Four common approaches to ethical decision making
Philosophers have developed many approaches to aid in ethical decision
making. Four of the most common approaches are:
1. Virtue ethics approach: The ethical choice best reflects moral virtues in
yourself and your community.
Virtue ethics approach to decision making focuses on how you should behave
and think about relationships if you are concerned with your daily life in a
community.
It does not define a formula for ethical decision making, but suggests that
when faced with a complex ethical dilemma, people do either what they are
most comfortable doing or what they think a person they admire would do.
2
2. Utilitarian approach: The ethical choice produces the greatest excess of
benefits over harm. The utilitarian approach to ethical decision making states
that you should choose the action or policy that has the best overall
consequences for all people who are directly or indirectly affected.
The goal is to find the single greatest good by balancing the interests of all
affected parties.
3. Fairness approach: The ethical choice treats everyone the same and shows
no favoritism or discrimination. The fairness approach focuses on how fairly
actions and policies distribute benefits and burdens among people affected by
the decision. The guiding principle of this approach is to treat all people the
same. However, decisions made with this approach can be influenced by
personal bias toward a particular group, and the decision makers may not even
realize their bias.
3
4. Common good approach: The ethical choice advances the common good.
The common good approach to decision making is based on a vision of
society as a community whose members work together to achieve a common
set of values and goals.
Decisions and policies that use this approach attempt to implement social
systems, institutions, and environments that everyone depends on and that
benefit all people. Examples include an effective education system, a safe and
efficient transportation system, and accessible and affordable health care.
4
Regulatory Approaches to Information Technology
Generally, three approaches have been taken by countries to address
convergence:
(i) a legislative approach;
(ii) a regulatory approach; and
(iii) a self-regulation approach.
Each of the approaches presents advantages and disadvantages, but no one
approach results in an optimal solution. In general, countries see more
effective results when several approaches, especially the legislative and the
regulatory ones, are combined.
5
i. Legislative Approach: The legislative approach involves developing
legislation that responds to convergence, either in the immediate term or in
anticipation of convergence trends.
Legislative solutions define new laws or create new regulatory frameworks to
respond to convergence and guide future policy direction.
This can be done by developing and implementing a reform of the entire legal
framework for telecommunications or by amendments to existing laws.
ii. Regulatory Approach: Under the regulatory approach, countries modify
existing regulations or institute new regulations to address new technologies
rather than developing new legislation to address convergence. The regulatory
approach can be a practical way of addressing convergence. This approach,
however, must be carefully managed to minimize inconsistencies between new
and existing rules.
6
Most often, the regulatory approach is used by policymakers in conjunction
with the legislative approach. This complementary mix allows governments
to establish new legal frameworks to address convergence while dealing with
its specific effects through regulation.
iii. Self-Regulation Process: The self-regulation process consists of
developing and designing convergence policy through an ad-hoc or existing
consultative body. This body typically is composed of several government
agencies, industry representatives, and other interested parties.
7
Jurisdiction Content Liability
•
•
Internet liability is becoming extremely important for all businesses. The way
we do business has changed drastically over the past decades. Doing business
now requires companies to have websites, Facebook pages, LinkedIn
accounts and blogs. All of these examples leave a company at risk for data
breaches and content liability. Content liability could be useful in resolving
and fixing content that could cause harm to the image of a company.
The internet has opened up a new forum for business to be weary of. The
openness of the internet means that some users may post content or engage
in activity that is unlawful or otherwise offensive.
8
•
Jurisdiction Content Liability is the different laws governing the legality of
an internet content and the approach of resolving them. There is no
uniform, international jurisdictional law of universal application regarding
internet contents, and such may result into conflict of laws. An example
would be where the contents of a web site are legal in one country and
illegal in another. In the absence of a uniform jurisdictional code, legal
practitioners are generally left with a conflict of law issue.
9
Internet Filtering
•
•
•
•
An Internet filter is software that can be used to block access to certain web
sites that contain material deemed inappropriate or offensive.
The best Internet filters use a combination of URL, keyword, and dynamic
content filtering.
With URL filtering, a particular URL or domain name is identified as
belonging to an objectionable site, and the user is not allowed access to it.
Keyword filtering uses keywords or phrases- such as sex, Satan, and
gambling- to block Web sites. With dynamic content filtering, each web site’s
content is evaluated immediately before it is displayed, using such techniques
as object analysis and image recognition. Organizations may direct their
network administrators to install filters on employees’ computers to prevent
them from viewing sites that contain pornography or other objectionable
materials.
10
•
Another approach to restricting access to web sites is to subscribe to an
Internet service provider (ISP) that performs the blocking. The blocking
occurs through the ISP’s server rather than via software loaded onto each
user’s computer.
Anonymity on the Internet
• Anonymous expression is the expression of opinions by people who do not
reveal their identity.
• The freedom to express an opinion without fear of reprisal is an important
right of a democratic society. Anonymity is even more important in
countries that don’t allow free speech.
• However, in the wrong hands, anonymous communication can be used as a
tool to commit illegal or unethical activities.
11
Defamation and Hate Speech
• In the United States, speech that is merely annoying, critical, demeaning,
or offensive enjoys protection under the First Amendment. Legal
recourse is possible only when hate speech turns into clear threats and
intimidation against specific citizens. Persistent or malicious harassment
aimed at a specific person can be prosecuted under the law, but general,
broad statements expressing hatred of an ethnic, racial, or religious
group cannot. A threatening private message sent over the Internet to a
person, a public message displayed on a Web site describing intent to
commit acts of hate-motivated violence at specific individuals, and libel
directed at a particular person are all actions that can be prosecuted.
12
Privacy and Data protection
The use of information technology in business requires balancing the needs of
those who use the information that is collected against the rights and desires of
the people whose information is being used.
Information privacy
• The concept of privacy that is particularly useful in discussing the impact of
IT on privacy is the term information privacy, first coined by Roger Clarke,
director of the Australian Privacy Foundation.
• Information privacy is the combination of communications privacy (the
ability to communicate with others without those communications being
monitored by other persons or organizations) and data privacy (the ability to
limit access to one’s personal data by other individuals and organizations in
order to exercise a substantial degree of control over that data and its use).
13
Data Collection on the Web
• Due to the increase in online shopping, personal details of individuals are
prone to misuse
There arises the issue of personal information being sold to telemarketing
firms resulting in spam.
• Information provided on the Web can be combined with other information
and technologies to produce new information.
Technologies Used for Data Collection includes:
1. Cookies: Small text files with unique ID tags that are embedded in a web
browser and saved on the user’s hard drive.
Help websites customize pages for users
• Considered an invasion of privacy when users’ information is used without prior
consent
• Installing a cookie manager helps users disable cookies
•
2. Log files: Generated by web server software, records a user’s actions on a
website.
INFORMATION TECHNOLOGY LAW AND
ETHICS
CSC 225 / CSC
Prof. O. Folorunso
Mrs. C.O Tinubu
1
Intellectual Property
•
Intellectual Property is a term used to describe works of the mind, such as
art, books, films, formulas, inventions, music, and processes- that are
distinct, and owned or created by a single person or group.
•
Intellectual property is protected through copyrights, patents, trademarks
and trade secret laws.
2
•
•
Copyright law protects authored works, such as art, books, film, and
music; patent law protects inventions (new processes); trademark
protects names and identifying marks and trade secret law helps
safeguard information that is critical to an organization’s success.
Together, copyright, patent, and trade secret legislation forms a
complex body of law that addresses the ownership of intellectual
property. Such laws can also present potential ethical problems for IT
companies and users. For example, some innovators believe that
copyrights, patents, and trade secrets stifle creativity by making it
harder to build on the ideas of others. Meanwhile, the owners of
intellectual property want to control and receive compensation for the
use of their intellectual property.
3
Advantages of Patent laws to organizations
• Generates revenue by licensing the patent
• Attracts funding for research and development
• Keeps competitors from entering certain market segments
Assignment:
• What is Software Piracy?
• Discuss any two (2) laws covering Software Piracy
4
Protection of Intellectual property
1. Copyrights
•
•
•
A copyright is the exclusive right to distribute, display, perform, or
reproduce an original work in copies or to prepare derivative works based
on the work.
Copyright protection is granted to the creators of original works of
authorship in any tangible medium of expression, now known or later
developed, from which they can be perceived, reproduced, or otherwise
communicated, either directly or with the aid of a machine or device.
The author may grant this exclusive right to others. As new forms of
expression develop, they can be awarded copyright protection.
5
Copyright infringement is a violation of the rights secured by the owner of a
copyright. Infringement occurs when someone copies a substantial and
material part of another’s copyrighted work without permission.
Digital Copyright Laws
• Copyright law guarantees developers the rights to their works for a certain
amount of time.
Fair Use Doctrine
• Copyright law tries to strike a balance between protecting an author’s rights
and enabling public access to copyrighted works. The fair use doctrine was
developed over the years as courts worked to maintain that balance. The fair
use doctrine allows portions of copy righted materials to be used without
permission under certain circumstances.
•
6
Software Copyright Protection
• The use of copyrights to protect computer software raises many
complicated issues of interpretation. For example, a software manufacturer
can observe the operation of a competitor’s copyrighted program and then
create a program that accomplishes the same result and performs in the
same manner. To prove infringement, the copyright holder must show a
striking resemblance between its software and the new software that could
be explained only by copying. However, if the new software’s manufacturer
can establish that it developed the program on its own, without any
knowledge of the existing program, there is no infringement.
•
For example, two software manufacturers could conceivably develop
separate programs for a simple game without infringing the other’s
copyright.
7
2. Patents
•
•
A patent is a grant of a property right issued by the United States Patent and
Trademark Office (USPTO) to an inventor. A patent permits its owner to
exclude the public from making, using, or selling a protected invention, and
it allows for legal action against violators. Unlike a copyright, a patent
prevents independent creation as well as copying.
Even if someone else invents the same item independently and with no prior
knowledge of the patent holder’s invention, the second inventor is excluded
from using the patented device without permission of the original patent
holder. The rights of the patent are valid only in the United States and its
territories and possessions.
8
3. Trademark
A trademark is a logo, package design, phrase, sound, or word that enables a
consumer to differentiate one company’s products from another’s.
Consumers often cannot examine goods or services to determine their quality
or source, so instead they rely on the labels attached to the products.
Trademark law gives the trademark’s owner the right to prevent others from
using the same mark or a confusingly similar mark on a product’s label. The
United States has a federal system that stores trademark information;
merchants can consult this information to avoid adopting marks that have
already been taken.
9
Examples of Trademarks
10
4. Trade Secrets
•
•
•
A trade secret can be defined as business information that represents
something of economic value, has required effort or cost to develop, has
some degree of uniqueness or novelty, is generally unknown to the public,
and is kept confidential.
Trade secret protection begins by identifying all the information that must
be protected- from undisclosed patent applications to market research and
business plans- and developing a comprehensive strategy for keeping the
information secure.
Trade secret law protects only against the misappropriation of trade secrets.
If competitors come up with the same idea on their own, it is not
misappropriation; in other words, the law doesn’t prevent someone from
using the same idea if it was developed independently.
11
Trade secret law has several key advantages over the use of patents and
copyrights in protecting companies from losing control of their intellectual
property, as summarized in the following list:
• There are no time limitations on the protection of trade secrets, as there are
with patents and copyrights.
• There is no need to file an application, make disclosures to any person or
agency, or disclose a trade secret to outsiders to gain protection. (After the
USPTO issues a patent, competitors can obtain a detailed description of it.)
• While patents can be ruled invalid by the courts, meaning that the affected
inventions no longer have patent protection, this risk does not exist for trade
Secrets.
• No filing or application fees are required to protect a trade secret.
12
Key Intellectual Property Issues
This section discusses several issues that apply to intellectual property and
information technology, including plagiarism, reverse engineering, open source
code, competitive intelligence, and cybersquatting.
1. Plagiarism
• Plagiarism is the act of stealing someone’s ideas or words and passing them
off as one’s own. The explosion of electronic content and the growth of the
web has made it easy to cut and paste paragraphs into term papers and
other documents without proper citation or quotation marks.
• Plagiarism is also common outside academia. Popular literary authors,
playwrights, musicians, journalists, and even software developers have been
accused of it.
13
2. Reverse Engineering
• Reverse engineering is the process of taking something apart in order to
understand it, build a copy of it, or improve it.
• Reverse engineering was originally applied to computer hardware but is now
commonly applied to software as well.
• Reverse engineering of software involves analyzing it to create a new
representation of the system in a different form or at a higher level of
abstraction. Often, reverse engineering begins by extracting design-stage
details from program code. Design-stage details about an information system
are more conceptual and less defined than the program code of the same
system.
14
3. Open Source Code
• Open source code is any program whose source code is made available for
use or modification, as users or other developers see fit. The basic premise
behind open source code is that when many programmers can read,
redistribute, and modify a program’s code, the software improves.
•
Programs with open source code can be adapted to meet new needs, and
bugs can be rapidly identified and fixed. Open source code advocates
believe that this process produces better software than the traditional
closed model.
15
4. Competitive Intelligence
• Competitive intelligence is legally obtained information that is gathered to
help a company gain an advantage over its rivals. For example, some
companies have employees who monitor the public announcements of
property transfers to detect any plant or store expansions of competitors.
• An effective competitive intelligence operation requires the continual
gathering, analysis, and evaluation of data with controlled dissemination of
useful information to decision makers. Competitive intelligence is often
integrated into a company’s strategic plan and decision making. Many
companies, such as Eastman Kodak, Monsanto, and United Technologies,
have established formal competitive intelligence departments.
16
5. Cybersquatting:
• This is the act of registering, selling, or using a domain name to profit from
someone else’s trademark.
• Typosquatting: relies on typographical errors made by web users when
typing a website address into a Web browser
Typosquatting is a variation of cybersquatting
• Called URL hijacking
•
17
Standards and Competition
•
•
A standard is a definition that has been approved by a recognized
standards organization or accepted as a de facto standard within a
particular industry. Standards exist for communication protocols,
programming languages, operating systems, data formats, and electrical
interfaces. Standards are extremely useful because they enable hardware
and software from different manufacturers to work together.
Competition may be one of the reasons why people protect their
intellectual property. This is because the protection of a person’s
intellectual property keeps such person in competitive edge over other
people with same competing technologies. Competition is especially true if
the software’s creator refuses to cooperate by providing documentation to
help create interoperable software. From the consumer’s standpoint, such
stifling of competition increases costs and reduces business options.
18
•
•
•
In general, standard setting, the process of determining the common set of
characteristics for a good or service, often promotes competition to the
benefit of the consumers.
Standards are particularly important in the Information and
Communication Technology (ICT) sector because they allow product to
interoperate and therefore make networks more valuable.
However, ICT standards also raise challenges because they often rely on
patented technologies. A tension arises because patent protect the owner’s
exclusionary right to exploit an innovation, while standards are intended for
widespread use.
19
INFORMATION TECHNOLOGY LAW AND
ETHICS
CSC 225 / CSC
Prof. O. Folorunso
Mrs. C.O Tinubu
1
CYBER CRIME
•
•
•
•
•
A crime committed or facilitated via the Internet is a CYBER CRIME.
A Cyber crime is any criminal activity involving computers and networks.
A Cybercrime is criminal activity that either targets or uses a computer, a
computer network or a networked device.
Cyber crimes range from frauds to unsolicited emails (spam). It can include
the distant theft of government or corporate secrets through criminal
trespass into remote systems around the globe.
Cyber crimes incorporates anything from downloading illegal music files to
stealing millions of dollars from online bank accounts. Cyber crimes also
includes non-money offenses, such as creating viruses on other computers
or posting confidential business information on the Internet.
2
The Nature of Internet Crime
• Cyber criminals can operate from anywhere in the world, targeting large
numbers of people or businesses across international boundaries.
There are challenges posed by the scale and volume of the crimes, the
technical complexity of identifying the perpetrators as well as the need to
work internationally to bring them to justice.
•
The internet opens up new opportunities to cyber criminals and enables
aspiring criminals to enter the environment, based on a belief that law
enforcement struggles to operate in the online world.
3
CYBERSECURITY AND CYBER CRIMES
• Cyber crimes and Cyber security are issues that can hardly be separated in
an interconnected environment.
• Cyber security is the protection of internet-connected systems such as
hardware, software and data from cyber crimes. The practice is used by
individuals and enterprises to protect against unauthorized access to data
centers and other computerized systems.
• Cyber security plays an important role in the ongoing development of
information technology, as well as Internet services.
• Enhancing Cyber security and protecting critical information infrastructures
are essential to a nation‟s security and economic well-being.
• Making the Internet safer (and protecting Internet users) has become
integral to the development of new services as well as government policy.
4
Classification of Cyber crimes
The term “cyber crime” is used to cover a wide variety of criminal conducts.
One approach can be found in the convention on Cybercrime, which
distinguishes between four different types of offences:
1.
Offences against the confidentiality, integrity and availability of
computer data and systems: All offences in this category are directed
against (at least) one of the three legal principles of confidentiality, integrity
and availability.
2.
Computer-related offences: This category covers a number of offences
that need a computer system to be committed. Unlike previous categories,
these broad offences are often not as stringent in the protection of legal
principles. The category includes computer-related fraud, computer-related
forgery, phishing, social engineering, shoulder surfing, Dumpster Diving,
identity theft and misuse of devices.
5
3. Content-related offences: This category covers content that is considered
illegal, including child pornography, xenophobic material or insults related to
religious symbols. The development of legal instruments to deal with this
category is far more influenced by national approaches, which can take into
account fundamental cultural and legal principles. For illegal content, value
systems and legal systems differ extensively between societies.
4. Copyright-related offences: One of the vital functions of the Internet is
the dissemination of information. Companies use the Internet to distribute
information about their products and services. In terms of piracy, successful
companies may face problems on the Internet comparable to those that exist
outside the network. Their brand image and corporate design may be used for
the marketing of counterfeit products, with counterfeiters copying logos as
well as products and trying to register the domain related to that particular
company. Companies that distribute products directly over the Internet can
face legal problems with copyright violations. Their products may be
downloaded, copied and distributed.
6
TYPES OF CYBER CRIMES
1. Hacking: In simple words, hacking is an act committed by an intruder by
accessing your computer system without your permission. Hackers (the
people doing the „hacking‟) are basically computer programmers, who have an
advanced understanding of computers and commonly misuse this knowledge
for devious reasons. They‟re usually technology buffs who have expert-level
skills in one particular software program or language. As for motives, there
could be several, but the most common are pretty simple and can be
explained by a human tendency such as greed, fame, power, etc. Some people
do it purely to show-off their expertise – ranging from relatively harmless
activities such as modifying software (and even hardware) to carry out tasks
that are outside the creator‟s intent, others just want to cause destruction.
7
•
•
•
Greed and sometimes voyeuristic tendencies may cause a hacker to break into
systems to steal personal banking information, a corporation‟s financial data,
etc. They also try and modify systems so hat they can execute tasks at their
whims. Hackers displaying such destructive conduct are also called
“Crackers”. At times, they are also called “Black Hat” hackers.
On the other hand, there are those who develop an interests in computer
hacking just out of intellectual curiosity. Some companies hire these computer
enthusiasts to find flaws in their security systems and help fix them. Referred
to as “White Hat” hackers, these guys are against the abuse of computer
systems. They attempt to break into network systems purely to alert the
owners of flaws.
“Grey Hat” is another term used to refer to hacking activities that are a cross
between black and white hacking.
8
•
•
A white hat (or a white hat hacker) is an ethical computer hacker, or
a computer security expert, who specializes in penetration testing and in
other testing methodologies that ensures the security of an
organization's information systems. While a white hat hacker hacks under
good intentions with permission, and a black hat hacker, most often
unauthorized, has malicious intent, there is a third kind known as a grey
hat hacker who hacks with good intentions but at times without
permission.
Black Hat hackers are criminals who break into computer networks with
malicious intent. They may also release malware that destroys files, holds
computers hostage, or steals passwords, credit card numbers, and other
personal information.
9
TYPES OF CYBER CRIMES
2: Denial-of-Service attack: A Denial-of-Service (DoS) attack is an explicit attempt
by attackers to deny service to intended users of that service. It involves flooding a
computer resource with more requests than it can handle consuming its available
bandwidth which results in server overload. This causes the resource (e.g. a web
server) to crash or slow down significantly so that no one can access it. Using this
technique, the attacker can render a web site inoperable by sending massive amounts
of traffic to the targeted site. A site may temporarily malfunction or crash
completely, in any case resulting in inability of the system to communicate
adequately. DoS attacks violate the acceptable use policies of virtually all internet
service providers.
Another variation to a Denial-of-Service attack is known as a “Distributed Denial
of Service” (DDoS) attack wherein a number of geographically widespread
perpetrators flood the network traffic. Denial-of-Service attacks typically target high
profile web site servers belonging to banks and credit card payment gateways.
Websites of companies such as Amazon, CNN, Yahoo, Twitter and eBay! are not
10
spared either.
Distributed DoS attacks
• Distributed DoS attacks (DDoS) are a type of cybercrime attack that
cybercriminals use to bring down a system or network. Sometimes
connected IoT (internet of things) devices are used to launch DDoS attacks.
• A DDoS attack overwhelms a system by using one of the standard
communication protocols it uses to spam the system with connection
requests.
• Cybercriminals who are carrying out cyber extortion may use the threat of a
DDoS attack to demand money. Alternatively, a DDoS may be used as a
distraction tactic while other type of cybercrime takes place.
• A famous example of this type of attack is the 2017 DDoS attack on the
UK National Lottery website. This brought the lottery‟s website and mobile
app offline, preventing UK citizens from playing.
11
TYPES OF CYBER CRIMES
3. Phishing: Phishing involves the use of fake email messages to get personal
information from internet users. It is a technique of extracting confidential
information such as credit card numbers and username password combos by
masquerading as a legitimate enterprise. Phishing is typically carried out by
email spoofing. You‟ve probably received email containing links to legitimate
appearing websites.
12
•
Not all phishing is done via email or web sites. Vishing (voice phishing)
involves calls to victims using fake identity fooling you into considering the
call to be from a trusted organisation. They may claim to be from a bank
asking you to dial a number (provided by VoIP service and owned by
attacker) and enter your account details. Once you do that, your account
security is compromised. Treat all unsolicited phone calls with skepticism
and never provide any personal information. Many banks have issued
preemptive warnings informing their users of phishing scams and the do‟s
and don‟ts regarding your account information.
13
TYPES OF CYBER CRIMES
4. Malware attacks: A malware attack occurs when a system or network is
infected with a computer virus or other type of malware. A computer
compromised by malware could be used by cybercriminals for several
purposes. These include stealing confidential data, using the computer to
carry out other criminal acts, or causing damage to data.
• Viruses: a hidden code within a program that may damage or destroy
infected files.
• Worm: a program that can spread from one computer to another and can
propagate over a computer network.
• Trojan Horse: a rogue program disguised as a useful program but contains
hidden instructions to perform a malicious task instead.
14
•
•
A famous example of a malware attack is the WannaCry Ransomware
attack, a global cybercrime committed in May 2017.
Ransomware is a type of malware used to extort money by holding the
victim‟s data or device to ransom. WannaCry is type of ransomware
which targeted a vulnerability in computers running Microsoft
Windows.
15
TYPES OF CYBER CRIMES
5. Web jacking: Web jacking derives its name from “hijacking”. Here, the
hacker takes control of a web site fraudulently. He may change the content of
the original site or even redirect the user to another fake similar looking page
controlled by him. The owner of the web site has no more control and the
attacker may use the web site for his own selfish interests. Cases have been
reported where the attacker has asked for ransom, and even posted obscene
material on the site. The web jacking method attack may be used to create a
clone of the web site, and present the victim with the new link saying that the
site has moved.
16
TYPES OF CYBER CRIMES
6. Cyber stalking: Cyber stalking is a new form of internet crime in our society
when a person is pursued or followed online. A cyber stalker doesn‟t physically
follow his victim; he does it virtually by following his online activity to harvest
information about the stalkee and harass him or her and make threats using
verbal intimidation. It‟s an invasion of one‟s online privacy. Cyber stalking uses
the internet or any other electronic means and is different from offline stalking,
but is usually accompanied by it. Most victims of this crime are women who are
stalked by men and children who are stalked by adult predators and pedophiles.
Cyber stalkers thrive on inexperienced web users who are not well aware of
netiquette and the rules of internet safety. A cyber stalker may be a stranger, but
could just as easily be someone you know.
Cyber stalkers harass their victims via email, chat rooms, web sites, discussion
forums and open publishing web sites (e.g. blogs). The availability of free email
/ web site space and the anonymity provided by chat rooms and forums has
17
contributed to the increase of cyber stalking incidents.
TYPES OF CYBER CRIMES
7. Identity Theft: Identity theft occurs when someone steals your identity and
pretends to be you to access resources such as credit cards, bank accounts and
other benefits in your name. The imposter may also use your identity to
commit other crimes. “Credit card fraud” is a wide ranging term for crimes
involving identity theft where the criminal uses your credit card to fund his
transactions. Credit card fraud is identity theft in its simplest form.
18
TYPES OF CYBER CRIMES
8. Salami slicing attack: A “salami slicing attack” or “salami fraud” is a
technique by which cyber criminals steal money or resources a bit at a time so
that there‟s no noticeable difference in overall size. The perpetrator gets away
with these little pieces from a large number of resources and thus accumulates
a considerable amount over a period of time. The most classic approach is
“collect-the-roundoff” technique. Most calculations are carried out in a
particular currency are rounded off up to the nearest number about half the
time and down the rest of the time. If a programmer decides to collect these
excess fractions of rupees to a separate account, no net loss to the system
seems apparent. This is done by carefully transferring the funds into the
perpetrator‟s account. Attackers insert a program into the system to
automatically carry out the task.
19
TYPES OF CYBER CRIMES
9. Software Piracy: Software piracy is the unauthorised use and distribution
of computer software. Software developers work hard to develop these
programs, and piracy curbs their ability to generate enough revenue to sustain
application development. Thanks to the internet and torrents, you can find
almost any movie, software or song from any origin for free. Internet piracy is
an integral part of our lives which knowingly or unknowingly we all contribute
to.
The following constitutes software piracy:
1. Loading unlicensed software on your PC
2. Using single-licensed software on multiple computers
3. Using a key generator to circumvent copy protection
4. Distributing a licensed or unlicensed (“cracked”) version of software over
20
the internet and offline.
TYPES OF CYBER CRIMES
10. Others:
• Data Diddling: a method that insiders modify data by altering accounts or
database records so that it is difficult to tell that they have stolen funds or
equipment.
• Forgery: a method that a user makes Internet data appear to come from one
place when it is really coming from another.
• Blackmail
• Theft and sale of corporate data.
• Cyberextortion (demanding money to prevent a threatened attack).
• Cryptojacking (where hackers mine cryptocurrency using resources they do
not own).
• Cyberespionage (where hackers access government or company data).
21
•
In a nutshell, any offence committed using electronic means such as net
extortion, cyber bullying, child pornography and internet fraud is
termed as cyber crime.
• The internet is a huge breeding ground for pornography, which has
often been subject to censorship on grounds of obscenity.
• Child pornography is a serious offence, and can attract the harshest
punishments provided for by law
22
How to protect yourself against some cyber crimes
So, now you understand the threat cybercrime represents, what are the best
ways to protect your computer and your personal data? Here are top tips:
• Keep software and operating system updated: this ensures that you
benefit from the latest security patches to protect your computer.
• Use anti-virus software and keep it updated: Using anti-virus or a
comprehensive internet security solution is a smart way to protect your
system from attacks. Anti-virus software allows you to scan, detect and
remove threats before they become a problem. If you use anti-virus
software, make sure you keep it updated to get the best level of protection.
• Use strong passwords: Be sure to use strong passwords that people will
not guess and do not record them anywhere. Or use a reputable password
manager to generate strong passwords randomly to make this easier.
23
•
•
•
•
Never open attachments in spam emails: A classic way that computers
get infected by malware attacks and other forms of cybercrime is via email
attachments in spam emails. Never open an attachment from a sender you
do not know.
Do not click on links in spam emails or untrusted websites: Another
way people become victims of cyber crime is by clicking on links in spam
emails or other messages, or unfamiliar websites. Avoid doing this to stay
safe online.
Do not give out personal information unless secure: Never give out
personal data over the phone or via email unless you are completely sure
the line or email is secure.
Contact companies directly about suspicious requests: If you get
asked for data from a company who has called you, hang up. Call them
back using the number on their official website to ensure you are speaking
24
to them and not a cybercriminal.
•
Be mindful of the website URLs you visit: Keep an eye on the URLs you
are clicking on. Do they look legitimate? Avoid clicking on links with
unfamiliar or spammy looking URLs.
•
Keep an eye on your bank statements: Keep an eye on your bank
statements and query any unfamiliar transactions with the bank. The bank
can investigate whether they are fraudulent.
25
Guidelines to Minimize the Invasion of Privacy
• Browse anonymously by surfing from www.anonymizer.com
• Disable cookies on your Web browser
• Use a free e-mail address to place on Web pages, mailing lists, chat rooms,
or other public Internet spaces.
• Do not fill out site registration forms unless you see a privacy statement
indicating that the information gathered will not be sold to 3rd parties.
26
Forms of Attackers
• Hackers, Crackers (Black hats), Cybergangs, Virus Authors, Ethical Hackers
(White Hats).
• Swindlers: a person who cheat you by means of deception or fraud.
• Shills
• Cyberstalkers and Sexual Predators
27
Download