Phishing: To gain money, send emails that trick the user. Phishing and the web: email directing to look-a-like site Phreaking: misusing telecommunication. Started by John Draper(captain crunch)/ Phone+freak Early 1970s he taught 2 phreaking wannabe his skills Pharming: mistyping website address or hacker redirecting to their fake web. Pharmer then tries to gain your info when you type into the fake site. Phishing and Pharming are mostly “Social Engineering” When hackers get involved things get trickier. Hacking is finding technical weaknesses in a computer system, computer network, or software program and exploiting or misusing it. Hacker: someone who hacks and has an advanced understanding of computers and its networks. They are motivated by profit, protest, or challenge. Different Wares: Wares: are manufactured articles of a specified type. In computing there are: - Hardware Software Malware Types of Malware: - Viruses Trojans Worms Spyware Ransomware Network Malware: Botnet infections? Cyber battles: The (in)famous stuxnet virus? Rules for cyberwar set out in Nato manual Spyware: No tech hacking: Shoulder surfing Spyware: hardware or software collects various types of personal info, such as internet browser histories, email, contacts and passwords. It can also control your computer in other ways, such as installing additional software and redirecting your browser to different sites. Spyware could be in USB. “Big brother is watching you”. Edward Snowden revealed US(NSA) and Britain’s future plan of surveillance. Anti-privacy activist. Things to do to be safe with our IT tools: download a trusted anti-virus program such as McAffe, Norton Symantec, AVG. Personal Anti-Malware action plan: Use antivirus software, update and scan frequently, use strong password(important). Strong password: has at least 15 characters, uppercase and lowercase letters, numbers, and symbols. Are all hackers bad people? “black vs. white hat” At age 12, Kevin Mitnick used social engineering to bypass the paper ticket system used in the LA bus system. Social engineering became his primary method of obtaining info like usernames, passwords and modem phone numbers. He was sent to 5 five years in prison because according to Mitnick the law enforcement officials were convinced he had the ability to “start a nuclear war by whistling into a pay phone”. He now runs Mitnick security consulting, a computer security company. Hacktivism: Hacker+ Activism, in the use of computers and its networks as a means to protest to promote social or political ends. Anonymous: internet meme that originated in 2003 in 4chan representing the concept of many online and offline community users simultaneously existing as an anarchic digitized global brain. The people’s identity are not known. Anonymous came from Guy Fawkes. In 1605 13 young men planned to blow up the houses of parliament with barrels of gunpowder among them was Guy Fawkes, Britain’s most notorious traitor. He was caught tortured and executed. Privacy, copy right and ethics: Global average privacy rate for PC software hovers at 42%. User who say they pirate the most and largely male and young. Ethics: Moral code, values, rights and wrongs, ideals, standards of behavior, virtues, and dictates of conscience. Computer ethics: “piracy kills music” Church of Kopimism was founded by 19 year old philosophy student Isak Gerson. Member are file sharers who believe that copying info is a sacred virtue. Based in Sweden, it has been officially recognized by the Swedish government as a religious community. Computer Ethics: copy right, piracy, theft, plagiarism, personal conduct. Computer Hardware: Computers started in 1940s and 1950s, they evolved slowly and were based on earlier older technologies. The first computers were huge and we spoke with them using typewriters called Terminals. These were connected directly to the big computer or In 60s, 70s, 80s you could “dial in” using a Modem. QWERTY keyboard QWERTY key mapping: very early keyboards used a simple alphabetic layout: A, B, C.… Very soon though people could type faster than the machines could handle so they arranged it as QWERTY to force you to type more slowly so that the machines would not jam. QWERTY was designed with the most common letters spread far apart and on both sides to prevent frequent jams in the typewriter. Famous case of open standards because it is widespread. QWERTY example of the network effect(tied with the number of people who own or use it). Network effect: the more people using something makes it more valuable to everyone. Anti-network effect: the fewer people using something makes it less valuable. Ecosystem Chips are made of sand CPU(central processing unit) also called “processor” “processing unit” Multicore CPU: if increasing the size or speed more in a single core CPU it will consume more power and generate more heat and ect. New strategy of silicon valley is lots of little processors instead of one big one. 1 Hertz: 1 cycle per second Core: brain of the CPU Memory Binary numbers: Bit= Binary digIT, 1 byte= 8 bits ASCII: characters(letters) to binary 2 Types of memories: - Short term memory: RAM Long term or non-volatile storage: Hard disk drives, USB also called flash or NAND memory Disk fragmentation Defragmentation puts files back together RAM: nanoseconds, flash: microseconds, hard disks: milliseconds Peripheral: external devices connected to computer