• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/64

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

64 Cards in this Set

  • Front
  • Back
A civilization based on agriculture and handwork

Relatively primitive stage

Lasted thousands of years

Luddites opposed technology
first wave
The Industrial Revolution

Began at the end of the 18th century and lasted about 150 years
second wave
The Information Age

Information becomes the currency
third wave
Necessary skill in today’s world

May be the difference between being employed or unemployed

Many different jobs involve the use of computers
computer literacy
Major ethical challenge

New class system of power

The gap in the United States is shrinking

Widening gap between developed and developing countries
digital divide
Broad range of issues and standards of conduct pertaining to the use of information systems
computer ethics
Most ethical debates relate to what 4 things?
1. Information privacy
2. Information accuracy
3. Information property
4. Information accessibility
In the new class system of power, power comes from?
knowledge
What information should you have to reveal?
information privacy
3 Types of Information you might want to keep private?
1. Social security number
2. Medical history
3. Family history
Fastest growing “information” crime

Biometrics for better protection

Results in bad credit for victim
identity theft
3 Things that should be included in Privacy Policy?
1. What information is being gathered about you
2. How the seller will use this information
3. Whether and how you can “opt out” of these practices
4 Additional Tips to Maintain your Privacy Online?
1. Choose Web sites monitored by independent organizations
2. Avoid having cookies left on your machine
3. Visit sites anonymously
4. Use caution when requesting confirmation e-mail
Ensuring of the authenticity and fidelity of information

High costs of incorrect information

Difficult to track down the person who made the mistake
information accuracy
Who owns information about individuals?

How can this information be sold and exchanged?
information property
Unsolicited e-mail

CAN-SPAM Act of 2003

Little protection available
spam
Company maintaining the database with customer information legally owns it

Is free to sell it

Cannot sell information it agreed not to share

Must insure proper data handling practices
data privacy statement
Text file storing Web browsing activity

Can opt for cookies not to be stored

Web sites might not function properly without cookies
cookies
Software used for data collection without the users’ knowledge

Unlikely this activity will become illegal anytime soon
spyware
Inheritance pattern for sphingolipidoses- ?

EXCEPT- ?
AR

EXCEPT Fabrys = x-linked
Fines as high as $100,000

Some companies pay the cybersquatters to speed up the process of getting the domain
Anti-Cybersquatting Consumer Protection Act in 1999
Technology solution to control digital content
digital rights management
Electronic version of physical watermarks
digital watermarking
Who has the right to monitor the information?

Example: e-mail capture by Carnivore
information accessibility
Developed by the government to monitor all cyber communication
Carnivore
Stronger support for voice mail than for e-mail communication

No other federal or state laws protect e-mail privacy

Companies should be prudent and open about their monitoring of e-mail messages and Internet usage

Employees should use e-mail only as appropriate
Electronic Communications Privacy Act
8 Practices that responsible computer use (based on work of the Computer Ethics Institute) prohibits?
1. Using a computer to harm others
2. Interfering with other people’s computer work
3. Snooping in other people’s files
4. Using a computer to steal
5. Using a computer to bear false witness
6. Copying or using proprietary software without paying for it
7. Using other people’s computer resources without authorization
8. Appropriating other people’s intellectual output
Using a computer to commit an illegal act

Targeting a computer - unauthorized access

Using a computer to commit an offense

Using a computer to support a criminal activity
computer crime
Overall trend of computer crime is?
declining
Using computer systems with no authority to gain such access
unauthorized computer access
Frequency of successful attacks in unauthorized computer access is?
declining
Stealing or compromising data

Gaining access to computers owned by the U.S. government

Violating data belonging to financial institutions

Intercepting communication between foreign countries

Threatening to damage computer systems in order to extort money
Computer Fraud and Abuse Act of 1986
Breaking into any electronic communication service is a crime
Electronic Communications Privacy Act of 1986
Controversial law

Investigators may monitor voice communication
USA PATRIOT Act of 2002
Use of formal investigative techniques to evaluate digital information

Honeypots used to entice and catch hackers and crackers
computer forensics
Example is DarkMarket
honeypot
Individuals gaining unauthorized access

Motivated by curiosity

No intentions to do harm
hackers
Break into computers with the intention of doing harm
crackers
Break into computer systems to promote political or ideological goals
hacktivists
Four groups of computer criminals?
1. Current or former employees
2. People with technical knowledge committing crimes for personal gain
3. Career criminals using computers to assist them in crimes
4. Outside crackers hoping to find information of value
Making one backup copy for personal use

Sharing free software (shareware or public domain software)
Legal Activities of Software Piracy
Making copies of purchased software for others

Offering stolen proprietary software (warez peddling)
Illegal Activities of Software Piracy
Patents: process or machine inventions

Copyrights: creations of the mind

Various copyright laws applicable to software
Intellectual Property
3 Factors influencing piracy around the world?
1. Concept of intellectual property differs between countries
2. Economic reasons for piracy
3. Lack of public awareness about the issue
Thousands of new forms released each month

Viruses
Malware
Reproduce themselves

Usually delete or destroy files
viruses
Does not destroy files

Designed to copy and send itself

Brings computers down by clogging memory
worm
Does not copy itself

Often remains hidden to the user

Performs functions such as establishing user accounts
trojan horse
Variations of Trojan horse

Do not disrupt computer function until triggering event/operation
logic bombs and time bombs
Collection of zombie computers, often used for spam, phishing, or denial of service attacks
Botnet
A typical cyberattack supply chain consists of what 6 players?
1. Programmer
2. Phisher
3. Cracker
4. Bot Herder
5. Collector
6. Mule herder
False messages circulated online

New viruses (that don’t exist)

Collection of funds for certain group

Possible consequences
Internet Hoaxes
Crime that broadly refers to the use of a computer to communicate
cyber harassment
Making false accusations that damage reputation

Gaining information on a victim by monitoring online activates

Using the Internet to encouraging other to harass a victim

Attacking data and equipment of a victim

Using the Internet to place false goods or orders
cyber stalking
The deliberate cause of emotional distress to a victim
cyber bullying
Typically target vulnerable population for sexual or financial purposes

Social networking sites have become playground

Most social networking and chat sites provide ways to report abuse
online predator
Military’s attempt to disrupt or destroy another country’s information and communication systems

Goal is to diminish opponent’s communication capabilities

Used in concert with traditional methods
cyberwar
independent citizens that attack perceived enemies of the state
Patriot Hackers
In 2006 the U.S. Air Force launched?
Cyber Command
Governments not involved

Can be launched from anywhere in the world

Goal is to cause fear, panic, and destruction

Will likely become weapon of choice
cyberterrorism
Popular target for hackers and crackers

60-90 attempts a day

Some successful attacks
The U.S. Department of Defense
3 Obstacles to Cyberterrorism?
1. Computer systems are complex and attacks may not have desired outcome
2. Fast-changing security measures
3. Cyberattacks rarely cause physical harm to victims
Increasing dependence on technology

Increasing possibilities of cyberterrorism

International laws and treaties must evolve

However: likelihood of large attacks is small
The Globalization of Terrorism
3 Required Components of successful large terrorist attack?
1. Intelligence information
2. Years of preparation
3. At least $200 million