Chapter 5 crime
This presentation is the property of its rightful owner.
Sponsored Links
1 / 28

Chapter 5: Crime PowerPoint PPT Presentation


  • 132 Views
  • Uploaded on
  • Presentation posted in: General

Chapter 5: Crime. See Dilbert cartoons about crime: http://dilbert.com/strips/comic/2009-09-18/ http://dilbert.com/strips/comic/2009-05-12/. Announcements. Video scene assignment is posted

Download Presentation

Chapter 5: Crime

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -

Presentation Transcript


Chapter 5 crime

Chapter 5: Crime

See Dilbert cartoons about crime:

http://dilbert.com/strips/comic/2009-09-18/

http://dilbert.com/strips/comic/2009-05-12/


Announcements

Announcements

Video scene assignment is posted

Tutorial on iMovie and Final Cut Pro will be held a week from today (March 31) at 4:15 in Avery Microcomputer Lab

  • More info and sign-up sheet on Tuesday

    Midterm exam grades posted on Monday (will be curved)


Reading quiz on ch 5

Reading Quiz on Ch. 5

Covers 5.1, 5.2.1,5.2.3, 5.3, 5.5, 5.6

Please put all materials away except for cheat sheet.


Quiz question 1

Quiz Question 1

A hacker can be described as

a programmer who writes clever or elegant code

someone who breaks into computers without authorization

someone who modifies web sites to make a political statement

All of the above

None of the above


Quiz question 1 answer

Quiz Question 1 Answer

D. All of the above

All of these versions of a “hacker” can be found in Section 5.2.1 (pp. 253-260).


Quiz question 2

Quiz Question 2

In this attack, hundreds of thousands of requests for Web pages and other information are issued to a single Web site:

Zombie attack

Love Bug attack

Denial-of-service attack

None of the above


Quiz question 2 answer

Quiz Question 2 Answer

C.

See p. 260.


Quiz question 3

Quiz Question 3

The Computer Fraud and Abuse Act (CFAA) of 1986

applies to activities performed on computers connected to the internet

applies to activities performed on private computers not connected to the internet

applies to computers in foreign countries

None of the above

All of the above


Quiz question 3 answer

Quiz Question 3 Answer

A.

See p. 265

What does the CFAA address?


Quiz question 4 extra credit

Quiz Question 4 (Extra Credit)

Writing computer code that could at some point be used to generate computer viruses or hack into computers is presently illegal in the U.S.

True

False


Quiz question 4 answer

Quiz Question 4 Answer

B. False

The bottom of p. 272 makes it clear that no such law exists, and points out that such a law would make it difficult to defend against such viruses, and may conflict with the First Amendment (Free Speech), since courts have previously ruled that software is a form of speech.


Quiz question 5

Quiz Question 5

In this identity theft scheme, false IP addresses are planted in DNS tables, causing users to be unknowingly directed to fake sites:

Phishing

Pharming

Spyware

All of the above

None of the above


Quiz question 5 answer

Quiz Question 5 Answer

B. Pharming

See pp. 274-275.

What is a DNS? Is Pharming easier than Phishing?


Quiz question 6

Quiz Question 6

Biometrics are

the unique biological characteristics of a specific group of people, such as blood type or hair color

the unique biological characteristics of a specific individual, such as fingerprint, eye patterns, or DNA.

the unique measurements of an individual, such as height, weight, or arm length.

All of the above

None of the above


Quiz question 6 answer

Quiz Question 6 Answer

B.

Can biometric scanning devices be tricked? Why or why not? (Discuss with team.)


Quiz question 7

Quiz Question 7

The purpose of the so-called Cyber-Crime Treaty is to

help law enforcement agencies in different countries cooperate in the prosecution of cyber crimes.

standardize the laws against cyber crimes in different U.S. states.

toughen existing international laws against cyber crimes.

None of the above


Quiz question 7 answer

Quiz Question 7 Answer

A.

See p. 291.

What is a dual-criminality provision? What are arguments for and against such a provision?


Quiz question 8

Quiz Question 8

Providers of services and information must make sure that their material is not accessible in countries where it is illegal—this principle is known as

“authority to prevent entry”

“responsibility to prevent access”

“responsibility to regulate content”

“mandate to block access”

None of the above


Quiz question 8 answer

Quiz Question 8 Answer

B.

See p. 293

What prominent court case have we studied that assumed this principle?


Quiz question 9

Quiz Question 9

The “authority to prevent entry” principle states that

information providers must prevent their materials from being accessible in countries where the materials are illegal.

individuals are solely responsible for blocking access to materials they find personally objectionable.

governments may block access to material that is illegal in their country, but may not prosecute the providers of such material if the material is legal in the country in which it is produced.

None of the above


Quiz question 9 answer

Quiz Question 9 Answer

C.

See p. 299

Do you think“responsibility to block access” or “authority to prevent entry” is a better policy? Why?


Question 10

Question 10

Whereas Ch. 5 of the book focuses mainly on , Mike Gaffney’s guest lecture focused mainly on.

Cybercrime, Computer-Aided Dispatch

Cybercrime, Crime detection

Cybercrime, Crime prevention

Cybercrime, Use of technology to identify, investigate and prosecute crimes

None of the above


Quiz question 10 answer

Quiz Question 10 Answer

C.

(I hope anyone who was here on Tuesday got this right. )


Update use of lab files showed more than 100 baseball players used steroids

Update: Use of Lab Files Showed More than 100 Baseball Players Used Steroids

On p. 289, the book mentions a well-known case involving the potential release of information on players who, according to lab files, used steroids

The original search warrant was for 10 specific players, yet the law enforcement agents wanted to release info on 100 players who used steroids.

How was the case settled? Let’s look:

http://www.latimes.com/sports/la-sp-balco-ballplayers-20100914,0,1279725.story


Discussion exercise use of car vs computer clicker

Discussion Exercise: Use of Car vs. Computer (Clicker)

5.8, p. 300: A friend logs on to your computer at night while you are asleep and uses some of your software. Another friend takes your car at night and drives it around for a while. (Neither has your permission; neither does damage.) List characteristics (ethics, legality, risks) of the two events that are similar and different. Which would offend you more?

A: A friend using your computer software

B: A friend driving your car

C: Both would offend me equally

D: Neither would offend me


Discussion exercise stance with respect to break ins clicker

Discussion Exercise:Stance with Respect to Break-Ins (Clicker)

Ex. 5.9, p. 300: Young, technically-oriented hackers have argued that, if owners of a computer system want to keep outsiders out, it is their responsibility to provide better security. Ken Thompson, one of the inventors of UNIX, said, “The act of breaking into a computer system has to have the same social stigma as breaking into a neighbor’s house. It should not matter that the neighbor’s door is unlocked.” Which position do you agree with more? Why?

A: Young hackers’ position

B: Ken Thompson’s position

C: Neither

D: Not sure


Discussion exercise surveillance software to monitor the web clicker

Discussion Exercise:Surveillance Software to Monitor the Web (Clicker)

Ex. 5.22, p. 301: Commenting on constitutional objections to the SEC’s plan to use surveillance software to monitor the Web for possible fraud (Section 5.5.1), an SEC offical said “the Consitution doesn’t give people the right to use the Internet to commit fraud.” Evaluate this response. Is it a good argument?

A: Yes

B: No

C: Not sure


Discussion exercise computer virus a crime clicker

Discussion Exercise:Computer Virus a Crime? (Clicker)

Ex. 5.15, p. 300: Evaluate arguments in favor of and against passage of a law making the writing and publication of a computer virus a crime. (See Section 5.2.4.) Would you support such a law? Why?

A: Yes, I would support such a law

B: No, I wouldn’t support such a law

C: I’m not sure


  • Login