1 / 6

Securing the Electronic Frontier

Securing the Electronic Frontier. Ch. 6 Reading: pp. 191-6; 198-201; 218-9 CS 340. The Net. Challenging the sale of virus do-it-yourself kits Only illegal to release a virus Computer Fraud and Abuse Act P. 192, Internet’s fragile infrastructure: susceptible to Phishing attacks

kaleb
Download Presentation

Securing the Electronic Frontier

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Securing the Electronic Frontier Ch. 6 Reading: pp. 191-6; 198-201; 218-9 CS 340

  2. The Net • Challenging the sale of virus do-it-yourself kits • Only illegal to release a virus • Computer Fraud and Abuse Act • P. 192, Internet’s fragile infrastructure: susceptible to • Phishing attacks • Viruses (self-replicating programs) • Worms (independent programs that travel) • The Slammer worm • http://www.wired.com/wired/archive/11.07/slammer.html

  3. Defining cybercrime • Criminal acts executed using computer and network technologies • Software piracy: unauthorized duplication • Computer sabotage: interference with computer systems • Viruses and worms • DoS attacks: mock requests to take down server • Electronic break-ins: • Computer espionage • trespass

  4. Electronic break-ins • Trespass in cyberspace • Computer Fraud and Abuse Act, p. 199 • Protects the confidentiality and makes it a crime to access a computer w/o authorization • Now applies to most any computer • http://en.wikipedia.org/wiki/Computer_Fraud_and_Abuse_Act • Max penalty: 20 yrs & $250k fine Computer Fraud and Abuse Act • 18 USC Section 1030 criminalizes: • Transmitting code (virus, worm) that damages a sys • Accessing w/o authorization any computer connected to Internet (n.b. does not req anything to be examined, changed or copied) • Transmitting classified info • Trafficking passwords • Computer fraud & extortion

  5. Interference w/ systems: Trespass to chattels? • Another successful claims of trespass to chattels: • Ebay v. Bidder’s Edge, p. 204, case study pp.218-9

  6. Hacktivism • Blend of hack and activism • Malicious hacking for electronic political activism • Non-violent use of digital tools for political ends • Typical actions, examples: • Defacing websites • Denial of service attacks • Electronic Civil Disobedience (virtual sit-ins)

More Related