Download
securing the electronic frontier n.
Skip this Video
Loading SlideShow in 5 Seconds..
Securing the Electronic Frontier PowerPoint Presentation
Download Presentation
Securing the Electronic Frontier

Securing the Electronic Frontier

143 Views Download Presentation
Download Presentation

Securing the Electronic Frontier

- - - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript

  1. Securing the Electronic Frontier Ch. 6 Reading: pp. 191-6; 198-201; 218-9 CS 340

  2. The Net • Challenging the sale of virus do-it-yourself kits • Only illegal to release a virus • Computer Fraud and Abuse Act • P. 192, Internet’s fragile infrastructure: susceptible to • Phishing attacks • Viruses (self-replicating programs) • Worms (independent programs that travel) • The Slammer worm • http://www.wired.com/wired/archive/11.07/slammer.html

  3. Defining cybercrime • Criminal acts executed using computer and network technologies • Software piracy: unauthorized duplication • Computer sabotage: interference with computer systems • Viruses and worms • DoS attacks: mock requests to take down server • Electronic break-ins: • Computer espionage • trespass

  4. Electronic break-ins • Trespass in cyberspace • Computer Fraud and Abuse Act, p. 199 • Protects the confidentiality and makes it a crime to access a computer w/o authorization • Now applies to most any computer • http://en.wikipedia.org/wiki/Computer_Fraud_and_Abuse_Act • Max penalty: 20 yrs & $250k fine Computer Fraud and Abuse Act • 18 USC Section 1030 criminalizes: • Transmitting code (virus, worm) that damages a sys • Accessing w/o authorization any computer connected to Internet (n.b. does not req anything to be examined, changed or copied) • Transmitting classified info • Trafficking passwords • Computer fraud & extortion

  5. Interference w/ systems: Trespass to chattels? • Another successful claims of trespass to chattels: • Ebay v. Bidder’s Edge, p. 204, case study pp.218-9

  6. Hacktivism • Blend of hack and activism • Malicious hacking for electronic political activism • Non-violent use of digital tools for political ends • Typical actions, examples: • Defacing websites • Denial of service attacks • Electronic Civil Disobedience (virtual sit-ins)