1 / 22

Internet Crime, Security & Your Privacy

Internet Crime, Security & Your Privacy. Rachel Sitarz Israa Bukhari Scott Abney Kenie Moses. Spring 2011. Social Internet TECH 621. Crime Trends. Top crimes: Non-deliver payment of merchandise Scams impersonating the FBI Identity theft Computer crimes Miscellaneous fraud

talasi
Download Presentation

Internet Crime, Security & Your Privacy

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Internet Crime, Security & Your Privacy Rachel Sitarz IsraaBukhari Scott Abney Kenie Moses Spring 2011 Social Internet TECH 621

  2. Crime Trends • Top crimes: • Non-deliver payment of merchandise • Scams impersonating the FBI • Identity theft • Computer crimes • Miscellaneous fraud • Advance fee fraud • Spam • Auction fraud • Credit card fraud • Overpayment fraud http://www.fbi.gov/news/stories/2011/february/internet_022411

  3. Demographics • Victims: • Male • Between 40 and 59 years old • California, Florida, Texas and New York • Perpetrators: • nearly 75 percent were men • more than half resided in California, Florida, New York, Texas, DC, or Washington state http://www.fbi.gov/news/stories/2011/february/internet_022411

  4. Scams • Telephone calls claiming victims are delinquent on payday loans • Online apartment and house rental and real estate scams used to swindle consumers out of thousands of dollars • Denial-of-service attacks on cell phones and landlines used as a ruse to access victims’ bank accounts • Fake e-mails seeking donations to disaster relief efforts after last year’s earthquake in Haiti http://www.fbi.gov/news/stories/2011/february/internet_022411

  5. Porn Defined • According to UrbanDictionary.com • 95% of the websites on the internet • Explicit descriptions, picture, and/or video of sexual acts • The reason why the family computer is always slow, Look in the job application folder in "dad's work stuff's"n you'll find a lot of it. • Sexier than sex itself • The world's most popular past time

  6. Legal Definition • All sexually oriented material intended primarily to arouse the reader, viewer, or listener • Erotic content in books, magazines, films, and recordings • Obscenity-term that applies to anything offensive to morals 

  7. History • 1980- Usenet Groups • Discussion groups/forums: millions of users • Alt.sex largest usenet; 3.3 million users by 1993 • 1990- CD ROM • Virtual Valerie • Penthouse Virtual Photoshoot • Virtual Vixens • The Interactive Adventures of Seymour Butts • Websites • 1994 Playboy launched website • 1995 Penthouse launched website • 1995 live strip tease shows • 1997 video peep shows • 1998 revenue was estimated $750 billion • By 2009 revenues increased to $4.9 billion • Over 95% of pornography online is free amateur sites, free file sharing sites, and/or porn tube sites http://www.pornographyhistory.com/

  8. Obscenity • Max Hardcore • AKA Paul Little • Male pornographic actor/producer/director • Rose to prominence in 1992 • “Testing the limit of acceptability” • Involved obscene sex acts • Women acting and dressed as 12 year olds • Lewd acts • Called his own material “vile and crazy” http://en.wikipedia.org/wiki/Max_Hardcore

  9. Obscenity continued... • 1998 charged with child pornography and distribution of obscenity • Based on the women acting under 18 years • 2002 deemed unconstitutional to portray adults as children • Led in hung jury • 2007 indicted with 5 counts of transporting obscene matter by use of an interactive computer service & 5 counts of mailing obscene matter • Will be released July 2011 http://en.wikipedia.org/wiki/Max_Hardcore

  10. Porn At Work • 20% of men admit to looking at porn at work • 13% of women look at porn at work • 37% workforce admits to looking at porn at one time or another at work • 6% of men & 5% of women said that they viewed porn unintentionally at work • 70% of all internet traffic porn occurs between 9-5 workday • % has gone up due to economic recession • Majority say they view porn at work for “the rush” http://www.3w.net/lan/internet-use-statistics.html http://healthymind.com/s-porn-stats.html

  11. How people are caught • Two major ways of being caught -Computer problems call for repair -Company net monitoring software • http://www.infoworld.com/t/applications/internet-misuse-costs-businesses-178-billion-annually-996

  12. Porn at work, not good for you, not good for business • Viewing porn at work opens company up to lawsuits, hacking, computer viruses • 1/3 companies has terminated employee due to looking at porn at work • Cost companies across U.S. BILLIONS of dollars lost due to lack of productivity • IT WILL COST YOU YOUR JOB!!! http://www.newsweek.com/2008/11/28/the-tangled-web-of-porn-in-the-office.html http://www.usatoday.com/money/workplace/2007-10-17-porn-at-work_N.htm

  13. Social Media Privacy~Your Responsibilities Introduction There are virtually thousand of social media platforms that users can actively engage in and participate online. By doing so they are essentially trusting that platform with personal information about themselves. In order to be successful in maintaining the integrity of their personal information, they must be responsible users of the services. Several studies conducted conclude that: 1) Most users are unaware of how their info is used (85%) 2) Most users don’t know how to protect their online info 3) Most users trust that their privacy is maintained 4) Most users access more than one social media platform Awad and Krishnan 2008, Gross and Acquisti 2005, White 2010, PEW Trust Report 2000, Krishnamurthy and Willis 2008)

  14. Social Media Privacy Settings~Harris Poll Taken from http://www.marketingcharts.com/direct/younger-see-more-socnet-..... …..benefit-15761/harris-social-media-privacy-settings-jan11gif/

  15. Steps in Safeguarding Your Privacy Anti-Virus Software 2) Beware Of Phishing Setup Safeguards 4) Don’t Chat With Strangers Wipe Clean 6) Clear Private Data 7) Log Off Facebook Privacy Settings~4 Simple Steps On the Facebook homepage click Account (pull-down at top right) Select Privacy Settings (a menu choice) Select Customize Settings (click link) Choose one of the following: a) Everyone b) Friends of Friends c) Friends Only

  16. 26% 23% FB users don’t know about FB privacy controls or care how to use them Parents posted photos & info about their kids 7% 5% Users access 3rd party applications while on Facebook Have listed their full addresses

  17. Third party Application Programming Interfaces (API’s) “HMM, TO GET SUPERPOKE, I HAVE TO INSTALL “SUPERPOKE EXTREME” “OH COOL, SOMEONE POKED ME” “TO INSTALL SUPERPOKE EXTREME, YOU MUST ALLOW ACCESS TO SOME OF YOUR INFO…” “WHAT THE??? DISPLAY ALL INTERNET ACTIVITY, PUBLISH ALL MY PASSWORDS, SHOW ALL INTERNET BANKING, DISPLAY ALL MEDICAL RECORDS AND LIST MY MEDICATIONS?” “DAMN, I’D REALLY LIKE TO SEE THAT POKE!” “THIS IS PRIVACY OUTRAGE!!” “OK, INSTALL SUPERPOKE EXTREME” CLICK

  18. Third party Application Programming Interfaces (API’s) An application programming interface (API) is a particular set of rules and specifications that a software program can follow to access and make use of the services and resources provided by another particular software program that implements that API. It serves as an interface between different software programs and facilitates their interaction, similar to the way the user interface facilitates interaction between humans and computers. (http://en.wikipedia.org/wiki/API/ accessed 4/11/11) Popular Examples Include: Java, DirectX, Carbon & Cocoa for Macintosh, GroupTweet, Farmville, Like/ Dislike, StumbleUpon, Ghacks, Voyage

  19. Third party Application Programming Interfaces (API’s) Main Idea: Third party apps and services can improve the core service significantly. Users do need to make sure on the other hand that they check the permissions and authorizations regularly, to block apps and services that they no longer use. This reduces the risk of information theft, account tampering and of other malicious activities significantly WARNING DISCLAIMER!!! Third party services can only access your data only if it is authorized by the user. There exists dangers regardless if maximum security efforts are exercised. Once access has been granted developers could sell their product to another company or their service could be hacked or high-jacked and there is the possibility that you authorize malicious services or tools unknowingly.

  20. Social Media Privacy~Your Responsibilities A BRIEF STATMENT Using social media is a choice, and like with any choice come benefits and drawbacks. Users can greatly reduce their drawbacks by being conscientious and responsible users when using social media. Simple immediate steps can be the difference between being hacked or even hacked to pieces…… (just kidding) • Research applications before adding them to existing social media • Check the privacy settings on ALL social media being used • Never give out private information unless you trust the source Remember: The only tried and true solution to social network privacy and security issues is to limit your presence altogether. Don't post anything you wouldn't mind telling a complete stranger, because in reality that's the potential for access. - Brendan Collins

  21. Questions

  22. References 1) http://www.fastcompany.com/articles/2008/10/social-networking-security.html?page=0%2C1 2) http://thetechjournal.com/internet/social-community/people-use-facebook-44-and-twitter-29-for-social-sharing.xhtml 3) http://en.wikipedia.org/wiki/API 4) http://en.wikipedia.org/wiki/Facebook_Platform 5) http://www.marketingcharts.com/direct/younger-see-more-socnet-benefit-15761/harris-social-media-privacy-settings-jan11gif/ 6) http://socialmediagraphics.posterous.com/internet-privacy 7) http://www.adrants.com/2010/05/data-advertising-privacy-key.php 8) http://www.squidoo.com/howtousefacebook 9) http://www.technewsworld.com/story/69158.html 10) http://www.3w.net/lan/internet-use-statistics.html 11) http://healthymind.com/s-porn-stats.html 12) http://www.infoworld.com/t/applications/internet-misuse-costs-businesses-178-billion-annually-996 13) http://www.newsweek.com/2008/11/28/the-tangled-web-of-porn-in-the-office.html 14) http://www.usatoday.com/money/workplace/2007-10-17-porn-at-work_N.htm 15) http://www.fbi.gov/news/stories/2011/february/internet_02241 16) http://www.pornographyhistory.com/ 17) http://en.wikipedia.org/wiki/Max_Hardcore

More Related