cpts 401, spring2011 3/24/11 chapter 5: crime see dilbert cartoons about crime:

28
CptS 401, Spring2011 3/24/11 Chapter 5: Crime See Dilbert cartoons about crime: http://dilbert.com/strips/comic/2 009-09-18/ http://dilbert.com/strips/comic/2 009-05-12/ 1

Upload: terence-parsons

Post on 18-Dec-2015

217 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: CptS 401, Spring2011 3/24/11 Chapter 5: Crime See Dilbert cartoons about crime:

CptS 401, Spring2011 3/24/11

Chapter 5: Crime

See Dilbert cartoons about crime:http://dilbert.com/strips/comic/2009-09-18/

http://dilbert.com/strips/comic/2009-05-12/

1

Page 2: CptS 401, Spring2011 3/24/11 Chapter 5: Crime See Dilbert cartoons about crime:

CptS 401, Spring2011 3/24/11

Announcements

• Video scene assignment is posted• Tutorial on iMovie and Final Cut Pro will be

held a week from today (March 31) at 4:15 in Avery Microcomputer Lab– More info and sign-up sheet on Tuesday

• Midterm exam grades posted on Monday (will be curved)

2

Page 3: CptS 401, Spring2011 3/24/11 Chapter 5: Crime See Dilbert cartoons about crime:

CptS 401, Spring2011 3/24/11

Reading Quiz on Ch. 5

• Covers 5.1, 5.2.1,5.2.3, 5.3, 5.5, 5.6• Please put all materials away except for cheat

sheet.

3

Page 4: CptS 401, Spring2011 3/24/11 Chapter 5: Crime See Dilbert cartoons about crime:

CptS 401, Spring2011 3/24/11

Quiz Question 1

A hacker can be described asA. a programmer who writes clever or elegant

codeB. someone who breaks into computers without

authorizationC. someone who modifies web sites to make a

political statementD. All of the aboveE. None of the above

4

Page 5: CptS 401, Spring2011 3/24/11 Chapter 5: Crime See Dilbert cartoons about crime:

CptS 401, Spring2011 3/24/11

Quiz Question 1 Answer

D. All of the above

All of these versions of a “hacker” can be found in Section 5.2.1 (pp. 253-260).

5

Page 6: CptS 401, Spring2011 3/24/11 Chapter 5: Crime See Dilbert cartoons about crime:

CptS 401, Spring2011 3/24/11

Quiz Question 2

In this attack, hundreds of thousands of requests for Web pages and other information are issued to a single Web site:A. Zombie attackB. Love Bug attackC. Denial-of-service attackD. None of the above

6

Page 7: CptS 401, Spring2011 3/24/11 Chapter 5: Crime See Dilbert cartoons about crime:

CptS 401, Spring2011 3/24/11

Quiz Question 2 Answer

C.

See p. 260.

7

Page 8: CptS 401, Spring2011 3/24/11 Chapter 5: Crime See Dilbert cartoons about crime:

CptS 401, Spring2011 3/24/11

Quiz Question 3

The Computer Fraud and Abuse Act (CFAA) of 1986A. applies to activities performed on computers

connected to the internetB. applies to activities performed on private

computers not connected to the internetC. applies to computers in foreign countriesD. None of the aboveE. All of the above

8

Page 9: CptS 401, Spring2011 3/24/11 Chapter 5: Crime See Dilbert cartoons about crime:

CptS 401, Spring2011 3/24/11

Quiz Question 3 Answer

A.

See p. 265

What does the CFAA address?

9

Page 10: CptS 401, Spring2011 3/24/11 Chapter 5: Crime See Dilbert cartoons about crime:

CptS 401, Spring2011 3/24/11

Quiz Question 4 (Extra Credit)

Writing computer code that could at some point be used to generate computer viruses or hack into computers is presently illegal in the U.S.A. TrueB. False

10

Page 11: CptS 401, Spring2011 3/24/11 Chapter 5: Crime See Dilbert cartoons about crime:

CptS 401, Spring2011 3/24/11

Quiz Question 4 Answer

B. False

The bottom of p. 272 makes it clear that no such law exists, and points out that such a law would make it difficult to defend against such viruses, and may conflict with the First Amendment (Free Speech), since courts have previously ruled that software is a form of speech.

11

Page 12: CptS 401, Spring2011 3/24/11 Chapter 5: Crime See Dilbert cartoons about crime:

CptS 401, Spring2011 3/24/11

Quiz Question 5

In this identity theft scheme, false IP addresses are planted in DNS tables, causing users to be unknowingly directed to fake sites:A. PhishingB. PharmingC. SpywareD. All of the aboveE. None of the above

12

Page 13: CptS 401, Spring2011 3/24/11 Chapter 5: Crime See Dilbert cartoons about crime:

CptS 401, Spring2011 3/24/11

Quiz Question 5 Answer

B. Pharming

See pp. 274-275.

What is a DNS? Is Pharming easier than Phishing?

13

Page 14: CptS 401, Spring2011 3/24/11 Chapter 5: Crime See Dilbert cartoons about crime:

CptS 401, Spring2011 3/24/11

Quiz Question 6

Biometrics areA. the unique biological characteristics of a specific

group of people, such as blood type or hair colorB. the unique biological characteristics of a specific

individual, such as fingerprint, eye patterns, or DNA.C. the unique measurements of an individual, such as

height, weight, or arm length.D. All of the aboveE. None of the above

14

Page 15: CptS 401, Spring2011 3/24/11 Chapter 5: Crime See Dilbert cartoons about crime:

CptS 401, Spring2011 3/24/11

Quiz Question 6 Answer

B.

Can biometric scanning devices be tricked? Why or why not? (Discuss with team.)

15

Page 16: CptS 401, Spring2011 3/24/11 Chapter 5: Crime See Dilbert cartoons about crime:

CptS 401, Spring2011 3/24/11

Quiz Question 7

The purpose of the so-called Cyber-Crime Treaty is toA. help law enforcement agencies in different

countries cooperate in the prosecution of cyber crimes.

B. standardize the laws against cyber crimes in different U.S. states.

C. toughen existing international laws against cyber crimes.

D. None of the above

16

Page 17: CptS 401, Spring2011 3/24/11 Chapter 5: Crime See Dilbert cartoons about crime:

CptS 401, Spring2011 3/24/11

Quiz Question 7 Answer

A.

See p. 291.

What is a dual-criminality provision? What are arguments for and against such a provision?

17

Page 18: CptS 401, Spring2011 3/24/11 Chapter 5: Crime See Dilbert cartoons about crime:

CptS 401, Spring2011 3/24/11

Quiz Question 8

Providers of services and information must make sure that their material is not accessible in countries where it is illegal—this principle is known asA. “authority to prevent entry”B. “responsibility to prevent access”C. “responsibility to regulate content”D. “mandate to block access”E. None of the above

18

Page 19: CptS 401, Spring2011 3/24/11 Chapter 5: Crime See Dilbert cartoons about crime:

CptS 401, Spring2011 3/24/11

Quiz Question 8 Answer

B.

See p. 293

What prominent court case have we studied that assumed this principle?

19

Page 20: CptS 401, Spring2011 3/24/11 Chapter 5: Crime See Dilbert cartoons about crime:

CptS 401, Spring2011 3/24/11

Quiz Question 9

The “authority to prevent entry” principle states thatA. information providers must prevent their materials from

being accessible in countries where the materials are illegal.

B. individuals are solely responsible for blocking access to materials they find personally objectionable.

C. governments may block access to material that is illegal in their country, but may not prosecute the providers of such material if the material is legal in the country in which it is produced.

D. None of the above

20

Page 21: CptS 401, Spring2011 3/24/11 Chapter 5: Crime See Dilbert cartoons about crime:

CptS 401, Spring2011 3/24/11

Quiz Question 9 Answer

C.

See p. 299

Do you think“responsibility to block access” or “authority to prevent entry” is a better policy? Why?

21

Page 22: CptS 401, Spring2011 3/24/11 Chapter 5: Crime See Dilbert cartoons about crime:

CptS 401, Spring2011 3/24/11

Question 10

Whereas Ch. 5 of the book focuses mainly on , Mike Gaffney’s guest lecture focused

mainly on .A. Cybercrime, Computer-Aided DispatchB. Cybercrime, Crime detectionC. Cybercrime, Crime preventionD. Cybercrime, Use of technology to identify,

investigate and prosecute crimesE. None of the above

22

Page 23: CptS 401, Spring2011 3/24/11 Chapter 5: Crime See Dilbert cartoons about crime:

CptS 401, Spring2011 3/24/11

Quiz Question 10 Answer

C.

(I hope anyone who was here on Tuesday got this right. )

23

Page 24: CptS 401, Spring2011 3/24/11 Chapter 5: Crime See Dilbert cartoons about crime:

CptS 401, Spring2011 3/24/11

Update: Use of Lab Files Showed More than 100 Baseball Players Used Steroids

• On p. 289, the book mentions a well-known case involving the potential release of information on players who, according to lab files, used steroids

• The original search warrant was for 10 specific players, yet the law enforcement agents wanted to release info on 100 players who used steroids.

• How was the case settled? Let’s look:http://www.latimes.com/sports/la-sp-balco-ballplayers-20100914,0,1279725.story

24

Page 25: CptS 401, Spring2011 3/24/11 Chapter 5: Crime See Dilbert cartoons about crime:

CptS 401, Spring2011 3/24/11

Discussion Exercise: Use of Car vs. Computer (Clicker)

5.8, p. 300: A friend logs on to your computer at night while you are asleep and uses some of your software. Another friend takes your car at night and drives it around for a while. (Neither has your permission; neither does damage.) List characteristics (ethics, legality, risks) of the two events that are similar and different. Which would offend you more?A: A friend using your computer softwareB: A friend driving your carC: Both would offend me equallyD: Neither would offend me

25

Page 26: CptS 401, Spring2011 3/24/11 Chapter 5: Crime See Dilbert cartoons about crime:

CptS 401, Spring2011 3/24/11

Discussion Exercise:Stance with Respect to Break-Ins (Clicker)

Ex. 5.9, p. 300: Young, technically-oriented hackers have argued that, if owners of a computer system want to keep outsiders out, it is their responsibility to provide better security. Ken Thompson, one of the inventors of UNIX, said, “The act of breaking into a computer system has to have the same social stigma as breaking into a neighbor’s house. It should not matter that the neighbor’s door is unlocked.” Which position do you agree with more? Why?A: Young hackers’ positionB: Ken Thompson’s positionC: NeitherD: Not sure

26

Page 27: CptS 401, Spring2011 3/24/11 Chapter 5: Crime See Dilbert cartoons about crime:

CptS 401, Spring2011 3/24/11

Discussion Exercise:Surveillance Software to Monitor the Web (Clicker)

Ex. 5.22, p. 301: Commenting on constitutional objections to the SEC’s plan to use surveillance software to monitor the Web for possible fraud (Section 5.5.1), an SEC offical said “the Consitution doesn’t give people the right to use the Internet to commit fraud.” Evaluate this response. Is it a good argument?A: YesB: NoC: Not sure

27

Page 28: CptS 401, Spring2011 3/24/11 Chapter 5: Crime See Dilbert cartoons about crime:

CptS 401, Spring2011 3/24/11

Discussion Exercise:Computer Virus a Crime? (Clicker)

Ex. 5.15, p. 300: Evaluate arguments in favor of and against passage of a law making the writing and publication of a computer virus a crime. (See Section 5.2.4.) Would you support such a law? Why?A: Yes, I would support such a lawB: No, I wouldn’t support such a lawC: I’m not sure

28