cyber stalking, fraud, abuse csce 201. reading required: chapter 3 from textbook interesting: ...
TRANSCRIPT
![Page 1: Cyber Stalking, Fraud, Abuse CSCE 201. Reading Required: Chapter 3 from textbook Interesting: Dwyer, Hiltz, Passerini, Trust and privacy concern within](https://reader034.vdocuments.mx/reader034/viewer/2022042822/56649f2b5503460f94c4661d/html5/thumbnails/1.jpg)
Cyber Stalking, Fraud, Abuse
CSCE 201
![Page 2: Cyber Stalking, Fraud, Abuse CSCE 201. Reading Required: Chapter 3 from textbook Interesting: Dwyer, Hiltz, Passerini, Trust and privacy concern within](https://reader034.vdocuments.mx/reader034/viewer/2022042822/56649f2b5503460f94c4661d/html5/thumbnails/2.jpg)
Reading
Required: Chapter 3 from textbook
Interesting: Dwyer, Hiltz, Passerini, Trust and privacy concern
within social networking sites: A comparison of Facebook and MySpace, http://csis.pace.edu/~dwyer/research/DwyerAMCIS2007.pdf
![Page 3: Cyber Stalking, Fraud, Abuse CSCE 201. Reading Required: Chapter 3 from textbook Interesting: Dwyer, Hiltz, Passerini, Trust and privacy concern within](https://reader034.vdocuments.mx/reader034/viewer/2022042822/56649f2b5503460f94c4661d/html5/thumbnails/3.jpg)
Internet Safety
Technical vulnerabilities Software, hardware, applications Assurance Usability
Non-technical vulnerabilities Fraud Scam Social engineering Stalking
![Page 4: Cyber Stalking, Fraud, Abuse CSCE 201. Reading Required: Chapter 3 from textbook Interesting: Dwyer, Hiltz, Passerini, Trust and privacy concern within](https://reader034.vdocuments.mx/reader034/viewer/2022042822/56649f2b5503460f94c4661d/html5/thumbnails/4.jpg)
Why Internet Fraud?
![Page 5: Cyber Stalking, Fraud, Abuse CSCE 201. Reading Required: Chapter 3 from textbook Interesting: Dwyer, Hiltz, Passerini, Trust and privacy concern within](https://reader034.vdocuments.mx/reader034/viewer/2022042822/56649f2b5503460f94c4661d/html5/thumbnails/5.jpg)
How Internet Fraud Works?
Investment offers Email News letter
Common Schemes Outrageous sum of money Asks for small amount to be invested
Check US Secret Service bulletin, http://www.sec.gov/investor/alerts
Why would a stranger trust and reward you?
![Page 6: Cyber Stalking, Fraud, Abuse CSCE 201. Reading Required: Chapter 3 from textbook Interesting: Dwyer, Hiltz, Passerini, Trust and privacy concern within](https://reader034.vdocuments.mx/reader034/viewer/2022042822/56649f2b5503460f94c4661d/html5/thumbnails/6.jpg)
FROM THE OFFICE OF MR.MOHAMMED BELLO.CHIEF ACCOUNTANT NIGERIA NATIONAL PETROLEUM CORPORATION (NNPC),FEDERAL SECRETARIAT IKOYI, LAGOS-NIGERIA REQUEST FOR URGENT CONFIDENTIAL BUSINESS RELATIONSHIP
Dear Sir/Madam.
I,on behalf of my other colleagues from different federal government of Nigeria owned parastatals decided to solicit your assistance as regards transfer on the above-mentioned amount into your account . This fund arose from over-invoicing of various contract awarded in our parastatals to certain foreign contractors sometime ago.We as holders of sensitive positive positions in our various parastatals were mandated by the federal government to scrutinize all payments made to certain foreign contractors and we discovered that some of the contracts they executed were grossly over-invoiced either by omission or commission.
Also we discovered that the sum of us$33.5M [thirty three million five hundred thousand U.S. Dollars only] was lying in a suspense account, although the foreign contractors were fully paid their contract entitlement after the execution the said contracts.…
We are therefore, soliciting your assistance so that the remaining amount of U.S.$28.5M Can be speedily processed and fully remitted into your
nominated bank account. On successful remittance of the fund into your account, you will be compensated with 30% of the total amount for your assistance and services.So far, much have been said and due to our sensitive positions, we cannot afford a slip in this transaction, neither can we give out our identity, as regards our respective offices , but where relationship is established and smooth operation commences, you will be furnished with all you deserve to know.…
Yours Faithfully,Mr. Mohammed Bello,NNPC Chief accountant.
![Page 7: Cyber Stalking, Fraud, Abuse CSCE 201. Reading Required: Chapter 3 from textbook Interesting: Dwyer, Hiltz, Passerini, Trust and privacy concern within](https://reader034.vdocuments.mx/reader034/viewer/2022042822/56649f2b5503460f94c4661d/html5/thumbnails/7.jpg)
Investment Advise
Biased advertisement Investment news letters – must disclosed if paid
advertisement (but they don’t always do so) Pump and dump
Purchase worthless stock Artificially inflate stock prices Sell at high price
US Securities and Exchange Commission, http://www.sec.gov/investor/pubs/pump.htm
![Page 8: Cyber Stalking, Fraud, Abuse CSCE 201. Reading Required: Chapter 3 from textbook Interesting: Dwyer, Hiltz, Passerini, Trust and privacy concern within](https://reader034.vdocuments.mx/reader034/viewer/2022042822/56649f2b5503460f94c4661d/html5/thumbnails/8.jpg)
How to Avoid InvestmentFraud?
Consider source Verify claims Research the company Beware of high-pressure tactics Be skeptical Research investment opportunity
How about Internet pyramid-scheme?
Source: Wikipedia, https://en.wikipedia.org/wiki/Pyramid_scheme
![Page 9: Cyber Stalking, Fraud, Abuse CSCE 201. Reading Required: Chapter 3 from textbook Interesting: Dwyer, Hiltz, Passerini, Trust and privacy concern within](https://reader034.vdocuments.mx/reader034/viewer/2022042822/56649f2b5503460f94c4661d/html5/thumbnails/9.jpg)
Auction Fraud
US Federal Trade Commission Types of frauds
Failure to sent merchandise Sending something of lesser value Failure to deliver in timely manner Failure to disclose all relevant facts Bidding frauds:
shill biddingbid shieldingbid siphoning
![Page 10: Cyber Stalking, Fraud, Abuse CSCE 201. Reading Required: Chapter 3 from textbook Interesting: Dwyer, Hiltz, Passerini, Trust and privacy concern within](https://reader034.vdocuments.mx/reader034/viewer/2022042822/56649f2b5503460f94c4661d/html5/thumbnails/10.jpg)
Identity Theft
US department of justice, http://www.justice.gov/criminal-fraud/identity-theft/identity-theft-and-identity-fraud
“ Identity theft and identity fraud are terms used to refer to all types of crime in which someone wrongfully obtains and uses another person's personal data in some way that involves fraud or deception, typically for economic gain. ”
It is a CRIME!
![Page 11: Cyber Stalking, Fraud, Abuse CSCE 201. Reading Required: Chapter 3 from textbook Interesting: Dwyer, Hiltz, Passerini, Trust and privacy concern within](https://reader034.vdocuments.mx/reader034/viewer/2022042822/56649f2b5503460f94c4661d/html5/thumbnails/11.jpg)
Methods of Identity Thefts
Social engineering Phishing Social network Technical (break-ins, RFID readers,
communication compromise, web application insecurity)
How do you accept social network connection requests?
![Page 12: Cyber Stalking, Fraud, Abuse CSCE 201. Reading Required: Chapter 3 from textbook Interesting: Dwyer, Hiltz, Passerini, Trust and privacy concern within](https://reader034.vdocuments.mx/reader034/viewer/2022042822/56649f2b5503460f94c4661d/html5/thumbnails/12.jpg)
Social Relationships
Communication context changes social relationships
Social relationships maintained through different media grow at different rates and to different depths
No clear consensus which media is the best
![Page 13: Cyber Stalking, Fraud, Abuse CSCE 201. Reading Required: Chapter 3 from textbook Interesting: Dwyer, Hiltz, Passerini, Trust and privacy concern within](https://reader034.vdocuments.mx/reader034/viewer/2022042822/56649f2b5503460f94c4661d/html5/thumbnails/13.jpg)
Internet and Social Relationships
Internet Bridges distance at a low cost New participants tend to “like” each other
more Less stressful than face-to-face meeting People focus on communicating their
“selves” (except a few malicious users)
![Page 14: Cyber Stalking, Fraud, Abuse CSCE 201. Reading Required: Chapter 3 from textbook Interesting: Dwyer, Hiltz, Passerini, Trust and privacy concern within](https://reader034.vdocuments.mx/reader034/viewer/2022042822/56649f2b5503460f94c4661d/html5/thumbnails/14.jpg)
Privacy in Social Networks
Current support for security is limited Common Access Categories: Public, Group
Membership, “Friend” No support for differentiating relationship “closeness” “Friend” connections must be symmetric, unlike reality
Users often do not use existing security features Hard-coded into the system Owners have system dependent access categories
![Page 15: Cyber Stalking, Fraud, Abuse CSCE 201. Reading Required: Chapter 3 from textbook Interesting: Dwyer, Hiltz, Passerini, Trust and privacy concern within](https://reader034.vdocuments.mx/reader034/viewer/2022042822/56649f2b5503460f94c4661d/html5/thumbnails/15.jpg)
Security & Privacy Issues
Malware exploiting social networks Malicious banner ads Adware Phishing attacks’ Customizable scripts
Facebook’s attempt: make visible relationship actions to entire social group
Everyone reading everyone’s shared information
![Page 16: Cyber Stalking, Fraud, Abuse CSCE 201. Reading Required: Chapter 3 from textbook Interesting: Dwyer, Hiltz, Passerini, Trust and privacy concern within](https://reader034.vdocuments.mx/reader034/viewer/2022042822/56649f2b5503460f94c4661d/html5/thumbnails/16.jpg)
Behavioral Profiling
SN users: post personal information for friends, family, and … the World
Data Mining applications pattern of behavior Misuse of information:Identity thefts, Scam,
Phishing Risk of third party applications!
Facial recognition of friends of friends Relationships Targeted advertisement Marketing tools
![Page 17: Cyber Stalking, Fraud, Abuse CSCE 201. Reading Required: Chapter 3 from textbook Interesting: Dwyer, Hiltz, Passerini, Trust and privacy concern within](https://reader034.vdocuments.mx/reader034/viewer/2022042822/56649f2b5503460f94c4661d/html5/thumbnails/17.jpg)
Privacy?
SN and privacy issues in early research stage Users tend to give out too much information Privacy thresholds vary by individuals What are the long term effects?
![Page 18: Cyber Stalking, Fraud, Abuse CSCE 201. Reading Required: Chapter 3 from textbook Interesting: Dwyer, Hiltz, Passerini, Trust and privacy concern within](https://reader034.vdocuments.mx/reader034/viewer/2022042822/56649f2b5503460f94c4661d/html5/thumbnails/18.jpg)
How can we prevent to become victimes?
![Page 19: Cyber Stalking, Fraud, Abuse CSCE 201. Reading Required: Chapter 3 from textbook Interesting: Dwyer, Hiltz, Passerini, Trust and privacy concern within](https://reader034.vdocuments.mx/reader034/viewer/2022042822/56649f2b5503460f94c4661d/html5/thumbnails/19.jpg)
Lack of LegislationLack of Legislation
Reactive procedures Not addressed improper acts Lack of technical expertise of legal personnel
![Page 20: Cyber Stalking, Fraud, Abuse CSCE 201. Reading Required: Chapter 3 from textbook Interesting: Dwyer, Hiltz, Passerini, Trust and privacy concern within](https://reader034.vdocuments.mx/reader034/viewer/2022042822/56649f2b5503460f94c4661d/html5/thumbnails/20.jpg)
Ethics vs. LawEthics vs. Law
Law Ethics
Formal, written document Unwritten principles
Interpreted by courts Interpreted by each individual
Established by legislatures Presented by philosophers, religious, professional groups
Applicable to everyone Personal choice
Priority decided by court Priority determined by individual
Court makes final decision No external decision maker
Enforceable by police and courts
Limited enforcement
![Page 21: Cyber Stalking, Fraud, Abuse CSCE 201. Reading Required: Chapter 3 from textbook Interesting: Dwyer, Hiltz, Passerini, Trust and privacy concern within](https://reader034.vdocuments.mx/reader034/viewer/2022042822/56649f2b5503460f94c4661d/html5/thumbnails/21.jpg)
Next Class
Secure online activities