CS245 - CS II SPRING 1997
Chapter 14 - Ethics, Electronic Spies and Privacy
14.1 Introduction - Vulnerability and Technological Abuse
computer abuse stems from three major causes:
- Scope
- Saturation
- Complexity
Vulnerabilities
- Unauthorized use of hardware
- Theft(piracy) of software
- Use of computers to commit crimes
- Hacking - any unauthorized computer or data related activity
- Sabotage
- Individual Privacy
- Pornography and censorship
Ethical Concerns
- Is copying software a form of stealing?
- Are hackers criminals or protectors of our civil liberties?
- How do we deal with the creators of viruses?
- At what point does stored data become an invasion of privacy?
- What constitutes misuse of information?
- Who is responsible for data security?
- Are so called 'victimless crimes' as serious as crimes with human victims?
- Should there be a code of ethics to control computer use and protect the rights of all?
14.2 High Tech Crime: the computer as a Criminal Tool
- a computer crime is any criminal act that has been committed using a computer as the principal tool
- a computer crime is an illegal activity which could not take place without a computer
- a computer crime is any illegal activity using computer software, data or access as the object, subject or instrument of the crime
- Trojan horse - involves the insertion of false information into a program in order to profit from the outcome
- Salami - involves spreading the haul over a large number of trivial transactions
- Piggybacking - involves invading a communication system by riding in behind a legitmate user with a password
- Data diddling - involves swapping one piece of information for another of the same type
- time bomb (logic bomb) - software routine which can be triggered at some time later by the computer's clock or by a predetermined combination of events
- Scavenging - searching through stray data and electronic garbage for clues that might unlock secrets of a targeted computer system
- Protect all data and programs, and all system access, by password
- Issue passwords to as few people as possible, and to no outsiders
- Make passwords less abvious and less memorable
- Avoid using common 'cutsies'
- Change passwords frequently
14.3 Software Piracy
Software Piracy - unauthorized copying or use of software for which you have not paid the appropriate licensing fee
14.4 Hacking
14.5 The Virus Epidemic
14.6 Invasions of Privacy
EXERCISES;Due Dec. 5, 1997
- Name 2 Moral Imperative of the ACM Code of Ethics.
- Name 2 specific Professional Responsibilities of an ACM computing professional.
- What is the difference between shareware and freeware?
- Is there a computer security problem (in general)? Elaborate!
- What is a computer virus?
- List two different antivirus software products.