chapter 5: crime
DESCRIPTION
Chapter 5: Crime. See Dilbert cartoons about crime: http://dilbert.com/strips/comic/2009-09-18/ http://dilbert.com/strips/comic/2009-05-12/. Announcements. Video scene assignment is posted - PowerPoint PPT PresentationTRANSCRIPT
CptS 401, Spring2011 3/24/11
Chapter 5: Crime
See Dilbert cartoons about crime:http://dilbert.com/strips/comic/2009-09-18/
http://dilbert.com/strips/comic/2009-05-12/
1
CptS 401, Spring2011 3/24/11
Announcements
• Video scene assignment is posted• Tutorial on iMovie and Final Cut Pro will be
held a week from today (March 31) at 4:15 in Avery Microcomputer Lab– More info and sign-up sheet on Tuesday
• Midterm exam grades posted on Monday (will be curved)
2
CptS 401, Spring2011 3/24/11
Reading Quiz on Ch. 5
• Covers 5.1, 5.2.1,5.2.3, 5.3, 5.5, 5.6• Please put all materials away except for cheat
sheet.
3
CptS 401, Spring2011 3/24/11
Quiz Question 1
A hacker can be described asA. a programmer who writes clever or elegant codeB. someone who breaks into computers without
authorizationC. someone who modifies web sites to make a
political statementD. All of the aboveE. None of the above
4
CptS 401, Spring2011 3/24/11
Quiz Question 1 Answer
D. All of the above
All of these versions of a “hacker” can be found in Section 5.2.1 (pp. 253-260).
5
CptS 401, Spring2011 3/24/11
Quiz Question 2
In this attack, hundreds of thousands of requests for Web pages and other information are issued to a single Web site:A. Zombie attackB. Love Bug attackC. Denial-of-service attackD. None of the above
6
CptS 401, Spring2011 3/24/11
Quiz Question 2 Answer
C.
See p. 260.
7
CptS 401, Spring2011 3/24/11
Quiz Question 3
The Computer Fraud and Abuse Act (CFAA) of 1986A. applies to activities performed on computers
connected to the internetB. applies to activities performed on private
computers not connected to the internetC. applies to computers in foreign countriesD. None of the aboveE. All of the above
8
CptS 401, Spring2011 3/24/11
Quiz Question 3 Answer
A.
See p. 265
What does the CFAA address?
9
CptS 401, Spring2011 3/24/11
Quiz Question 4 (Extra Credit)
Writing computer code that could at some point be used to generate computer viruses or hack into computers is presently illegal in the U.S.A. TrueB. False
10
CptS 401, Spring2011 3/24/11
Quiz Question 4 Answer
B. False
The bottom of p. 272 makes it clear that no such law exists, and points out that such a law would make it difficult to defend against such viruses, and may conflict with the First Amendment (Free Speech), since courts have previously ruled that software is a form of speech.
11
CptS 401, Spring2011 3/24/11
Quiz Question 5
In this identity theft scheme, false IP addresses are planted in DNS tables, causing users to be unknowingly directed to fake sites:A. PhishingB. PharmingC. SpywareD. All of the aboveE. None of the above
12
CptS 401, Spring2011 3/24/11
Quiz Question 5 Answer
B. Pharming
See pp. 274-275.
What is a DNS? Is Pharming easier than Phishing?
13
CptS 401, Spring2011 3/24/11
Quiz Question 6
Biometrics areA. the unique biological characteristics of a specific
group of people, such as blood type or hair colorB. the unique biological characteristics of a specific
individual, such as fingerprint, eye patterns, or DNA.C. the unique measurements of an individual, such as
height, weight, or arm length.D. All of the aboveE. None of the above
14
CptS 401, Spring2011 3/24/11
Quiz Question 6 Answer
B.
Can biometric scanning devices be tricked? Why or why not? (Discuss with team.)
15
CptS 401, Spring2011 3/24/11
Quiz Question 7
The purpose of the so-called Cyber-Crime Treaty is toA. help law enforcement agencies in different
countries cooperate in the prosecution of cyber crimes.
B. standardize the laws against cyber crimes in different U.S. states.
C. toughen existing international laws against cyber crimes.
D. None of the above
16
CptS 401, Spring2011 3/24/11
Quiz Question 7 Answer
A.
See p. 291.
What is a dual-criminality provision? What are arguments for and against such a provision?
17
CptS 401, Spring2011 3/24/11
Quiz Question 8
Providers of services and information must make sure that their material is not accessible in countries where it is illegal—this principle is known asA. “authority to prevent entry”B. “responsibility to prevent access”C. “responsibility to regulate content”D. “mandate to block access”E. None of the above
18
CptS 401, Spring2011 3/24/11
Quiz Question 8 Answer
B.
See p. 293
What prominent court case have we studied that assumed this principle?
19
CptS 401, Spring2011 3/24/11
Quiz Question 9
The “authority to prevent entry” principle states thatA. information providers must prevent their materials from
being accessible in countries where the materials are illegal.
B. individuals are solely responsible for blocking access to materials they find personally objectionable.
C. governments may block access to material that is illegal in their country, but may not prosecute the providers of such material if the material is legal in the country in which it is produced.
D. None of the above
20
CptS 401, Spring2011 3/24/11
Quiz Question 9 Answer
C.
See p. 299
Do you think“responsibility to block access” or “authority to prevent entry” is a better policy? Why?
21
CptS 401, Spring2011 3/24/11
Question 10
Whereas Ch. 5 of the book focuses mainly on , Mike Gaffney’s guest lecture focused mainly on .A. Cybercrime, Computer-Aided DispatchB. Cybercrime, Crime detectionC. Cybercrime, Crime preventionD. Cybercrime, Use of technology to identify,
investigate and prosecute crimesE. None of the above
22
CptS 401, Spring2011 3/24/11
Quiz Question 10 Answer
C.
(I hope anyone who was here on Tuesday got this right. )
23
CptS 401, Spring2011 3/24/11
Update: Use of Lab Files Showed More than 100 Baseball Players Used Steroids
• On p. 289, the book mentions a well-known case involving the potential release of information on players who, according to lab files, used steroids
• The original search warrant was for 10 specific players, yet the law enforcement agents wanted to release info on 100 players who used steroids.
• How was the case settled? Let’s look:http://www.latimes.com/sports/la-sp-balco-ballplayers-20100914,0,1279725.story
24
CptS 401, Spring2011 3/24/11
Discussion Exercise: Use of Car vs. Computer (Clicker)
5.8, p. 300: A friend logs on to your computer at night while you are asleep and uses some of your software. Another friend takes your car at night and drives it around for a while. (Neither has your permission; neither does damage.) List characteristics (ethics, legality, risks) of the two events that are similar and different. Which would offend you more?A: A friend using your computer softwareB: A friend driving your carC: Both would offend me equallyD: Neither would offend me
25
CptS 401, Spring2011 3/24/11
Discussion Exercise:Stance with Respect to Break-Ins (Clicker)
Ex. 5.9, p. 300: Young, technically-oriented hackers have argued that, if owners of a computer system want to keep outsiders out, it is their responsibility to provide better security. Ken Thompson, one of the inventors of UNIX, said, “The act of breaking into a computer system has to have the same social stigma as breaking into a neighbor’s house. It should not matter that the neighbor’s door is unlocked.” Which position do you agree with more? Why?A: Young hackers’ positionB: Ken Thompson’s positionC: NeitherD: Not sure
26
CptS 401, Spring2011 3/24/11
Discussion Exercise:Surveillance Software to Monitor the Web (Clicker)
Ex. 5.22, p. 301: Commenting on constitutional objections to the SEC’s plan to use surveillance software to monitor the Web for possible fraud (Section 5.5.1), an SEC offical said “the Consitution doesn’t give people the right to use the Internet to commit fraud.” Evaluate this response. Is it a good argument?A: YesB: NoC: Not sure
27
CptS 401, Spring2011 3/24/11
Discussion Exercise:Computer Virus a Crime? (Clicker)
Ex. 5.15, p. 300: Evaluate arguments in favor of and against passage of a law making the writing and publication of a computer virus a crime. (See Section 5.2.4.) Would you support such a law? Why?A: Yes, I would support such a lawB: No, I wouldn’t support such a lawC: I’m not sure
28