Privacy in CyberspacePrivacy: is the ability of a person or entity to control and prevent others from collecting, using, and selling personal, confidential information.Anonymity: the means to communicate without disclosing your identityWith the use of computers and the Internet, having anonymity, the means to communicate without disclosing your identity, has become more difficult to achieve.Technologies that jeopardize online anonymity include:• Cookies• Global unique identifiers• Ubiquitous computing• Radio frequency identificationCookie: a small text file written to the user's hard disk by the Web site after a user visits a text file• Some are used for justifiable reasons, but that's not always the case• Some are used to gather personal information without the user's consent.Global unique identifiers (GUIDs), an identification number produced by software or a piece of hardware.• Anonymous use of the Internet is made more difficult through the use of GUIDs• Companies that have GUIDs. integrated into their products usually do not inform the public.To protect society, governments should provide privacy rights including but not limited to:• Informing users of the collection of information and its intended use.• Allowing users to give or deny their consent to have their information collected.Privacy online:• Use protective software or devices such as Anonymous Surfing or IronKey Secure USB flash drives when using the Internet.• Create e-mail addresses for such things as chat rooms and mailing lists.• Teach children importance of getting permission prior to giving out personal information over the Internet.• Before you fill out any online registration forms, make sure the privacy policy statement of a Web site states that the information provided will not be sold. Privacy at home:• GPS capabilities are embedded in newer cell phones so they can be located.• Services such as Wherify and uLocate can determine precise location of a cell • Software is available to determine and provide notification when a cell phone leaves a specific geographic area.Privacy at work:• Refrain from making personal calls on a work phone.• Avoid using a company e-mail account for personal purposes.• Assume that your actions at work are being monitored.Computer Crime and CybercrimeComputer Crimes: actions that violate the law.Cybercrimes: crimes perpetrated through the use of the Internet Cyber law: the area of law dedicated to computer crime Scope of the Problem - in 20069.3 million Americans suffered from identity theft1 in 6 companies lost equipment containing sensitive data$14,000,000 was lost due to Internet scams500 new viruses were introduced each monthComputer Crime and CybercrimeTypes of computer crimeIdentify theft: A criminal gains access to personal information in order to impersonate another• Phishing: Legitimate-looking e-mails or Web sites are created in an attempt to obtain confidential data about a person for illegal purposes.• Malware (short for malicious software): programs developed to intentionally harm or gain access to a computer system without permission.o Includes spyware, viruses, worms, zombies, and Trojan horsesSpyware: software that gathers private information and tracks Web use, and provides that information to third parties• Adware: a form of spyware that generates annoying pop-up and banner ads• Keyloggers: keep track of keystrokes to provide cybercriminals with confidential dataComputer virus: code that is concealed inside a program and intended to harm or destroy files• File infectors attach themselves to files.• Boot sector viruses attach to the first tracks on a hard drive and execute each time you start the computer.• Macro viruses attach to data files and take advantage of application macros.Rogue forms of malware include:• Time bomb: A virus program that remains dormant on a computer system until it is activated by a specific event• Worm: Similar to a virus but does not need the action of a user to execute the code and cause damageDenial of service (DoS) attack• Assaults an Internet server with so many requests that it cannot function• Accomplished through zombies, individual computers in a botnet-a group of "hijacked" computers. Trojan horse o Normal-looking program that includes concealed instructions o Created to cause harmAs the stealing of private and confidential information increases, the possibility of fraud also increases.The physical stealing of computer equipment is also growing, especially computer components such as microprocessors and chips.Types of fraud and theftMemory shaving: only a portion of RAM is stolen to make the theft less evidentPassword stealing: unauthorized gathering of passwordso Techniques to obtain passwords Salami shaving: an embezzlement tool in which a program takes a little money from numerous accountsData diddling: individuals change data so that it is hard to determine that the resulting theft has occurredForgery: information is transmitted over the Internet as if from a user by an illegal source that appears to be legitimate.Blackmail : why a high percentage of cybercrimes go unreported Types of computer criminals• Crackers• Cybergangs• Virus authors• Swindlers• Shills• Cyberstalkers: use the Internet, social networking sites, and e-mail to harass or threaten an individual.o Most perpetrators are men.o Most victims are college-age women.• Sexual predators• Cyberbullies: send threatening messages via e-mail or text messages.o Cyberbullying involves minors. Examples of Internet Scams SecurityComputer security risk is:• Any intentional or unintentional action that results in damaging a computer system and/or its data• Increased by wireless LANs because transmissions occur over shared airwaves instead of dedicated lines.Security options available for wireless networks include:• WEP (Wired Equivalent Privacy)• WPA (Wi-Fi Protected Access)• WPA2 Threats to the security of computer systems include:• Corporate espionage• Information warfare• Security loophole detection programs• Attacks on safety-critical systems• TerrorismTo reduce security risks:• Use an uninterruptible power supply (UPS), which supplies additional power during power outages or electrical current fluctuations to prevent damage or loss to computer components and/or data. • Control access to computer systems though appropriate password selection and know-and-have authentication.• Use biometric authentication-the use of voice recognition, retinal scans, and fingerprint scans for authentication purposes.• Incorporate firewalls, which can be hardware or software, to prevent unauthorized accessAvoiding scams on the Internet and preventing cyberstalking• Use common sense.• Don't give out personal information.• Be cynical of information provided in chat rooms.• Read documents carefully.• Remain cautious when using the InternetThe Encryption DebateCryptography: The study of encoding messagesEncryption: Method of coding or mixing up a message so that it cannot be understood by unintended recipients Public Key Encryption• Uses two keyso Public key to encrypt and Private key to decrypt• Used in e-commerce• Used to implement o Digital signatures: guarantee that messages haven't been tampered witho Digital certificates: validate identityPublic Key Infrastructure (PKI)• Uniform set of encryption standards• Several corporate PKI proposals, including Live ID• Many fear monopoly if PKI is chosen• U.S. government proposalo Included a backdoor that enabled message code to be crackedo Considered an invasion of privacyGovernment Solution• The right to privacy often conflicts with need to know.• The U.S. government continues its search for ways to balance the public's right to privacy and the government's need to know.What I've LearnedThe lack of complete federal regulations to protect the right to privacy for individuals has resulted in numerous Web sites collecting and accumulating personal information.Computer crime and cybercrime are on the rise, including such crimes as identity theft, malware, fraud, and theft.Computer criminals, such as crackers, cybergang members, and virus authors, are often the cause of the increase in computer security risks.Security risks are events, actions, and situations that could lead to losses.Although no computer system can be totally safe, you can take simple steps to protect your computer and data.Encryption can be used to guard privacy online through public key encryption.The government must keep trying to find a balance between its need to know and the privacy rights of individuals.