GEE 002 Module 3 and 4
GEE 002 Module 3 and 4
GEE 002 Module 3 and 4
1. Discuss how to protect the Email, spam, and world wide web;
Topics
This module covers the following topics:
1. Network Communication
3. Censorship
4. Intellectual Property
6. Software Copyright
3.1 || Network Communication
Overview
Introduction
Email and spam
Fighting spam
World Wide Web
Ethical perspectives on pornography
Censorship
Freedom of expression
Children and the Web
Breaking trust on the Internet
Internet addiction
Introduction
Networking increases the computer’s utility
In addition to Word processing, Excel, …etc, you can share printers, extra storage, exchange
data, e-mail.
Internet connects millions of computers
Powerful computational resource
E-mail, surfing www, promoting your company.
Even more powerful communication medium
Network utility grows as the number of users squared
10 users --> 90 sender-receiver combinations
100 users --> 9900 sender-receiver combinations
As people grows
The network may suffer overload
people may act irresponsibly
How Email Works
Email: Messages embedded in files transferred between computers
Email address: Uniquely identifies cyberspace mailbox (2-parts User….@ Domain....)
Messages broken into packets
Routers transfer packets from the sender’s mail server to the receiver’s mail server
open.org/khelp/kmlm/user_help/html/how_email_works.html)
From the user standpoint, email seems so simple. You set the email address of the person to whom
you want to send the email, compose your message and click 'Send'. All done.
In reality, sending your message off into the network cloud is a bit like sending Little Red Riding Hood
into the deep dark woods. You never know what might happen.
Network Cloud - the set of all mail servers and connectors within a company or organization.
Kantian evaluation (receiving ads via cell phone costs money. Using people as a means for an
end ---- profit)
Act utilitarian evaluation (1 from 100,000 will buy)
Rule utilitarian evaluation (if millions of people are interested to respond to spam there will be no
way to accommodate them). In practice, tiny users respond and many others are thinking of
dropping their accounts)
Social contract theory evaluation
(you have the right to free speech doesn’t mean that all will listen – spammers are not introducing
themselves.
Trend Micro contacts marketers who violate standards for bulk email
–Unsecured mail servers that have been hijacked may be regarded as spammers and they will be
blocked even if they are not spammers)
Ethical Evaluations of Publishing Blacklist
It is decentralized
–It needs browsers, media for storage, SW for retrieving data, ftp, OSs…etc.
Shopping
Contributing content (wikis, blogs)
–A wiki is a website that allows the easy creation and editing of any number of interlinked web pages
via a web browser using a simplified markup language. Collaborative site – many authors
–Blogs are usually maintained by an individual with regular entries of commentary. Personal site (Ex:
online journal)
Promoting business
Learning
Exploring our roots
Entering virtual worlds
Paying taxes
Gambling
Lots more!
“self-discipline” agreement
Germany: Forbids access to neo-Nazi sites
United States: Repeated efforts to limit access of minors to pornography
Pornography Is Immoral
Kant
Utilitarianism
–The pornography industry diverts resources from more socially redeeming activities
Utilitarianism
Commentary
Direct Censorship
Government monopolization
Prepublication review
Self-censorship
–Maintain good relations with government officials (if the offend government they loose their official
sources of information)
Rating systems
–Not the Web (some may have warned– and ask for agreeing to enter a site)
Many-to-many communication
–It is easy to close a radio station BUT difficult to do so for a Web page (millions can post pages)
Dynamic connections
–Millions of PCs are connected to the internet yearly
–Enlightenment thinker
–Any opinion (not the majority opinion) may contain a kernel of truth (a part of the whole truth)
“The only ground on which intervention is justified is to prevent harm to others; the individual’s own
good is not a sufficient condition.” When an individual’s act harms others the government must
intervene.
18th century
Methodologies
Chat room: supports real-time discussions among many people connected to the network
Instant messaging (IM) and chat rooms (which is similar to IM) replacing telephone for many
people
Some pedophiles meeting children through chat rooms
Police countering with “sting” operations
Policemen enter chat rooms to lure pedophiles.
False Information
–Moon landings
–Holocaust
–If many links point to a page, Google search engine ranks that page higher
Social factors
–Peer groups
Situational factors
–Stress
Individual factors
–Lack of achievement
–Fear of failure
–Feeling of alienation
3.2 || Intellectual Property
Overview
Introduction
Intellectual property rights
Protecting intellectual property
Fair use
Peer-to-peer networks
Protections for software
Open-source software
The legitimacy of intellectual property protection for software
Introduction
Digital music storage + Internet ® crisis
Value of intellectual properties much greater than the value of media
Creating the first copy is costly
Duplicates cost almost nothing
Illegal copying pervasive
The Internet allows copies to spread quickly and widely
In light of information technology, how should we treat intellectual property?
Intellectual property: any unique product of the human intellect that has commercial value
–Paintings, drawings
property-business-asset-china%2F&psig=AOvVaw0oBh38Mxz5ilfGryN__5n7&ust=1599467122336000&source=images&cd=vfe&ved=2ahUKEwjhi8O-
jdTrAhVCgMYKHZ72BtYQjRx6BAgAEAc)
Property Rights
–to things which they remove from Nature through their labor (ex: cutting wood-logs-, gaining a land)
As long as…
–after someone removes something from the common state, there is plenty left over
Analogy Is Imperfect
If two people write the same play, both cannot own it ¾ every intellectual property is one-of-a-kind
If one person “takes” another’s playing, both have it ¾ copying an intellectual property is different
from stealing a physical object
–People can benefit from having ownership of their ideas, and thus can improve the quality of life for
others
–Authors of the U.S. Constitution recognized the benefits to limited intellectual property protection.
(Ex: exclusive rights for novels for a limited period of time)
Trade secrets
Trademarks and service marks
Patents
Copyrights
Trade Secret
Confidential piece of intellectual property that gives the company a competitive advantage
Employees are asked to make a confidentiality agreement
Examples:
Never expires
Not appropriate for all intellectual properties (movies- they should be viewed and not be kept in
secret??)
Reverse engineering allowed (buying a can of Coca-Cola and trying to figure out its formula is
legal)
May be compromised when employees leave the firm.
Patent
A public (not secret) document that provides a detailed description of the invention
Provides owner with the exclusive right to the invention
The owner can prevent others from making, using, or selling the invention for 20 years
After that, anyone can make use of the idea
Example: Polaroid vs Kodak- instant photography
Copyright
–Reproduction
–Public performance
Copyright-related industries represent 5% of U.S. gross domestic product (> $500 billion/yr)
Examples: movie, music, SW, book industry.
Copyright protection has expanded greatly since 1790
–Citing short excerpts for teaching, research, criticism, commentary, news reporting
–Nature of work
3.2.1 || Digital Rights Management
Digital Rights Management
Copying from vinyl records to cassette tapes introduced hiss and distortions (bad quality)
Introduction of the compact disc (CD) a boon for the music industry
–Higher quality
Peer-to-Peer Networks
Peer-to-peer network
–Transient network
–Connects computers running same networking program
Ex: (PCs that have faster transfer rate because they have ADSL speed)
Napster
BitTorrent
–Computer programs
–Television shows
–Movies
In 2003 RIAA sued four students (for distributing copyrighted music) for about $100 billion (settled
for $50,000)
Different university responses
–Banning file-sharing
–Signing agreements with legal file-sharing services like Napster (for fees)
3.2.2 || Software Copyright
Software Copyright
Ex: Implementation of RDBMS NOT the concept of it (App. Not Idea of DB)
–Making the same duplicate of a program because programmers move from firm to another
–This act was created in an era with difficulties to make copies. This is not the case NOW.
– Independent groups of users make enhancements, so many versions will appear – no compatibility
Software licenses typically prevent you from making copies of the software to sell or give away
Software licenses are legal agreements
Here we are not discussing the morality of breaking the law
We are discussing whether society should give intellectual property protection to software
–utilitarian analysis
Utilitarian Analysis
–Not all who get free copies can afford to buy software
–The open-source movement demonstrates many people are willing to donate their software-writing
skills
–Difficult to quantify how much society would be harmed if certain software packages not released
It is not a matter of how many SW, but what they can be used for
Summary: Network Communication and
Intellectual Property
Spam: Unsolicited, bulk email. Spammers seek anonymity and Spam blockers
Direct Censorship
Government monopolization
Prepublication review
Licensing and registration
Self-censorship
A most common form of censorship
Group decides for itself not to publish
Freedom of expression in the 1st amendment to the U.S. Constitution addressed this issue.
Children and the Web: Web Filters
Web filter: software that prevents the display of certain Web pages
False Information
Quality of Web-based information varies widely
Internet Addiction
Intellectual property: any unique product of the human intellect that has commercial value
Books, songs, movies
Paintings, drawings
Inventions, chemical formulas, computer programs
Congress has struck a compromise by giving authors and inventors rights for a limited time
Protecting Intellectual Property
Trade secrets
Patents
Copyrights
Trade Secret
Confidential piece of intellectual property that gives the company a competitive advantage
Trademark
Service Mark
Patent
A public (not secret) document that provides a detailed description of the invention
Copyright
Provides owner of an original work five rights
Reproduction
Distribution (copies of the work to the public)
Public display (copies of the work in public)
Public performance
Production of derivative works
Peer-to-Peer Networks
How P2P networks facilitate data exchange
Napster
Peer-to-peer music exchange network
BitTorrent
Broadband connections: download much faster than upload
Software Copyrights
Copyright protection began 1964
Companies treat source code as a trade secret
GNU (General Public License) compilers for C, C++, Objective-C, Fortran, Java, and Ada
utilitarian analysis
NOTE: After studying the lessons, Collaborate with your groupmates and perform your Assignment
No 3.
4.0 || Intended Learning Outcomes
(ILOs) and Topics
Intended Learning Outcomes (ILOs)
By the end of the lesson, you will be able to
6. Explore cyber attacks have been used as a means to achieve criminal ends.
Topics
This module covers the following topics:
Information Privacy
-https://www.privacy.gov.ph/
A data breach at a government agency can, for example, put top-secret information in the hands
of an enemy state.
A breach at a corporation can put proprietary data in the hands of a competitor.
A breach at a school could put students’ Personal Identifiable Information (PII) in the hands of
criminals who could commit identity theft.
A breach at a hospital or doctor’s office can put Personal Health Information (PHI) in the hands of
those who might misuse it.
-page 24 of the Data Privacy and Cybercrime Prevention in the Philippine Digital
Age
What to protect?
Offline Identity - Identification cards we use on a day-to-day basis to authenticate identity in the
physical world.
Online identity is a social identity that an internet user establishes in online communities and
websites.
-Page 15 of the Data Privacy and Cybercrime Prevention in the Philippine Digital Age
Personal Information
Some personal information that is protected:
1.Full Name
2.Present Address
3.Permanent Address
4.Home Number
5.Cellphone Number
6.Email Address
8.Job Position
Sensitive Personal Information
Sensitive personal information refers to personal information:
(1) About an individual’s race, ethnic origin, marital status, age, color, and religious, philosophical or
political affiliations;
(2) About an individual’s health, education, genetic or sexual life of a person, or to any proceeding for
any offense committed or alleged to have been committed by such person, the disposal of such
proceedings, or the sentence of any court in such proceedings;
What is Consent?
Consent means giving data subjects genuine choice and control over how a Personal Information
Controller (PIC) uses their data. Data subjects may be able to refuse consent and may be able to
withdraw consent easily at any time.
The video presentation below discuss more about the Data Privacy Rights
Know Your Data Privacy Rights!
National Privacy Commission · Follow Share
Likewise, the video presentation below discuss more about the Data Protection
4.1.1 || Know Your Rights
As a data subject, you have the right to be informed that your personal data will be, are being, or
were, collected and processed.
The Right to be Informed is the most basic right as it empowers you as a data subject to consider
other actions to protect your data privacy and assert your other privacy rights.
Under the Data Privacy Act of 2012, you have a right to obtain from an organization a copy of any
information relating to you that they have on their computer database and/or manual filing system. It
should be provided in an easy-to-access format, accompanied with a full explanation executed in
plain language.
4.2 || Computer and Network Security
Introduction
Do you ever go to a coffee shop and use its open wireless network to surf the Web? Did you know
freely available software gives any nearby computer user the ability to break into the accounts of
people accessing Web sites through password-free wireless networks?
In the movie Live Free or Die Hard, a terrorist organization hacks into a variety of computer and
communication systems to seize control of traffic lights, natural gas pipelines, and electrical power
grids. Are such episodes purely the stuff of Hollywood fiction, or could they really happen? Millions of
people use computers and the Internet to send and receive an email, access bank accounts,
purchase goods and services, and keep track of personal information, making the security of these
systems an important issue. Malicious software can enter computers in a variety of ways. Once
active, these programs can steal personal information, destroy files, disrupt industrial processes, and
launch attacks on financial systems, supporting criminal enterprises and politically motivated attacks
on corporations and governments around the world.
This lesson focuses on threats to computer and network security. We begin our survey with
examples of individuals using cunning or skill to gain unauthorized access into computer systems.
4.2.1 || Hackers (Past and Present)
In its original meaning, a hacker was an explorer, a risk-taker, someone who was trying to make a
system do something it had never done before.
Hackers in this sense of the word abounded at MIT’s Tech Model Railroad Club in the 1950s and
1960s. The club constructed and continuously improved an enormous HO-scale model train
layout. Members of the Signals and Power Subcommittee built an elaborate electronic switching
system to control the movement of the trains.
To them, a “hack” was a newly constructed piece of equipment that not only served a useful purpose
but also demonstrated its creator’s technical virtuosity.
Calling someone a hacker was a sign of respect; hackers wore the label with pride.
In 1959, after taking a newly created course in computer programming, some of the hackers shifted
their attention from model trains to electronic computers.
The term “hacker” came to mean a “person who delights in having an intimate understanding of the
internal workings of a system, computers and networks in particular”.
In the 1983 movie WarGames, a teenager breaks into a military computer and nearly causes a
nuclear Armageddon. After seeing the movie, a lot of teenagers were excited at the thought that they
could prowl cyberspace with a home computer and a modem. A few of them became highly proficient
at breaking into government and corporate computer networks. These actions helped change the
everyday meaning of the word “hacker.”
Hackers Today
Today hackers are people who gain unauthorized access to computers and computer networks.
Typically, you need a login name and password to access a computer system. Sometimes a hacker
can guess a valid login name/password combination, particularly when system administrators allow
users to choose short passwords or passwords that appear in a dictionary.
There are three other low-tech techniques for obtaining login names and passwords are
eavesdropping, dumpster diving, and social engineering.
1. Eavesdropping, such as simply looking over the shoulder of a legitimate computer user to learn
his login name and password.
2. Dumpster diving means looking through garbage for interesting bits of information. Companies
typically do not put a fence around their dumpsters. In midnight rummaging sessions, hackers
have found user manuals, phone numbers, login names, and passwords.
3. Social engineering refers to the manipulation of a person inside the organization to gain access
to confidential information. Social engineering is easier in large organizations where people do
not know each other very well. For example, a hacker may identify a system administrator and
call that person, pretending to be the supervisor of his supervisor and demanding to know why he
can’t access a particular machine. In this situation, a cowed system administrator, eager to please
his boss’s boss, may be talked into revealing or resetting a password.
AN ACT PROVIDING FOR THE RECOGNITION AND USE OF ELECTRONIC COMMERCIAL AND
NON-COMMERCIAL TRANSACTIONS, PENALTIES FOR UNLAWFUL USE THEREOF, AND
OTHER PURPOSES
Sec. 33. Penalties. - The following Acts shall be penalized by fine and/or imprisonment, as follows:
4.2.2 || Malware
Malware
Malware, or malicious software, is any program or file that is harmful to a computer user.
If you are lucky, these programs will do nothing other than consume a little CPU time and some disk
space. If you are not so lucky, they may destroy valuable data
stored in your computer’s file system. An invading program may even allow outsiders to seize control
of your computer. Once this happens, they may use your computer as a depository for stolen credit
card information, a Web server dishing out pornographic images, or a launch pad for spam or a
denial-of-service attack on a corporate or government server.
Viruses
A virus is a piece of self-replicating code embedded
within another program called the host.
To protect our computer system, we can install antivirus software. Commercial antivirus software
packages allow computer users to detect and destroy viruses lurking on their computers. To be most
effective, users must keep them up-to-date by downloading patterns corresponding to the latest
viruses from the vendor’s Web site.
Internet Worm
A worm is a self-contained program that spreads through a computer network by exploiting security
holes in the computers connected to the network.
The technical term “worm” comes from The Shockwave Rider, a 1975 science fiction novel written by
John Brunner.
Sasser
The Sasser worm, launched in April 2004, exploited a previously identified security weakness with
PCs running the Windows operating system.
Computers with up-to-date software were safe from the worm, but it infected about 18 million
computers worldwide nonetheless.
The effects of the worm were non-threatening; infected computers simply shut themselves down
shortly after booting.
Still, the worm made millions of computers unusable and disrupted operations at Delta Airlines, the
European Commission, Australian railroads, and the British coast guard.
Worms were less devastating back then because only about 141 million people used instant
messaging. Today more than 800 million people rely on instant messaging, so the impact of worms
can be much greater.
The appearance of the Kelvir worm in 2005 forced the Reuters news agency to remove 60,000
subscribers from its Microsoft-based instant messaging service for 20 hours.
In 2010 a variant of the Palevo instant messaging worm rapidly spread through Romania, Mongolia,
and Indonesia.
Conficker
The Conficker (or Downadup) worm, which appeared on Windows computers in November 2008, is
notable because computer security experts have found it particularly
difficult to remove.
2. The second version of the worm, which appeared about a month later, had two new features that
accelerated its spread: the ability to invade computers with weak password protection and the ability
to propagate through
Early in 2009, between 8 and 15 million computers were infected with Conficker, including portions of
military networks in France, the United Kingdom, and Germany.
According to Rodney Joffe of the Conficker Working Group, “It’s using the best current practices and
state of the art to communicate and to protect itself”. Even though millions of copies of this worm are
circulating, it does not appear to have done great harm. Security experts remain baffled as to the
goals of those who created it.
Cross-site scripting
Cross-site scripting is another way in which malware may be downloaded without a user’s
knowledge. Web sites that allow users to read what other users have posted are
vulnerable to this security problem. The attacker injects a client-side script into a Web site. When an
innocent user visits the site sometime later, the user’s browser executes the
script, which may steal cookies, track the user’s activity, or perform another malicious action.
A drive-by download refers to the unintentional download of malicious code to your computer or
mobile device that leaves you open to a cyberattack. You don't have to click on anything, press
download, or open a malicious email attachment to become infected. A drive-by download can take
advantage of an app, operating system, or web browser that contains security flaws due to
unsuccessful updates or lack of updates. Unlike many other types of cyberattack, a drive-by doesn't
rely on the user to do anything to actively enable the attack.
One example of drive-by download is when a Web surfer encounters a pop-up window asking
permission to download software. The user approves the download, thinking the code is necessary to
view the content on theWeb site, but in actuality the download contains malware.
The drive-by download problem is growing. The Google Anti-Malware Team has discovered more
than three million URLs that initiate drive-by downloads. That may not seem like so many URLs,
given the size of the Web, but hackers target the most popular Web sites. As a result, about 1.3
percent of queries to Google’s search engine result in a malicious URL appearing somewhere in the
results page.
Trojan Horse
A Trojan horse, or trojan, is any malware which misleads users of its true intent.
When the user executes a Trojan horse, the program performs the expected beneficial task.
However, the program is also performing actions unknown to, and not in the best interests of, the
user.
For example, where a user is deceived into executing an email attachment disguised to appear not
suspicious, (e.g., a routine form to be filled in), or by clicking on some fake advertisement on social
media or anywhere else.
Trojans may allow an attacker to access users' personal information such as banking information,
passwords, or personal identity. It can also delete a user's files or infect other devices connected to
the network.
The term is derived from the Ancient Greek story of the deceptive Trojan Horse that led to the fall of
the city of Troy.
One example of a Trojan horse is Mocmex. It was first uncovered in 2008 in digital picture frames
manufactured in China. It spread from digital picture frames to computer hard drives and other
portable storage devices people attached to their PCs. The purpose of the Trojan horse appeared to
be to steal passwords to online computer games
A backdoor Trojan is a Trojan horse that gives the attacker access to the victim’s computer.
For example, a backdoor Trojan may design to cleanse malware from a computer, but in actuality it
installs spyware.
Rootkit
A rootkit is a malicious software that allows an unauthorized user to have privileged access to a
computer and to restricted areas of its software.
Rootkits are difficult to detect because they start running before the operating system has completed
booting up, and they can use security privileges to mask their presence.
A rootkit may contain a number of malicious tools such as keyloggers, banking credential stealers,
password stealers, antivirus disablers, and bots for DDoS attacks.
Spyware programs can monitor Web surfing, log keystrokes, take snapshots of the computer screen,
and send reports back to a host computer. Spyware is often part of a rootkit.
Adware is a type of spyware that displays pop-up advertisements related to what the user is doing.
Since people would not intentionally download a spyware program, spyware must get installed using
deception. Free software downloaded from the Internet often contains spyware. Alternatively, the
spyware may be a Trojan horse, tricking users into downloading it because they think it serves a
useful purpose. A Trojan horse containing spyware is an example of a backdoor Trojan.
What is Adware?
What is Adware?
A collection of bot-infected computers is called a botnet, and a person who controls a botnet is
called a bot herder. Botnets can range in size from a few thousand computers to over a million
computers. In most cases, people have no idea that their PCs have been compromised and are part
of a botnet.
It’s been estimated that as much as 90 percent of spam is distributed through botnets [40]. Bots can
also be used as spyware, stealing files or logging keystrokes to gain credit card numbers or other
sensitive information.
What is a Botnet?
4.3 || Cyber Crime and Cyber Attacks
A phishing (pronounced “fishing”) attack is a large-scale effort to gain sensitive information from
gullible computer users. An attacker sends out millions of email messages from a botnet. The
messages inform the recipients that one of their accounts has been compromised and directs them
to connect to a Web site to resolve the problem. Targeted users that click on the link encounter an
impostor Web site designed to resemble the genuine e-commerce site. Once on the site, they are
asked for a login name, password, and other private information. Information collected by the
imposter site can then be used for identity theft.
Spear phishing is a variant of phishing in which the attacker selects email addresses that target a
particular group of recipients. For example, an attacker may target elderly people judged to be more
gullible or members of a group that have access to valuable information
What is Phishing?
SQL Injection
SQL injection is a method of attacking a database-driven Web application that has improper
security.
The attacker accesses the application like any other client of the application, but by inserting
(injecting) an SQL query into a text string from the client to the application, the attacker can trick the
application into returning sensitive information.
In a distributed denial-of-service (DDoS) attack, the attacker rents access to a botnet from a bot
herder. At the selected time, the command-and-control computer sends the appropriate instructions
to the bots, which launch their attack on the targeted system.
What is a DDoS Attack?
Cases of online threat, meanwhile, rose from 29 to 217 during the period; system interference or
hacking from 12 to 193; unjust vexation from one reported case to 148; cases of illegal access from
zero-incident to 133; automated teller machine (ATM) and credit card fraud from one reported case to
59; and robbery with intimidation from three to 35 incidents.
Do's and Don't in Internet Surfing
NOTE: Congratulations! You are done all the topics. Kindly review and prepare for your quiz.
If you are ready, click Quiz 4: Information Privacy and Computer & Network Security
(https://tip.instructure.com/courses/23291/quizzes/245107) to proceed in your quiz. Good luck!