9 1 Chapter 9 THE CHALLENGES OF THE

  • Slides: 33
Download presentation
9 -1

9 -1

Chapter 9 THE CHALLENGES OF THE DIGITAL AGE Society & Information Technology Today 9.

Chapter 9 THE CHALLENGES OF THE DIGITAL AGE Society & Information Technology Today 9. 1 Truth Issues: Manipulating Digital Data 9. 2 Security Issues: Threats 9. 3 Security: Safeguarding Computers & Communications 9. 4 Quality-of-Life Issues 9. 5 Economic & Political Issues Mc. Graw-Hill/Irwin © 2007 The Mc. Graw-Hill Companies, Inc. All rights reserved.

Truth Issues: Manipulating Digital Data u. Digital Images and Sounds can be manipulated u

Truth Issues: Manipulating Digital Data u. Digital Images and Sounds can be manipulated u Pro: Creates new forms of art u Morphing software makes one image morph into another http: //www. cs. utah. edu/~dejohnso/morph. html u Movies such as “Crouching Tiger, Hidden Dragon” and “Harry Potter” contain many scenes that could never actually happen u Adobe Photoshop allows changes, enhancements to photos u Digital technology allows musicians to sing every track of a song and accompany themselves u Con: Has made photographs & recordings untrustworthy u Famous Yalta summit photo edited: Stallone added in! 9 -3

Truth Issues: Manipulating Digital Data u Photographs may not be authentic u Photographs may

Truth Issues: Manipulating Digital Data u Photographs may not be authentic u Photographs may be deliberately misleading u 1994 Time magazine photo of O. J. Simpson was digitally darkened to make him appear sinister u u Could this have biased potential jury members? Fashion model photos are routinely elongated to make models appear more slender u How many girls become anorexic to try to match those models’ impossible perfection? u http: //www. etniesgirl. com/blog/2005/11/30/photoshop-101 even-models-have-flaws u http: //www. tutorialized. com/tutorial/Basic-Model. Retouching/9547 u http: //news. bbc. co. uk/1/hi/health/769290. stm 9 -4

Truth Issues: Manipulating Digital Data u. Techniques to combat digital deception u Prof. William

Truth Issues: Manipulating Digital Data u. Techniques to combat digital deception u Prof. William H. Mitchell of M. I. T. wrote the first systematic, critical analysis of the digital revolution u Corbis http: //pro. corbis. com/ adds a digital watermark to its photos u Hany Farid of Dartmouth College devised algorithms to detect changes to uncompressed digital photos u Prof. Jessica Fridrich of S. U. N. Y. at Binghamton is researching digital cameras that hide a picture of the photographer’s iris inside each digital photo 9 -5

Truth Issues: Manipulating Digital Data u. Limitations of Public databases u You can’t get

Truth Issues: Manipulating Digital Data u. Limitations of Public databases u You can’t get the whole story u Start u The with a public database, THEN do more research data is not necessarily accurate u Cross-check u Each against multiple sources database service has boundaries u Know what those boundaries are u Different keywords bring different results u History is limited u These databases often begin with data from 1980 or later 9 -6

Security Issues: Threats u. Errors and accidents u. Natural hazards Is my computer safe?

Security Issues: Threats u. Errors and accidents u. Natural hazards Is my computer safe? I’m concerned about it. What do I need to do to use it safely for work, home, and school? u. Computer crime u. Computer criminals 9 -7

Security Issues: Threats Errors & Accidents u. Human errors u People u Too choose

Security Issues: Threats Errors & Accidents u. Human errors u People u Too choose the wrong computer simple or too complex u Human emotions affect performance u People u Human get frustrated perceptions are slower than the equipment u Watch out when you click the OK button! You may have just deleted something important! 9 -8

Security Issues: Threats Errors & Accidents u. Procedural errors u When people fail to

Security Issues: Threats Errors & Accidents u. Procedural errors u When people fail to follow safe procedures, errors can occur u. Software errors u Programmers make coding errors u Famous example: Utility billing software: u Customer pays early – software credits account u Customer pays late – software credits account, adds late fee in for next bill u Programmer forgot to consider customers who pay exactly on time – their payments were never credited at all! 9 -9

Security Issues: Threats Errors & Accidents u. Electromechanical problems u Mechanical systems wear out

Security Issues: Threats Errors & Accidents u. Electromechanical problems u Mechanical systems wear out u Power failures shut down computers unless you have battery backup u Using cellphones and Blackberries while driving can cause people to crash u. Dirty data problems u Incomplete, updated, or inaccurate data u Check your records – medical, school, and credit to make sure they are accurate u. Natural hazards can lead to disasters 9 -10

Security Issues: Threats Computer Crimes u. Two types of computer crime u It can

Security Issues: Threats Computer Crimes u. Two types of computer crime u It can be an illegal act perpetrated against computers or telecommunications u It can be the use of computers or telecommunications to accomplish an illegal act 9 -11

Security Issues: Threats Computer Crimes u. Theft of hardware u. Theft of software u.

Security Issues: Threats Computer Crimes u. Theft of hardware u. Theft of software u. Theft of online music and videos u. Theft of time and services u. Theft of information u. Internet-related fraud u. Taking over your PC u. Crimes of malice u. Computer criminals 9 -12

Security Issues: Threats Computer Crimes u. Theft of hardware can range from u Shoplifting

Security Issues: Threats Computer Crimes u. Theft of hardware can range from u Shoplifting an item from a computer store u Stealing an entire PC or laptop u. Theft of software u Pirated software is software obtained illegally u This includes “softlifting” - buying one copy of the software and using it on multiple computers u Software makers have prosecuted both companies and individuals including students for software piracy 9 -13

Security Issues: Threats Computer Crimes u. Theft of online music and movies u Entertainment

Security Issues: Threats Computer Crimes u. Theft of online music and movies u Entertainment industry takes this seriously and prosecutes offenders u Stealing music u Illegal file swapping services u Damages can be up to $150, 000 per song u Stealing movies u The film industry has taken aggressive aim at pirated movies u 11 -nation crackdown announced in 2005 9 -14

Security Issues: Threats Computer Crimes u. Theft of time and services u Theft of

Security Issues: Threats Computer Crimes u. Theft of time and services u Theft of computer time at work u Surfing or playing games when you should be working u Some employees violate policy by conducting personal business online such as online auctions from work u Most employers have policies against viewing X-rated web sites at work u Theft of phone services u Phone phreaks use company phone systems to make “free” unauthorized long distance calls u Why break the law, when you can get free long distance over the internet using skype www. skype. com 9 -15

Security Issues: Threats Computer Crimes u. Theft of Information u. A common crime today

Security Issues: Threats Computer Crimes u. Theft of Information u. A common crime today u Can include theft of personal information, medical information, or credit card and financial information u Legislation to make it a crime to steal someone’s identity was the 1998 Identity Theft and Assumption Deterrence Act u The U. S. Department of Justice discusses their approach to this crime at http: //www. usdoj. gov/criminal/fraud/idtheft. html u If you are a victim of identity theft, you may file a report online at the Federal Trade Commission’s website at https: //rn. ftc. gov/pls/dod/widtpubl$. startup? Z_ORG_CODE=PU 03 9 -16

Security Issues: Threats Computer Crimes u. Internet-related Fraud u Because it lends itself to

Security Issues: Threats Computer Crimes u. Internet-related Fraud u Because it lends itself to anonymity, internet-related fraud is becoming more common u Well-known examples include: u Nigerian u Letter says you can get a lot of money out of Nigeria if you pay a “money transfer fee” first u Evil u letter scam twin attacks A cracker sets up an attack computer as a duplicate public access point in a public location u Phishing u Sending emails that appear to come from a trusted source that links you to a website where you type in personal information that is intercepted by the phisher 9 -17

Security Issues: Threats Computer Crimes u. Internet-related Fraud (continued) u Pharming u Malicious software

Security Issues: Threats Computer Crimes u. Internet-related Fraud (continued) u Pharming u Malicious software is implanted in your computer that directs you to an imposter web page u Trojan horses u. A program such as a “free” online game or screensaver that loads hidden programs that take over your computer or cause mischief without your knowledge u For example, Windows users who install the phony MSN Messenger Version 8 "beta" are actually installing an IM worm that spreads to their IM contacts, and connects their computer to a remote control "bot" network run by malicious hackers 9 -18

Security Issues: Threats Computer Crimes u. Crimes of Malice: Crashing entire computer systems u

Security Issues: Threats Computer Crimes u. Crimes of Malice: Crashing entire computer systems u Sometimes criminals are more interested in vandalizing systems than they are in gaining control of them u In 2003, an entrepreneur with a grudge because he lost a sale retaliated by shutting down the Wea. Knees website u Crackers regularly attempt to crash Microsoft’s website u Security specialists monitor for possible cyber-attacks on electrical and nuclear power plants, dams, and air traffic control systems u Crackers have attacked the internet too and brought down large sections of it 9 -19

Security Issues: Threats Computer Crimes u. Computer criminals may include u Individuals or small

Security Issues: Threats Computer Crimes u. Computer criminals may include u Individuals or small groups who u Use fraudulent email and websites u Steal peoples’ identities for monetary gains u Show off their power for bragging rights u Employees who u Have a grudge against their current or former employers u Have a grudge against another employee u Sell their company’s secrets for personal profit u Outside partners and company suppliers 9 -20

Security Issues: Threats Computer Crimes u. Computer criminals may also include u Corporate spies

Security Issues: Threats Computer Crimes u. Computer criminals may also include u Corporate spies u Enemy foreign intelligence services u Organized crime u Terrorists u. Computer criminals do not include your employer, who is legally allowed to monitor the computers at work u Check your company’s computer usage policy u Make sure you follow the rules u Know that any data you store in the computer at work – including emails – is company property 9 -21

Security: Safeguarding Computers & Communications u. Security is u. A system of safeguards for

Security: Safeguarding Computers & Communications u. Security is u. A system of safeguards for protecting information technology against disasters, system failures, and unauthorized access that can result in damage or loss u. Computer Security’s Five Components u Deterrence of computer crime u Identification and access u Encryption u Protection of software and data u Disaster recovery plans 9 -22

Security: Safeguarding Computers & Communications u. Deterrents to computer crime u Enforcing laws u

Security: Safeguarding Computers & Communications u. Deterrents to computer crime u Enforcing laws u CERT: The Computer Emergency Response Team u Provides round-the-clock information on international computer security threats u The CERT website is www. cert. org For example, on December 15, 2005 announced a partnership between the US and ict. Qatar, the Qatar Supreme Council for Information and Communications Technology, to conduct and coordinate cybersecurity activities u On December 13, 2005 CERT issued alert SA 05 -347 A documenting Windows Explorer vulnerabilities u 9 -23

Security: Safeguarding Computers & Communications u. More deterrents to computer crimes u Tools to

Security: Safeguarding Computers & Communications u. More deterrents to computer crimes u Tools to fight fraudulent and unauthorized online uses u Rule-based detection software u Predictive-statistical-model software u Employee internet management software u Internet filtering software u Electronic surveillance u Verify legitimate right of access u Use cards, keys, signatures, and badges u Use PINs and passwords u Use physical traits and personal identification 9 -24

Security: Safeguarding Computers & Communications u Encryption u The process of altering readable data

Security: Safeguarding Computers & Communications u Encryption u The process of altering readable data into unreadable form to prevent unauthorized access u Advantage: encrypting data that is available over the internet keeps thieves and crackers from reading it u On Dec. 7, 2005, Guidance Software, a maker of Computer Forensics software, informed their customers that criminals had stolen their credit cards because Guidance had FAILED to encrypt a database that was accessible over the internet u Disadvantage: encrypting data may prevent law-enforcement officials from reading the data criminals are sending to each other Discussion Question: Does information privacy outweigh law enforcement’s needs to track down and prosecute criminals? Should we all encrypt our information to prevent crackers and criminals from stealing it? 9 -25

Security: Safeguarding Computers & Communications u 4 ways to protect software & data u

Security: Safeguarding Computers & Communications u 4 ways to protect software & data u Educate employees in backing up data, virus protection, and not sharing passwords u Control of access to restrict usage u Audit controls to document who used what programs and computers and when u People controls include screening applicants, background checks, monitoring internet, email, and computer usage 9 -26

Security: Safeguarding Computers & Communications u Disaster-recovery plans u. A method of restoring information-processing

Security: Safeguarding Computers & Communications u Disaster-recovery plans u. A method of restoring information-processing operations that have been halted by destruction or accident u Reinforced by 2001 World Trade Center attack u Reinforced by company data losses incurred during 2005 Hurricane Katrina u Plans range in price and complexity from u Backing up data from disk to tape, CD, or zip disk, with a UPS u Automatically storing data redundantly in two places, with a generator u Having an off-site computerized data storage center with independent power supply u Having a complete “hot” redundant data center that can instantly be used if there is a disaster More $$$ 9 -27

Quality-of-Life Issues u. Information Technology misuse can result in u Environmental problems u Manufacturing

Quality-of-Life Issues u. Information Technology misuse can result in u Environmental problems u Manufacturing computers and circuits can cause pollution u Computer component manufacturing employees may be exposed to toxic substances u Used computers/monitors contain chromium, cadmium, lead, mercury, PVC, and brominated flame retardants – all toxic substances that must be disposed of properly u Exacerbation of Mental-health problems u Proliferation of pornography u Workplace problems 9 -28

Quality-of-Life Issues u. Information Technology misuse can result in u Environmental problems u Exacerbation

Quality-of-Life Issues u. Information Technology misuse can result in u Environmental problems u Exacerbation of mental-health problems u Isolation; computer gamers may substitute online games for interpersonal interaction u Online gambling can be addictive u Many users find PCs stressful u Internet usage by children can expose them to online predators u Proliferation of pornography u Workplace problems 9 -29

Quality-of-Life Issues u. Information Technology misuse can result in u Environmental problems u Exacerbation

Quality-of-Life Issues u. Information Technology misuse can result in u Environmental problems u Exacerbation of Mental-health problems u Proliferation of pornography u Online pornographers use pop-up ads and internet search engines to troll for new customers u This means that children may be exposed to porn when involved in innocent online searches u Parents may use online blocking software like Cybersitter, Cyber Patrol, or Net Nanny to prevent this u Workplace problems 9 -30

Quality-of-Life Issues u. Parental Responses to protecting children from online porn u Online blocking

Quality-of-Life Issues u. Parental Responses to protecting children from online porn u Online blocking software u DVD filters u Videogame rating systems u The V-chip u Support legislation to require pornographers to use certain web addresses, such as. xxx domain u Monitor internet use u Be candid to your children about the threats u Save evidence and block messages to prevent cyberbullying 9 -31

Quality-of-Life Issues u. Information technology misuse can result in u Environmental problems u Exacerbation

Quality-of-Life Issues u. Information technology misuse can result in u Environmental problems u Exacerbation of mental-health problems u Proliferation of pornography u Workplace problems u Misuse of technology u Fussing with computers can waste time u Information overload 9 -32

Economic & Political Issues u. Technology may affect the gap between the rich and

Economic & Political Issues u. Technology may affect the gap between the rich and the poor u Most jobs require employees who are tech-savvy u People who are not tech-savvy won’t qualify for those jobs u Technology is being used to replace employees in traditional jobs, traditionally filled by untrained workers u. Internet is not controlled u This means that information moves freely on the internet u Nondemocratic governments can’t control internet political activism u Internet is only loosely policed, so criminals take advantage 9 -33