CSCI 21 215 Soc ocial & Eth thical Iss Issues In In Com - - PowerPoint PPT Presentation

csci 21 215 soc ocial eth thical iss issues in in com
SMART_READER_LITE
LIVE PREVIEW

CSCI 21 215 Soc ocial & Eth thical Iss Issues In In Com - - PowerPoint PPT Presentation

CSCI 21 215 Soc ocial & Eth thical Iss Issues In In Com omputing Class 8 Hackers, Hacktivists, Personal Responsibility Not otes Homework 2 is Due Tonight Homework 3 will be posted sometime Tomorrow (?) Homework 3s


slide-1
SLIDE 1

CSCI 21 215 Soc

  • cial & Eth

thical Iss Issues In In Com

  • mputing

Class 8 – Hackers, Hacktivists, Personal Responsibility

slide-2
SLIDE 2

Not

  • tes
  • Homework 2 is Due Tonight
  • Homework 3 will be posted sometime Tomorrow (?)
  • Homework 3’s deadline will be next Friday at 11:59pm, not Thursday
  • No Class on Monday
  • COMPUTER MUSEUM on Tuesday
  • Bring (at least) $3
  • 4:00pm: I will walk from this room to the traffic light at 11th and Kagy (in front
  • f town and country)
  • 4:15pm: we will walk from the aforementioned traffic light to the computer

museum

  • 4:30pm: Tour starts
slide-3
SLIDE 3

Disc iscussio ion war arm up up

  • Slacktivism:
slide-4
SLIDE 4

Disc iscussio ion war arm up up

  • Slacktivism: actions performed via the Internet in support of a

political or social cause but regarded as requiring little time or involvement

  • Is there a case for Slactivism?
slide-5
SLIDE 5

Aar aron Swar artz

  • 14 Years old: Co-wrote RSS Specifications
  • Rich Site Summary / Really Simple Syndication
  • Went to Stanford but dropped out after a year
  • Help create Reddit
  • Internet Activism against censorship
  • Distributes academic papers
  • Distributed Public Access to Court Electronic Records (PACER), which

normally cost $0.08 a page

slide-6
SLIDE 6

Aar aron Swar artz

slide-7
SLIDE 7

Ano nonymous – a a tim timelin ine

2006: Elaborate online pranks organize into “Raids”

slide-8
SLIDE 8

Ano nonymous – a a tim timelin ine

2008: Pranks Scientology, followed be a division of the group: Morals vs Pranks

slide-9
SLIDE 9

Ano nonymous – a a tim timelin ine

2009: Anonymous sets up forums after protest breaks out in Iran, and helps protestors hide identity from government officials.

slide-10
SLIDE 10

Ano nonymous – a a tim timelin ine

2010: Major credit cards disallow contributions to WikiLeaks. Anonymous takes down Visa and PayPal Websites.

slide-11
SLIDE 11

Ano nonymous – a a tim timelin ine

2010: Create Chatrooms for protestors in Tunisia, provides software to help Tunisians get around government internet blocks.

slide-12
SLIDE 12

Ano nonymous – a a tim timelin ine

2011: Anonymous offshoot breaks into Stratfor, stole credit card numbers, and donated half a million dollars to charities.

slide-13
SLIDE 13

Ano nonymous – a a tim timelin ine

2011: Anonymous takes down more than 40 child pornography sites, leaked 1,589 active member names to the public

slide-14
SLIDE 14

Ano nonymous – a a tim timelin ine

2011: San Francisco Bay Area Rapid Transit (BART) turn off cell coverage to prevent a protest after a fatal shooting of an unarmed passenger by the BART

  • police. Posted member’s/officer’s information online, organized several

protests BART spokesperson refused to acknowledge it was a mistake to take down cell service, so Anonymous posted nude picture of him online.

slide-15
SLIDE 15

Ano nonymous – a a tim timelin ine

2012: DOJ raids file uploading site MegaUpload, Anonymous retaliates by taking down several government websites, including DOJ

slide-16
SLIDE 16

Ano nonymous – a a tim timelin ine

2014 - 2015: Police killed Michael Brown, a black teenager in Ferguson,

  • Missouri. Members of the Klan threatened to use deadly force against those

they considered “terrorists masquerading as ‘peaceful protesters.’” Anonymous released several names of known members, criminals, and suspected FBI informants, and withheld several names for further investigation

slide-17
SLIDE 17

Change in topic, let’s reset with a 5 minute br break

slide-18
SLIDE 18

http://www.ted.com/talks/james_lyne_everyday_cybercrime_a nd_what_you_can_do_about_it

slide-19
SLIDE 19

Sec ecurit ity, the the Basi asics

  • Change your password and underwear often - and for the same
  • reason. DO NOT reuse the same password for various sites
  • Be informed on recent security threats and keep software up-to-

date

  • Be aware of secure connections (HTTPS vs HTTP)
  • HTTP: Hypertext Transfer Protocol
  • HTTPS: Hypertext Transfer Protocol Secure
  • SSL: Secure Sockets Layer (Secure Certificate)
slide-20
SLIDE 20

Sec ecurit ity, the the Basi asics

  • NEVER share personal information such as password, bank

accounts, etc.

  • Probably ever in general – but never over email
  • Don’t share your password, just.. .just don’t do it
  • http://www.cnet.com/news/want-a-job-give-bozeman-your-facebook-

google-passwords/

  • http://abcnews.go.com/Technology/JobClub/story?id=7879939
slide-21
SLIDE 21

https://www.youtube.com/watch?v=ABP1sXM-_AM

Bozeman Asks for Passwords

slide-22
SLIDE 22

Disc iscussio ion

  • Is it appropriate - on some level - to require

passwords, as a means to detect morals of important roles, such as law enforcement?

slide-23
SLIDE 23

Sec ecurit ity, the the Basi asics

  • Use one (and only one) good anti-virus program
  • Be careful about what information you make public on

social media

  • For example: Your birthdate and birth town can make it

possible to guess your SSN

  • Be careful of what you click on
slide-24
SLIDE 24

It’s a scary world out there: Som

  • me thi

things you

  • u can

an do do

Outsource your passwords to a robot

slide-25
SLIDE 25

It’s a scary world out there: Som

  • me thi

things you

  • u can

an do do

Outsource your passwords to a robot

  • DEMO
  • https://myspace.com/signup/email
slide-26
SLIDE 26

It’s a scary world out there: Som

  • me thi

things you

  • u can

an do do

Use two-factor authentication wherever possible

  • Debit Card and Pin (old school)
  • Random number sent by text message
  • Special App
  • e.g. Google Authenticator
  • U2F key (Universal Second Factor)
  • Physical “key” that uses technology similar to smart cards technology
slide-27
SLIDE 27

It’s a Scary world out there: Som

  • me thi

things you

  • u can

an do do

Encrypt!

  • Encrypt individual files
  • Enable Disk Encryption
  • Difference between losing your device and losing your

identity

  • Con, if you damage your entire drive it is difficult to

recover

  • http://www.gfi.com/blog/the-top-24-free-tools-for-data-

encryption/

slide-28
SLIDE 28

It’s a Scary world out there: Som

  • me thi

things you

  • u can

an do do

Cover your webcam /Password protect webcams

  • Remote Access Tool, or RAT
  • Covertly using webcams (even without turning on the

‘camera is in use’ light):

  • NSA, FBI, and other Governments
  • Equipment Rentals
  • Previously owned laptops
  • Perverts
slide-29
SLIDE 29

It’s a Scary world out there: Som

  • me thi

things you

  • u can

an do do

  • Can cover camera’s with:
  • Stickers
  • Sticky notes
  • Commercially available products
  • Plug dummy plug into microphone jack
slide-30
SLIDE 30

Disc iscussio ion

  • What did I miss? How do you stay safe?