Law, Ethics, and Privacy Flashcards

1
Q

Cybercrime

A

broadly describes criminal activity in which computers or computer networks are a tool, a target, or a place of criminal activity

connotation of involving networks, whereas computer crime may or may not involve networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Role of computers in crimes

A

Computers as targets

Computers as storage devices

Computers as communication tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

US Computer Fraud and Abuse Act (CFAA)

A

Defines criminal sanctions against various types of abuse

Unauthorized access to computer containing:

  • -data protected for national defense
  • -banking or financial information

Unauthorized access, use, modification, destruction, disclosure of computer or information on a system operated by or on behalf of US govt.

Accessing without permission a protected computer (any computer connected to the Internet)

Transmitting code that causes damage to computers (malware)

Trafficking in computer passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Cybercrimes

A

Illegal access

Illegal interception

Data interference

System interference

Misuse of devices

Computer-related forgery

Offenses related to child pornography

Infringement of copyright and related rights

Attempt and aiding or abetting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Difficulties for law enforcement agencies

A

Proper investigation requires sophisticated grasp of technology

Lack of resources (not enough computer processing power, communications capacity, or storage capacity)

Global nature of cybercrime and lack of cooperation with remote law enforcement agencies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Intellectual property

A

any intangible asset that consists of human knowledge and ideas. Examples include software, data, novels, sound recordings, the design of a new type of mousetrap, cure for a disease.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Three types of intellectual property and infringment

A

Patents
–unauthorized making, using, or selling

Trademarks
–unauthorized use or colorable imitation

Copyrights
-unauthorized use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Infringement

A

the invasion of the rights secured by copyrights, trademarks, or patents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Intellectual property relevant to Network and Computer Security

A

Software

  • programs produced by vendors of commercial software, shareware, proprietary software created by org for internal use, software produced by individuals
  • copyright available
  • some cases, patent protection available

Databases

  • data collected and organized in a fashion that has potential commercial value
  • copyright

Digital content
-audio files, video files, multimedia, courseware, Web site content

Algorithms
-RSA public key cryptosystem, patented from 1980 until expiration in 2000

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Digital Millennium Copyright Act

A

Intellectual property: music, software piracy

Digital objects can be copyrighted.

It is a crime to circumvent or disable anti piracy functionality built into an object.

It is a crime to manufacture, sell, and distribute devices that disable anti piracy functionality or copy objects.

Research, educational exclusions (e.g., libraries can make up to three copies for lending).

RIAA lawsuits & P2P music sharing – electronic frontier foundation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Digital Rights Management

A

Systems and procedures that ensure that holders of digital rights are clearly identified and receive the stipulated payment for their works

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Privacy

A

A user’s ability to control how data pertaining to him/her can be collected, used and shared by someone else.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is private?

A
Financial statements, credit card statements, banking records etc.
Health/medical conditions
Legal matters
Biometrics (e.g., fingerprints)
Political beliefs
School and employer records
Web browsing habits? What do we search, what do we browse? Websites we visit?
Communication (emails and calls)
Past history (right to be forgotten
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is not private?

A

Where I live? My citizenship?

I am registered to vote? (US)

My salary (state employee because Georgia Tech is a public university)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Threats to Privacy

A

Traffic analysis (we know who you talk to)

Surveillance (scale and magnitude – cameras everywhere, Snowden disclosures)

Linking and making inferences (big data, data mining, analytics)

Social media (we know your friends)

Tracking of web browsing (cookies)

Location aware applications (we know where you have been)

Sometimes we are willing parties (loyalty cards in stores)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Privacy Threats to Online Tracking Info

A

Collection of information about you (e.g., tracking) – with or without your consent?
Usage – only used for specified purpose you agreed to?

Information retention – how long can they keep it?

Information disclosure and sharing – disclosed to only authorized or agreed to parties?

Privacy policy changes – can information collector/holder change to a more lax policy without your agreement?

Information security – identity and access management, monitoring, secure against various threats we discussed.

17
Q

Privacy Enhancing Technologies

A

Tor (network traffic analysis would not allow someone to know where we are coming from)

Onion routing is the basic idea

  • -With the help of a directory service, get a set of nodes
  • -Random set and order
  • -Alice prepares a message and creates onion layers with encryption

Pseudo-anonymity (fake or fictional identities), multiple identities etc.

Aggregation, privacy enhancing transformations (generalization, anonymizing, diverse data values etc.)

18
Q

Difference between law and ethics

A

Individual standard vs. societal

No external arbiter and enforcement unlike law

Examples – What do you do when you discover a vulnerability in a commercial product? Ethical disclosure?

Code of ethical conduct (IEEE, ACM, university)

19
Q

Ethical issues arise in these contexts as the result of computers

A

Repositories and processors of information

Producers of new forms and types of assets

Instruments of acts

Symbols of intimidation and deception

20
Q

Code of conducts themes

A

dignity and worth of other people

personal integrity and honesty

responsibility for work

confidentiality of information

public safety, health, and welfare

participation in professional societies to improve standards of the profession

the notion that public knowledge and access to technology is equivalent to social power