dr. ahmad r. hadaegh a.r. hadaegh and sahar mosleh california state university san marcos (csusm)...

27
Dr. Ahmad R. Hadaegh A.R. Hadaegh and Sahar Mosleh California State University San Marcos (CSUSM) Page 1 Internet Computer Ethics Computer Viruses The content of this lecture are obtained from http://www.csusm.edu/iits/ccr/ and has been slightly modified by Dr. A. R Hadaegh and Sahar Mosleh

Upload: roland-chester-fleming

Post on 25-Dec-2015

228 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Dr. Ahmad R. Hadaegh A.R. Hadaegh and Sahar Mosleh California State University San Marcos (CSUSM) Page 1 Internet Computer Ethics Computer Viruses The

Dr. Ahmad R. Hadaegh A.R. Hadaegh and Sahar Mosleh California State University San Marcos (CSUSM) Page

1

Internet

Computer Ethics

Computer Viruses

The content of this lecture are obtained from http://www.csusm.edu/iits/ccr/ and has been slightly modified by Dr. A. R Hadaegh and Sahar Mosleh

Page 2: Dr. Ahmad R. Hadaegh A.R. Hadaegh and Sahar Mosleh California State University San Marcos (CSUSM) Page 1 Internet Computer Ethics Computer Viruses The

Dr. Ahmad R. Hadaegh A.R. Hadaegh and Sahar Mosleh California State University San Marcos (CSUSM) Page

2

Internet • Internet is a network of networks of computers that provides two

basic capabilities: information retrieval (searching) and worldwide communication (linking to other sites).

• The idea of internet started in 1969 in the Department of Defense in United State to create a network with no central authority:

• Each node (computer) would be equal to every other node (computer), with the ability to originate, pass, and receive messages.

• The path that a particular message took in getting to its destination would not matter. The message would be passed from node to node until it reached its destination.

• The project originally as the ARPANet (Advanced Research Projects Agency Network), that was the first network of four computers. It has grown to include tens of millions of computers.

Page 3: Dr. Ahmad R. Hadaegh A.R. Hadaegh and Sahar Mosleh California State University San Marcos (CSUSM) Page 1 Internet Computer Ethics Computer Viruses The

Dr. Ahmad R. Hadaegh A.R. Hadaegh and Sahar Mosleh California State University San Marcos (CSUSM) Page

3

• World Wide Web (www): It is a subnet of the Internet that allows information (text, graphics, audio, & video) to be shared among computers which have browsers and a connection to the Internet.

• Subnet is a portion of a network that shares a common address component (ex: all devices with addresses that start with 100.100.100)

• Each document can contain hyperlinks to other documents which may be on the same computer or on a different computer. The hyperlinks may reference text files, graphic, sound, and video.

• HTML: It is a universal language used to write the documents in the Web. HTML ((HyperText Mark Up Language) is read by the browsers (e.g. Internet Explorer and Netscape). Computers in the Web are accessed by their URL (Uniform Resource Locator).

Page 4: Dr. Ahmad R. Hadaegh A.R. Hadaegh and Sahar Mosleh California State University San Marcos (CSUSM) Page 1 Internet Computer Ethics Computer Viruses The

Dr. Ahmad R. Hadaegh A.R. Hadaegh and Sahar Mosleh California State University San Marcos (CSUSM) Page

4

• URL: A URL is a web address. A server computer has a URL and a computer that connects to the server is called a client.

• A client may be a server and a server may be a client. A URL has the form: transfer method, Web site address, directories, and documents.

• For example in URL http://courses.csusm.edu “courses” is the name of the server and “csusm” is the location that reside under the edu network. Common network names are com, net, org, and edu.

Page 5: Dr. Ahmad R. Hadaegh A.R. Hadaegh and Sahar Mosleh California State University San Marcos (CSUSM) Page 1 Internet Computer Ethics Computer Viruses The

Dr. Ahmad R. Hadaegh A.R. Hadaegh and Sahar Mosleh California State University San Marcos (CSUSM) Page

5

• Using http, every client would be can able to display the documents from every server. This is done through http.

• http: It stands for HyperText Transfer Protocol. A protocol is impose of a set of a set of standards, to govern the way data is transmitted across the Web.

• Further, in order for a machine to access another server/client it needs to have access to the Internet. This is done by ISP.

• ISP: It stands for Internet Service Provider. An ISP typically provides access of a server and/or client to internet.

Page 6: Dr. Ahmad R. Hadaegh A.R. Hadaegh and Sahar Mosleh California State University San Marcos (CSUSM) Page 1 Internet Computer Ethics Computer Viruses The

Dr. Ahmad R. Hadaegh A.R. Hadaegh and Sahar Mosleh California State University San Marcos (CSUSM) Page

6

• Search Engines: They programs which help the client find a server in the web

• In order to keep their database of web sites as current as possible, the search engines use a spider program which continually searches the Web for new pages and adds them to the data base.

• Each search engine (Yahoo, Dogpatch, Google, etc) have their own database of information and links.

• Hits: Items returned as matching your search query from your search engine are called hits.

• You can limit the number of hits and be more successful and efficient in your search by giving some thought to the keyword/s used in the query and taking advantage of the Boolean Operators And, Or and Not.

• For example, American or Airlines is not as efficient as American Airlines and Not Arena. The way in which you specify the Boolean operator depends on the search engine and is described in its online help.

Page 7: Dr. Ahmad R. Hadaegh A.R. Hadaegh and Sahar Mosleh California State University San Marcos (CSUSM) Page 1 Internet Computer Ethics Computer Viruses The

Dr. Ahmad R. Hadaegh A.R. Hadaegh and Sahar Mosleh California State University San Marcos (CSUSM) Page

7

• Copyright: It is the exclusive rights given to the author(s) to the use and reproduction of written or artistic work, except as governed under the fair use exclusion.

• Copyright Protection on the Web is the same as copyright protection in any print media. You should assume that every thing on the Web is copyright unless it says it is in the public domain.

• It is considered fair use to use a portion of a work for educational or nonprofit purposes or for the purpose of critical review or commentary.

• Facts are not covered by copyright so you can use statistical and other data without fear of infringement as long as you cite the original work in your footnotes and/or bibliography.

Page 8: Dr. Ahmad R. Hadaegh A.R. Hadaegh and Sahar Mosleh California State University San Marcos (CSUSM) Page 1 Internet Computer Ethics Computer Viruses The

Dr. Ahmad R. Hadaegh A.R. Hadaegh and Sahar Mosleh California State University San Marcos (CSUSM) Page

8

• eComerce: it is the exchange of goods and services over the Internet, usually via the Web.

• Cookies: They are small files that are placed on the client computer by a server. Cookies make it possible to personalize the client’s interaction with the server. They can also compromise the privacy and security of the client’s computer.

In Summary:Perhaps, after the invention of the computer itself and the Integrated Circuit which made personal computers possible, internet was the most important invention of the twentieth century.

Page 9: Dr. Ahmad R. Hadaegh A.R. Hadaegh and Sahar Mosleh California State University San Marcos (CSUSM) Page 1 Internet Computer Ethics Computer Viruses The

Dr. Ahmad R. Hadaegh A.R. Hadaegh and Sahar Mosleh California State University San Marcos (CSUSM) Page

9

Ethics

and

Computer Viruses

Page 10: Dr. Ahmad R. Hadaegh A.R. Hadaegh and Sahar Mosleh California State University San Marcos (CSUSM) Page 1 Internet Computer Ethics Computer Viruses The

Dr. Ahmad R. Hadaegh A.R. Hadaegh and Sahar Mosleh California State University San Marcos (CSUSM) Page

10

• Software Copyright: In essence, a copyright is a bundle of valuable rights and privileges that gives the owner of the copyright the exclusive right to distribute, copy, display, and alter the copyrighted work.

• The law, governing copyrights in the United States, is the Copyright Act of 1976, found in title 17 of the U.S. Code. The laws, recognizing and dealing with software, were incorporated into the code in 1980.

• It is not the ideas behind the work (whether a novel, textbook, company logo, software program, or motion picture) that the copyright protects, but the expression of the ideas in the work.

• Thus, it is not possible to copyright the concept of the spreadsheet application, but it is possible to copyright the way a spreadsheet looks and works.

Page 11: Dr. Ahmad R. Hadaegh A.R. Hadaegh and Sahar Mosleh California State University San Marcos (CSUSM) Page 1 Internet Computer Ethics Computer Viruses The

Dr. Ahmad R. Hadaegh A.R. Hadaegh and Sahar Mosleh California State University San Marcos (CSUSM) Page

11

• Life time of copyright: It is the number of years a copyright last.

• A copyright does not last forever. For an individual work, the copyright lasts for the author's life plus 50 years.  

• For a joint or "made for hire" work, copyright lasts 75 years after publication or 100 years after creation.  

Page 12: Dr. Ahmad R. Hadaegh A.R. Hadaegh and Sahar Mosleh California State University San Marcos (CSUSM) Page 1 Internet Computer Ethics Computer Viruses The

Dr. Ahmad R. Hadaegh A.R. Hadaegh and Sahar Mosleh California State University San Marcos (CSUSM) Page

12

• Ownership of a copyright may vary, depending on several factors. 

• In the case of a person working on their own and for themselves, the copyright automatically belongs to that person. 

• In a large company, dozens of programmers may work on a single application.  Each of those programmers probably signed a contract which stated that all work done by the programmer became the property of the company.

• This is perfectly legal, and usual. As a result, most software copyrights are owned by the company that distributes the program (Microsoft, Adobe, Macromedia, etc) not the people who created the program.

Page 13: Dr. Ahmad R. Hadaegh A.R. Hadaegh and Sahar Mosleh California State University San Marcos (CSUSM) Page 1 Internet Computer Ethics Computer Viruses The

Dr. Ahmad R. Hadaegh A.R. Hadaegh and Sahar Mosleh California State University San Marcos (CSUSM) Page

13

• License: A license is a contract that you agree to sign a set of terms with the owner of a product you purchase (use).

• Licensee: Limited number of rights that a license grants the customers (users) of a product.

• These usually include the rights • to use the software and manuals, • to make a single backup copy of the program for your own

use, and • the right to install the software on a machine that you own.

• Some of the Restrictions placed on the licensee include:• prohibitions on copying, • distributing, modifying, adapting, renting or leasing, • selling for profit, • exporting to a foreign county, • using on more than one computer at a time, or decompiling the

software.

Page 14: Dr. Ahmad R. Hadaegh A.R. Hadaegh and Sahar Mosleh California State University San Marcos (CSUSM) Page 1 Internet Computer Ethics Computer Viruses The

Dr. Ahmad R. Hadaegh A.R. Hadaegh and Sahar Mosleh California State University San Marcos (CSUSM) Page

14

• Licenses come in various forms. Single user licenses, multi-user licenses, and site licenses.

• Single user License: It is a license that allows the user to install the software on one machine that they own and make one back-up copy for their own use. 

• Multi-user License: A multi-user or multi-machine license allows the user to install the software on multiple machines owned by the institution, company, or individual usually limited by a specific number of installs.

• Site License: A site license allows the user to install the software on all computers owned by the company, institution, or individual at a particular location.

Page 15: Dr. Ahmad R. Hadaegh A.R. Hadaegh and Sahar Mosleh California State University San Marcos (CSUSM) Page 1 Internet Computer Ethics Computer Viruses The

Dr. Ahmad R. Hadaegh A.R. Hadaegh and Sahar Mosleh California State University San Marcos (CSUSM) Page

15

• Infringement of copyright: It is any instance where any right reserved to the copyright is violated

• In other words, if you copy, distribute or alter any software without permission of the copyright owner, you have violated the copyright laws.

• The violation of copyright has an economic cost to the copyright owner and is thought to be a disincentive to creativity and original expression.

• Since the U.S. Constitution protects the right of personal expression, violation of a copyright is viewed as infringement of the rights of the individual and thus as a harm to society as a whole.

• Accordingly, willful violation of a copyright is a criminal as well as a civil offense.  The maximum penalty for copyright infringement is $50,000 and one year in jail.

Page 16: Dr. Ahmad R. Hadaegh A.R. Hadaegh and Sahar Mosleh California State University San Marcos (CSUSM) Page 1 Internet Computer Ethics Computer Viruses The

Dr. Ahmad R. Hadaegh A.R. Hadaegh and Sahar Mosleh California State University San Marcos (CSUSM) Page

16

• Copyright protection on the web is the same as copyright protection in any print media.

• You should assume that every thing on the web is copyright unless it says it is in the public domain.

• Copyright gives the authors exclusive rights to the use and reproduction of written or artistic work, except as governed under the fair use exclusion.

• It is considered fair use to use a portion of a work for educational or nonprofit purposes or for the purpose of critical review or commentary.

• Facts are not covered by copyright so you can use statistical and other data without fear of infringement. For example, you can quote a site, or download an image or other information from the web, provided you cite the original work in your footnotes and/or bibliography.

Page 17: Dr. Ahmad R. Hadaegh A.R. Hadaegh and Sahar Mosleh California State University San Marcos (CSUSM) Page 1 Internet Computer Ethics Computer Viruses The

Dr. Ahmad R. Hadaegh A.R. Hadaegh and Sahar Mosleh California State University San Marcos (CSUSM) Page

17

• Software Piracy: Pirating software is the act of making an illegal copy of a program either for your own use or for distribution to others.

• If you are caught pirating software from a university computer, you will be subject to immediate expulsion from CSUSM.

• In addition, you may be referred to the copyright owner of the pirated software so that they may pursue civil and criminal proceedings against you.

• It is estimated that 30-50% of all software being used in the United States is being used illegally in violation of copyright laws. 

Page 18: Dr. Ahmad R. Hadaegh A.R. Hadaegh and Sahar Mosleh California State University San Marcos (CSUSM) Page 1 Internet Computer Ethics Computer Viruses The

Dr. Ahmad R. Hadaegh A.R. Hadaegh and Sahar Mosleh California State University San Marcos (CSUSM) Page

18

• Computer Viruses: They are programs (pieces of executable code) which take over their host's internal processes for the purpose of replicating themselves and/or may damage hardware, software, or data of the host computer.

• Most viruses consist of two parts. • The first part consists of instructions that enable the virus to

spread from computer to computer.  • The second part consists of instructions that tell the virus

what to do in the host computer.

• Viruses on the PC are generally more destructive than viruses on the Macintosh. 

• There are also considerably more viruses in circulation for the PCs than for the Macintoshes partly because in general it is easier to write viruses for the PC than for the Macintosh. 

• There are currently several hundred known PC viruses.

Page 19: Dr. Ahmad R. Hadaegh A.R. Hadaegh and Sahar Mosleh California State University San Marcos (CSUSM) Page 1 Internet Computer Ethics Computer Viruses The

Dr. Ahmad R. Hadaegh A.R. Hadaegh and Sahar Mosleh California State University San Marcos (CSUSM) Page

19

• Computer Worm: A worm is a subclass of virus. A worm generally spreads without user action and distributes complete copies (possibly modified) of itself across networks.

• A worm can exhaust memory or network bandwidth, causing a computer to stop responding.

• Trojan horse: It is a destructive program that pretends to be a good application but in fact it can damage your files.

• Unlike viruses, Trojan horses do not replicate themselves but they can just be as destructive.

• One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer is a virus that appears to be a useful program, but can still does damage the host computer.

Page 20: Dr. Ahmad R. Hadaegh A.R. Hadaegh and Sahar Mosleh California State University San Marcos (CSUSM) Page 1 Internet Computer Ethics Computer Viruses The

Dr. Ahmad R. Hadaegh A.R. Hadaegh and Sahar Mosleh California State University San Marcos (CSUSM) Page

20

• Spyware: It is a program that is put in someone's computer to secretly gather information about the user and relay it to advertisers or other interested parties.

• Spyware can get in a computer as a software virus or as the result of installing a new program. 

• adware: It is any software application in which advertising banners are displayed while the program is running. 

• aware has been criticized because it usually includes code that tracks a user's personal information and passes it on to third parties, without the user's authorization or knowledge.

• How do the virus spread? Viruses are usually disguised (hidden) and can enter your computer by:

• Receiving emails and opening email attachments • Internet downloads • Web pages • Software and files on CD ROMs or floppy discs

Page 21: Dr. Ahmad R. Hadaegh A.R. Hadaegh and Sahar Mosleh California State University San Marcos (CSUSM) Page 1 Internet Computer Ethics Computer Viruses The

Dr. Ahmad R. Hadaegh A.R. Hadaegh and Sahar Mosleh California State University San Marcos (CSUSM) Page

21

High-risk behaviors

• The following activities are among the most common ways of getting computer viruses. Minimizing the frequency of these activities will reduce your risk of getting a computer virus:

• Freely sharing computer programs and system disks, or downloading files and software through file-sharing applications such as KaZaA

• Downloading executable software from public-access bulletin boards or Web sites

• Using your personal disk space (e.g., floppy disks, CFS account) with public computers or other computers that are used by more than one person

• Opening email attachments without first scanning them for viruses.

• Opening any email attachment that ends in .exe, .vbs, or .lnk on a computer running Microsoft Windows.

Page 22: Dr. Ahmad R. Hadaegh A.R. Hadaegh and Sahar Mosleh California State University San Marcos (CSUSM) Page 1 Internet Computer Ethics Computer Viruses The

Dr. Ahmad R. Hadaegh A.R. Hadaegh and Sahar Mosleh California State University San Marcos (CSUSM) Page

22

• Symptoms of viruses, worms, and Trojan horse viruses include:

1. The infected file may make copies of itself. This may use all the free space in your hard disk.

2. A copy of the infected file may be sent to all the addresses in your e-mail address list.

3. The virus may reformat your disk drive and delete your files and programs.

4. The virus may install hidden programs, such as pirated software.

5. The virus may reduce security. This could allow intruders to remotely access your computer or network

6. You received an e-mail message that has a strange attachment. When you open the attachment, dialog boxes appear or a sudden degradation in system performance occurs.

7. There is a double extension on an attachment that you recently opened, such as .jpg.vbs or .gif.exe.

Page 23: Dr. Ahmad R. Hadaegh A.R. Hadaegh and Sahar Mosleh California State University San Marcos (CSUSM) Page 1 Internet Computer Ethics Computer Viruses The

Dr. Ahmad R. Hadaegh A.R. Hadaegh and Sahar Mosleh California State University San Marcos (CSUSM) Page

23

8. An antivirus program is disabled for no reason and it cannot be restarted.

9. An antivirus program cannot be installed on the computer or it will not run.

10. Strange dialog boxes or message boxes appear onscreen.

11. Someone tells you that they have recently received e-mail messages from you containing attached files (especially with .exe, .bat, .scr, and .vbs extensions) that you did not send.

12. New icons appear on the desktop that you did not put there, or are not associated with any recently installed programs.

13. Strange sounds or music plays from the speakers unexpectedly.

14. A program disappears from the computer, but you did not intentionally remove it

15. Antivirus software indicates that a virus is present

16. **** Your computer suddenly slows down.*****

Page 24: Dr. Ahmad R. Hadaegh A.R. Hadaegh and Sahar Mosleh California State University San Marcos (CSUSM) Page 1 Internet Computer Ethics Computer Viruses The

Dr. Ahmad R. Hadaegh A.R. Hadaegh and Sahar Mosleh California State University San Marcos (CSUSM) Page

24

Protection • Get Virus Protection Software and keep it updated and scan all

external storage media often.

• Lock your diskettes when using them to transport files to other computers.

• Beware when using a computer that is not your own.

• Beware of downloaded software.

• Beware of attachments to emails, especially from unknown sources -DO NOT open suspicious attachments.

• Install a firewall and pay attention to what is asking for permission to connect online.

Page 25: Dr. Ahmad R. Hadaegh A.R. Hadaegh and Sahar Mosleh California State University San Marcos (CSUSM) Page 1 Internet Computer Ethics Computer Viruses The

Dr. Ahmad R. Hadaegh A.R. Hadaegh and Sahar Mosleh California State University San Marcos (CSUSM) Page

25

• Firewall: A firewall is a piece of software or hardware that creates a protective barrier between your computer and potentially damaging content on the Internet.

• Firewall helps guard your computer against malicious users and many computer viruses and worms. 

• Security Update: Security updates help shield your computer from vulnerabilities, viruses, worms, and other threats as they are discovered.  

• Antivirus: Antivirus software helps protect your computer against most viruses, worms, Trojans, and other malicious programs. 

• Many computers come with antivirus software installed.  

• For more information about viruses and virus protection visit the following web sites:

• www.howstuffworks.com/virus.htm  • www.trendmicro.com/en/security/general/virus/overview.htm • www.spychecker.com/spyware.html

Page 26: Dr. Ahmad R. Hadaegh A.R. Hadaegh and Sahar Mosleh California State University San Marcos (CSUSM) Page 1 Internet Computer Ethics Computer Viruses The

Dr. Ahmad R. Hadaegh A.R. Hadaegh and Sahar Mosleh California State University San Marcos (CSUSM) Page

26

• Phishing attacks: It is the use of social engineering and technical subterfuge (trick) to steal consumers' personal identity data and financial account credentials.

• It is the act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft

• Pharming: It is a hacker's attack aiming to redirect a website's traffic to another (bogus) website.

• Pharming can be conducted either by changing the hosts file on a victim’s computer or by exploitation of a vulnerability in Domain Name Server (DNS) software.

• DNS servers are computers responsible for resolving internet names into their real addresses — they are the "signposts" of the Internet. Compromised DNS servers are sometimes referred as "poisoned".

Page 27: Dr. Ahmad R. Hadaegh A.R. Hadaegh and Sahar Mosleh California State University San Marcos (CSUSM) Page 1 Internet Computer Ethics Computer Viruses The

Dr. Ahmad R. Hadaegh A.R. Hadaegh and Sahar Mosleh California State University San Marcos (CSUSM) Page

27

• In recent years both pharming and phishing have been used to steal identity information. Pharming has become of major concern to businesses hosting ecommerce and online banking websites.

• Sophisticated measures known as anti-pharming are required to protect against this serious threat.

• Antivirus software and spyware removal software cannot protect against pharming. Pharming is becoming the attack du jour of today's hackers