Download Cybercrime and Cyber Terrorism and more Exams Cybercrime, Cybersecurity and Data Privacy in PDF only on Docsity!
Cybercrime and Cyber Terrorism
Social, Political, Ethical and Psychological Dimensions
Hacker
- (^) Hacker is a word used to mean someone who illegally breaks into a computer or network or writes a malicious code.
- (^) Modern day cybercriminals work like “Pros”. They use methods of planning cyberattacks and tools used by hackers to exploit security weaknesses.
- (^) Privacy is the right to be left alone and the right to be free of unreasonable personal intrusions.
Intellectual Property in Cyberspace
- (^) Intellectual Property is a number of distinct types of creations of the mind, such as inventions; literary and artistic works; and symbols, names, images, and designs used in commerce.
- (^) The term “Intellectual property” denotes the specific legal rights assigned to authors, inventors and other IP holders who may exercise those rights; however the term does not denote the intellectual work itself.
Intellectual Property in Cyberspace
- (^) IP laws are meant to protect varied forms of subjects as below: - (^) Copyright - (^) Patent - (^) Trademark - (^) Trade Secret - (^) Trade Name - (^) Domain Name
Patent
- (^) A “Patent” is a document that grants the holder exclusive rights on an invention for a fixed number of years.
- (^) “Patent” is the term usually refers to a privilege, that is, a right granted to one who invents or discovers a new method or a useful process, machine, article of manufacture or composition of matter or any new and useful improvement thereof.
Trademark
- (^) “Trademarks” are the symbols used by businesses to identify their goods and services; government registration of the trademark confers exclusive legal right to its use.
- (^) A TM is a type of IP, and typically comprises a name, word, phrase, logo, symbol, design, image or a combination of all of these.
Trade Name
- (^) A “Trade Name” also known as trading name or business name, is the name that a business trades under for commercial purposes.
- (^) Its registered legal name is used for contracts and other formal situations.
Domain Name
- (^) Registering DNS mapping IP addresses.
- (^) Associated with domain names is a phenomenon called as “Cybersquatting”.
Ethical Dimensions of Cyber Crime
Ethical Hackers: Good Guys in bad land
Hackers and Cybercriminals: Evolution and
Technical Prowess and Skills
- (^) There are several levels of expertise in hacking…they are - (^) Black Hat Hacker & - (^) White Hat Hackers
Inside the minds of Hackers and Criminals
- (^) The basic motives behind web attacks and hacking are: - (^) Money - (^) Freedom (Hacktivists and Neo Hackers) - (^) Love - (^) Personal Gain (Script Kiddie or Skiddie)
Generation of Hackers: 1 st^ Gen: Creative Programmer breed. Creative Programmers and Scientists , they had some sense of ethics and would do right things within their boundary 2 nd^ Gen: Computer evolutionary They are more hardware hackers used kits like Altair and Apple 3 rd^ Gen: Games and Copyright Breakers Breaks protection and copyrights of games , they are involved with minor criminal activities 4 th^ Gen: Criminals & Cyberpunks They are criminal oriented and motivated primarily by Greed , Power, revenge & Malicious Intent Coders are motivated by a sense of power and prestige. They are revered in their community but dangerous to us they have hidden agendas such as writing deadly codes like TROGANS ……… Evolution of Technical Prowess and Skills
Ethical Hackers
- (^) Cyberterorists are well funded and they are also quite very motivated… They thrive due to the opportunities they get for mixing political rhetoric with criminal activity
- (^) Ethical Hackers: They seek answer some basic questions:-
- (^) To what information, location and systems an intruder can gain access? What is being protected?
- (^) What are you trying to protect against?
- (^) When an intruder gains access, what can he/she see on the target facilities, networks and systems?
- (^) What can an intruder do with that information and data?
- (^) Does anyone at the target notice the intruders attempts or successes?
- (^) How much time, effort and money are you willing to expend to obtain adequate protection?