Computer Applications- Unethical Computing Practices | Computer Hacking | Cyber crime | 15

Edupedia World by Exambyte
9 May 201614:57

Summary

TLDRThis video lecture by Rebecca van di Rona delves into unethical computing practices, focusing on spam, piracy, and cybercrime. It discusses the cost-effectiveness of spam for businesses, its negative impact on consumers, and methods to combat it, such as CAPTCHA. The lecture also covers software piracy's economic effects, the motives of cybercriminals, and strategies to mitigate online fraud. It touches on various types of malware, including viruses, worms, and Trojan horses, highlighting their malicious intents and the importance of ethical computing.

Takeaways

  • 📧 Spam is the misuse of email systems to send unsolicited messages, often for low-cost advertising of questionable products or services.
  • 🔎 Identifying spam can be done by analyzing the email content, sender's intent, receiver's consent, relationship between sender and receiver, sender's accountability, degree of deception, and the number of identical emails sent.
  • 💰 Spamming is a cost-effective marketing strategy for companies, but it can lead to negative public reactions, full mailboxes, and increased costs for internet users and service providers.
  • 🛡 To combat spam, email service providers like Google, Microsoft, and Yahoo use mechanisms such as CAPTCHA to ensure only humans can create accounts and send emails.
  • 📚 Piracy involves unauthorized copying or distribution of proprietary software, causing significant economic impacts, especially when committed by organizations.
  • 💼 Cybercrime is driven by monetary gain, with criminals hacking into computers to steal money or personal information, leading to complex trails for law enforcement.
  • 🛡️ E-commerce websites use encryption and other security measures to protect against online credit card fraud, but this can sometimes result in the rejection of legitimate orders.
  • 🤖 Hackers are individuals who test the limits of information systems out of intellectual curiosity, and while some view them as beneficial for identifying security flaws, most consider their actions unethical.
  • 🦠 Computer viruses are malicious codes that cause unexpected and often undesirable behavior in computers, usually spread through infected files or websites.
  • 🐛 Worms are self-replicating harmful programs that can propagate without human intervention, often causing significant disruption to organizations.
  • 🏹 Trojan horses are programs that hide malicious code within seemingly harmless software, capable of causing damage or stealing information when executed.
  • 🕵️‍♂️ There are various types of cyber attackers, including thrill-seekers, criminals, industrial spies, and terrorists, each with different objectives and levels of risk acceptance.

Q & A

  • What is spam and why is it considered an unethical computing practice?

    -Spam is the abuse of email systems to send unsolicited emails to a large number of people, often for low-cost commercial advertising or questionable products. It is unethical because it invades privacy, clogs inboxes, and can deliver harmful malware.

  • How can the content of an email help in identifying spam?

    -The content of an email can be analyzed to identify spam by looking for signs of commercial advertising, questionable products, or a lack of consent from the receiver, as well as the intent of the sender and the degree of deception.

  • What are some reasons why spamming is a widely used marketing practice despite its negative connotations?

    -Spamming is used because it is cost-effective compared to direct mail campaigns, takes less time to develop, and has a faster turnaround time for feedback.

  • How do email service providers like Google, Microsoft, and Yahoo protect against spam?

    -These providers offer mechanisms such as CAPTCHA tests to ensure that only humans can obtain free accounts, which helps prevent spammers from using their services to send spam emails.

  • What is the economic impact of software piracy and why is it significant?

    -Software piracy has a significant economic impact as it involves unauthorized copying or distribution of proprietary software, leading to lost revenue for software developers and companies.

  • How do cyber criminals typically profit from their activities?

    -Cyber criminals profit by stealing and reselling credit card numbers, personal identities, and other sensitive information, or by hacking into computers to transfer money illegally.

  • What is a computer virus and how does it affect a computer system?

    -A computer virus is a piece of malicious code that infects a computer, causing it to behave unexpectedly, often by attaching to files or executing from memory, leading to data loss, program corruption, or other undesirable effects.

  • What is the difference between a computer virus and a computer worm?

    -A computer virus requires user action to spread, such as opening an infected file, while a worm can propagate itself without human intervention, often by sending copies to other computers via email.

  • What is a Trojan horse and how can it be delivered to a user's computer?

    -A Trojan horse is a program that hides malicious code inside a seemingly harmless program. It can be delivered through email attachments, downloads from websites, or removable media devices.

  • What is a logic bomb and how does it trigger its malicious payload?

    -A logic bomb is a type of Trojan horse that executes when triggered by a specific event, such as a change in a file, a series of keystrokes, or a particular time or date.

  • Why are some people still considered hackers as performing a service by identifying security weaknesses?

    -Some believe that hackers perform a service by exposing security vulnerabilities, which can then be fixed by companies to improve their systems. However, most people view hackers as unethical due to the potential harm they can cause.

Outlines

00:00

📧 Unethical Computing Practices: Spam and Piracy

The script discusses unethical computing practices, starting with spam, which is the misuse of email systems to send unsolicited messages to many people. It often involves low-cost advertising for questionable products and is used by both illegitimate and legitimate organizations to boost sales. The script outlines how to identify spam by analyzing various factors such as the email content, sender's intent, and the consent of the receiver. It also explains the cost-effectiveness of spam as a marketing tool compared to direct mail, but highlights the negative public reaction and the significant costs it imposes on internet users and service providers. Additionally, the script touches on the use of spam to deliver malware and the measures taken by email service providers to combat it, including the use of CAPTCHA to ensure only humans can register for free email accounts. The second part of the paragraph addresses software piracy, which is the unauthorized reproduction and distribution of proprietary software, and its economic impact on organizations.

05:00

💻 Cybercrime and Cybersecurity Threats

The second paragraph delves into cybercrime, another unethical computing practice, where cybercriminals are driven by monetary gain and engage in activities such as hacking into computers to steal money or personal information. The script describes the various motivations of cybercriminals, including trail seekers, common criminals, industrial spies, and terrorists, each with different objectives and levels of risk acceptance. It also covers the impact of cybercrime on businesses, including the loss of revenue due to fraudulent transactions and the cost of implementing security measures. The paragraph outlines different security techniques used by e-commerce websites to protect against online fraud, such as encryption technology, address verification, and transaction risk scoring. The script also discusses the evolution of the term 'hacker' and the various types of computer attacks, emphasizing the growing importance of cybersecurity as technology advances.

10:00

🛡️ Malware and Cybersecurity: Understanding the Threats

The final paragraph focuses on different types of malware and their effects on computer systems and smartphones. It starts with ransomware, a form of malware that takes control of a device until a ransom is paid. The script then covers viruses, which are pieces of malicious code that cause computers to behave unexpectedly, often by attaching to files or residing in memory and infecting new files. Worms are also discussed as self-duplicating programs that can spread without human intervention, often via email. Trojan horses are explained as programs that hide malicious code within seemingly harmless software, which can lead to various harmful outcomes when executed. The paragraph concludes by discussing logic bombs, a type of Trojan that executes when triggered by a specific event. The script emphasizes the importance of understanding these threats as technology evolves and unethical practices become more sophisticated.

Mindmap

Keywords

💡Spam

Spam refers to the unsolicited emails sent in bulk, often for advertising purposes. In the video, it is discussed as a low-cost commercial advertising method, sometimes for questionable products. The script mentions how spam can be identified by analyzing the content of the email, the intent of the sender, and the consent of the receiver, among other factors.

💡Phishing

Phishing is a fraudulent method of attempting to acquire sensitive information such as usernames, passwords, and credit card details by disguising oneself as a trustworthy entity in an electronic communication. The video script alludes to phishing through the mention of spam emails that may contain links or attachments that could lead to malicious sites or software.

💡Malware

Malware, short for malicious software, includes viruses, worms, Trojan horses, ransomware, and other forms of harmful programs. The script describes how spam can be used to deliver harmful worms and other malware, which can have serious consequences for the recipients and the integrity of their systems.

💡Captcha

Captcha is a type of challenge-response test used in computing to determine whether or not the user is human. The video explains how captcha can be used to prevent automated bots from creating free email accounts that could be used for spamming, by generating tests that humans can pass but most computer programs cannot.

💡Piracy

Piracy, in the context of computing, refers to the unauthorized use or reproduction of copyrighted material, such as software. The video discusses the economic impact of software piracy and how it involves making copies of proprietary software or enabling others to access it without authorization.

💡Cybercrime

Cybercrime encompasses a wide range of illegal activities that are conducted through the internet. The script mentions cybercrime as an unethical computing practice, where criminals are motivated by monetary gain, engaging in activities such as hacking, stealing personal information, and credit card fraud.

💡Encryption

Encryption is the process of converting information or data into a code to prevent unauthorized access. The video mentions the use of encryption technology by e-commerce websites to protect sensitive information from online credit card fraud.

💡Chargebacks

Chargebacks refer to the reversal of a credit card charge that was previously made by the cardholder. The script discusses how a high rate of disputed transactions, or chargebacks, can greatly reduce a merchant's profit margin and impact customer trust.

💡CVV

CVV stands for Card Verification Value, which is the three-digit number on the back of a credit card used as an additional security feature. The video explains how asking for a CVV can help prevent fraudulent purchases by ensuring that the person making the transaction has access to the physical card.

💡Transaction Risk Scoring

Transaction risk scoring is a security technique used to analyze and score the risk associated with a particular transaction based on the customer's historical shopping patterns. The script gives an example of how unusual transactions, such as using a credit card at a high-end hotel for the first time, might trigger a high risk score and potentially result in the transaction being declined.

💡Trojan Horse

A Trojan Horse is a type of malware that disguises itself as legitimate software to trick users into downloading and executing it. The video describes how Trojan Horses can be used to enable hackers to control a computer remotely, steal sensitive information, or launch attacks against other computers.

Highlights

Rebecca van di Rona introduces the topic of unethical computing practices.

Spam is defined as the abuse of email systems for unsolicited mass emails, often for questionable products.

Legitimate organizations also use spam as a low-cost marketing method to announce new products.

Spam can be identified by analyzing email content, sender intent, receiver consequences, consent, relationship, accountability, deception, and volume.

Spamming is cost-effective compared to Direct Mail campaigns and has a faster turnaround time for feedback.

Public reaction to spam is generally negative due to the intrusion of unwanted material into email boxes.

Spam contributes to communication issues and costs internet users and service providers millions annually.

Spam is also used to deliver harmful worms and malware.

Major email service providers offer mechanisms to protect against spam, including CAPTCHA to ensure human registration.

Piracy is a form of copyright infringement involving unauthorized copying or distribution of software.

The economic impact of software piracy by organizations is significant and affects individual and organizational ethics.

Cybercrime is a profitable venue for criminals, including hacking, credit card theft, and identity fraud.

E-commerce websites use encryption and address verification to reduce online credit card fraud.

Transaction risk scoring software monitors customer shopping patterns to detect and prevent fraud.

Different types of cyber attackers have various motivations, including financial gain, competitive advantage, and destruction.

Hackers may act out of intellectual curiosity, testing information systems for vulnerabilities.

Computer viruses are malicious codes that cause unexpected and often undesirable behavior in computers.

Worms are self-duplicating harmful programs that can propagate without human intervention.

Trojan horses hide malicious code inside seemingly harmless programs to perform harmful actions.

Logic bombs are a type of Trojan that execute when triggered by a specific event.

The video concludes with a summary of analytical computing practices and a teaser for the next lecture section on application software.

Transcripts

play00:01

foreign

play00:02

[Music]

play00:09

media World 9th grade Computer

play00:12

Applications video lecture series

play00:14

[Applause]

play00:15

[Music]

play00:17

I'm Rebecca van di Rona and from this

play00:20

episode we are bringing unethical

play00:22

Computing practices

play00:26

[Music]

play00:30

we'll first start with the spams damn is

play00:34

the abuse of email systems to send

play00:37

unsolicited email to large number of

play00:39

people most spam is a form of low-cost

play00:43

commercial advertising sometimes for

play00:46

questionable products such as

play00:48

phonography funny get rich quick schemes

play00:51

and wordless stock spam is also an

play00:55

extremely inexpensive method of

play00:57

marketing used by many legitimate

play00:59

organizations for example a company

play01:02

might send email to a broad cross

play01:05

section of potential customers to

play01:08

announce the release of a new product in

play01:10

an attempt to increase initial sales

play01:13

when identifying the spam we can easily

play01:16

do that by analyzing the following areas

play01:20

in the image the content of the email

play01:22

the intent of the sender and the

play01:25

consequences of the receiver and the

play01:28

consent of the receiver relationship

play01:31

between the sender and the receiver

play01:33

accountability of the sender and the

play01:35

degree of deception and finally the

play01:38

number of identical emails sent so now

play01:41

let's look at the reasons why spamming

play01:44

is a highly used analytical practice in

play01:47

Computing the cost of creating an email

play01:49

campaign for a product or service is

play01:52

several hundred to a few thousand bucks

play01:54

compared with tens of thousands of bucks

play01:57

for Direct Mail campaigns in addition

play02:00

email campaigns take only a couple of

play02:03

weeks to develop compared with three

play02:05

months or more for Direct Mail campaigns

play02:08

and the turnaround time for feedback

play02:10

coverage 48 hours for email as opposed

play02:15

to weeks for direct mail however the

play02:17

benefits of spam to companies can be

play02:20

largely offset by The public's generally

play02:23

negative reaction to receive unsolicited

play02:26

deaths spam forces unwanted and often

play02:30

objectionable material into email boxes

play02:33

detracts from the ability of recipients

play02:35

to communicate effectively due to full

play02:37

mailboxes and relevant emails being

play02:40

hidden among many unsolicited messages

play02:43

and the cost internet users and service

play02:46

providers should afford will be millions

play02:49

of dollars annually and this spam is

play02:52

also used to deliver harmful worms and

play02:55

other malware most of the email service

play02:57

providers provide following mechanisms

play02:59

to give the protection from spans many

play03:02

companies including Google Microsoft and

play03:05

Yahoo offer free email Services

play03:09

spammers often seek to use email

play03:11

accounts from such major free and

play03:14

reputable web based email service

play03:16

providers as the spam can be sent at no

play03:20

charge and is less likely to be blocked

play03:23

spammers can defeat their registration

play03:25

process of the free email Services by

play03:28

launching a coordinated bot attack that

play03:31

can sign up for thousands of email

play03:33

accounts these accounts are then used by

play03:36

the spammers to send thousands of

play03:38

unreasonable email messages for free a

play03:41

partial solution to this problem is the

play03:44

use of captcha to ensure that only

play03:46

humans obtain free accounts capture

play03:50

completely automated public during test

play03:54

to tell computers and humans apart this

play03:57

software generates tests that human can

play04:00

pass but the most sophisticated computer

play04:03

programs can't for example humans can

play04:07

read the distorted text in this image

play04:09

but simple computer programs with image

play04:12

processing ability would not be able to

play04:14

do that okay now the next topic is

play04:17

piracy piracy is a form of copyright

play04:21

infringement that involves making copies

play04:23

of software or enabling others to access

play04:26

software to which they are not entitled

play04:29

in general form we can Define piracy as

play04:32

the using of technology in unauthorized

play04:35

ways a to reproduce copies of

play04:38

proprietary information or B distribute

play04:42

proprietor information across a computer

play04:44

network the economic impact of

play04:47

systematic software piracy by organic

play04:49

organizations is far more significant

play04:52

than the impact of a few individuals

play04:55

copying their friends program from a

play04:57

moral point of view however if

play05:00

unauthorized copying of proprietary

play05:02

software is wrong then it is just as

play05:04

strong for individuals as it is for

play05:07

organizations interested in profiting

play05:10

from it Information Technology provides

play05:13

a new and highly profitable venue for

play05:15

cyber criminals who are attracted to use

play05:18

of Information Technology for its ease

play05:21

and reaching millions of potential

play05:23

victims cyber crime is another

play05:26

analytical Computing practice cyber

play05:29

criminals are motivated by the potential

play05:31

for monetary gain and hacked into

play05:34

computers to steal Often by transferring

play05:37

money from one account to another to

play05:39

another leaving a hopelessly complicated

play05:41

trial for law enforcement officers to

play05:44

follow cyber criminals also engage in

play05:47

all forms of Computer Fraud stealing and

play05:50

reselling credit card numbers personal

play05:52

identities and cell phone IDs Etc

play05:55

because the potential for monitoring

play05:57

gain is high they can afford to spend

play05:59

large sums of money to buy the technical

play06:02

expertise and access their need from

play06:04

analytical insiders the use of stolen

play06:07

credit card information is a favorite

play06:09

Ploy of computer criminals fraud rates

play06:12

are highest for merchants who sell

play06:14

downloadable software or expensive items

play06:17

such as electronics and jewelry a high

play06:20

rate of disputed transactions known as

play06:23

chargebacks can greatly reduce a whip

play06:26

Merchant's profit margin however the

play06:29

permanent loss of Revenue caused by lost

play06:31

customer trust has far more impact than

play06:34

the cost of fraudulent purchasers and

play06:36

wall string security most companies are

play06:39

afraid to admit publicly that they have

play06:42

been hit by online fraud or hackers

play06:44

because they don't want to hurt their

play06:47

reputation to reduce the potential for

play06:49

online credit card fraud most e-commerce

play06:52

websites use some form of encryption

play06:55

technology to protect information as it

play06:58

comes in from the consumer some also

play07:01

verify the address submitted online

play07:04

against the one the issuing bank has

play07:07

unfiled but this way the merchant May

play07:10

inadvertently throw out legitimate

play07:12

orders as a result for example a

play07:15

consumer might place a legitimate order

play07:18

but request shipment to another

play07:19

different address because it is a grift

play07:22

another security technique is to ask for

play07:25

a card verification value CVV the three

play07:29

digit number above the signature panel

play07:31

on the back of a credit card this

play07:33

technique makes it impossible to make

play07:35

purchases with a credit card number

play07:38

stolen online and additional security

play07:40

option is transaction risk scoring

play07:43

software which keeps track of a

play07:45

customer's historical shopping patterns

play07:48

and notes they wear shown from the norm

play07:50

for example let's say that you have

play07:53

never been into a 5 start of class hotel

play07:55

or there is no such a transaction with

play07:58

your credit card previously so if your

play08:01

credit card information is being used at

play08:04

such a place the transaction score would

play08:07

go up dramatically so much so that the

play08:10

transaction might be declined the people

play08:12

who attacks computer include Trail

play08:15

Seekers wanting a challenge common

play08:17

criminals looking for financial gain and

play08:20

Industrial spies trying to gain a

play08:23

competitive advantage and terrorists

play08:25

seeking to cause destruction to further

play08:27

their course each type of perpetrator

play08:30

has different objectives and access to

play08:33

varying resources and it is willing to

play08:36

accept different levels of risk to

play08:38

accomplish his or her objective each

play08:41

perpetrator makes a decision to act in

play08:43

an unethical manner to achieve his or

play08:47

her own personal objectives so so let's

play08:50

take the first type of perpetrator

play08:52

hackers in this table hackers test the

play08:55

limitations of Information Systems out

play08:57

of intellectual curiosity to see whether

play09:00

they can gain access and how far they

play09:02

can go they have at least a basic

play09:04

understanding of information systems and

play09:07

security features and much of their

play09:09

motivation comes from a desire to learn

play09:12

even more the term hacker has evolved

play09:15

over the years leading to its negative

play09:17

connotation today rather than the

play09:19

positive one it used to help while there

play09:23

is still a vocal minority who believe

play09:25

the hackers perform a service by

play09:27

identifying security weaknesses most

play09:30

people now believe that a hacker does

play09:33

not have the right to explore public or

play09:36

private networks there are numerous

play09:38

types of computer attacks with new

play09:41

varieties being invented all the time we

play09:44

usually think of such exploits being

play09:46

aimed at computers and smartphone

play09:49

increasingly smartphone users store an

play09:53

array of personal identity information

play09:55

on their devices including credit card

play09:58

numbers and bank account numbers

play10:00

smartphones are used to serve the web

play10:02

and also it can do business transactions

play10:05

electronically the more people use their

play10:08

smartphones for these purposes the more

play10:10

attractive these devices become as a

play10:13

target for cyber Thieves for example

play10:16

ransomware is a form of malware which

play10:19

when downloaded onto a Smartphone takes

play10:22

control of the device and its data until

play10:24

the owner agrees to pay a ransom to the

play10:26

attacker another form of smartphone

play10:29

malware runs of charges on user's

play10:31

accounts by automatically sending

play10:34

messages to numbers that charge fees

play10:36

upon receipt of a message the first

play10:39

malicious intention we are going to talk

play10:41

about is viruses computer virus cells

play10:45

has become an umbrella term for many

play10:47

types of malicious code technique

play10:49

vehicle here virus is a piece of

play10:51

programming code usually discussed as

play10:54

something else that causes a computer to

play10:57

behave in an unexpected and usually

play11:00

undesirable manner often a virus is

play11:04

attached to a file so that when the

play11:07

infected file is open the virus executes

play11:10

other viruses sit in a computer's memory

play11:13

and infect files that the computer opens

play11:15

modifies or creates the most viruses

play11:18

deliver a payload or malicious software

play11:21

that causes the computer to perform in

play11:24

an unexpected way for example the virus

play11:27

may be programmed to display a certain

play11:30

message on the computer's display screen

play11:32

delete or modify a certain document or

play11:36

reformat the hard drive a true virus

play11:38

does not spread itself from computer to

play11:41

computer a virus is spread to other

play11:44

machines when a computer user opens an

play11:47

infected email attachment download is an

play11:50

infected program or visits infected

play11:53

website in other words viruses spread by

play11:57

the action of the infected computer user

play11:59

the next item is computer worms unlike a

play12:03

computer virus which requires users to

play12:06

spread interested files to another user

play12:09

a worm is a harmful program that resides

play12:13

in the active memory of the computer and

play12:15

duplicates itself worms differ from

play12:18

viruses in that they can propagate

play12:20

without human intervention often sending

play12:23

copies of themselves to other computers

play12:26

by email the negative impact of a worm

play12:29

attack on an organization's computers

play12:31

can be considerable lost data and

play12:34

programs lost productivity due to

play12:36

workers being unable to use their

play12:38

computers additional lost productivity

play12:41

as workers attempt to recover data and

play12:43

programs and lots of effort for IT

play12:46

workers to clean up the mess and restore

play12:49

everything to as close to normal as

play12:51

possible the next one is Trojan hose

play12:55

Trojan Halls is a program in which

play12:58

malicious code is hidden inside a

play13:00

seemingly harmless program the programs

play13:03

harmful payload might be designed to

play13:06

enable the hacker to destroy the hard

play13:08

drive corrupt files control the computer

play13:11

remotely launch attacks against other

play13:14

computers still passwords or social

play13:17

security numbers or spy on users by

play13:21

recording keystrokes and transmitting

play13:23

them to a server operate by a third

play13:25

party a Trojan host can be delivered as

play13:27

an email attachment downloaded from a

play13:29

website or contracted vrf removable

play13:32

media device once the user execute the

play13:35

program that hosted Trojan host the

play13:39

malicious payload is automatically

play13:40

launched with no telltale signs common

play13:44

host programs includes screen savers

play13:47

greeting cards and games another type of

play13:50

Trojan horse is a logic bomb which

play13:52

executes when it is triggered by a

play13:55

specific event for example logic bombs

play13:58

can be triggered by a change in a

play14:00

particular file by typing a specific

play14:03

series of keys drops or by specific time

play14:06

or date so that's all about analytical

play14:09

Computing practices if we have time we

play14:12

can discuss much more than this because

play14:15

when technology evolves bad practices

play14:17

are evolving too therefore what we have

play14:20

identified in here are few of most

play14:23

general ones so with this episode we are

play14:27

going to wind up the third section

play14:28

Computing and ethics and from the next

play14:31

lecture we are going to start the fourth

play14:33

section of this application software

play14:36

thank you for watching and see you in

play14:38

the next lecture

play14:45

[Music]

play14:47

thank you

play14:50

this video brought you by a new video

play14:53

world.com watch more from our website

Rate This

5.0 / 5 (0 votes)

Ähnliche Tags
EthicsCybercrimeSpamPiracySecurityMalwareEmail CampaignsSoftware PiracyCaptchaHackersVirus
Benötigen Sie eine Zusammenfassung auf Englisch?