BREAKING TRUST ON THE INTERNET.

Report
BREAKING TRUST ON THE INTERNET.
BY
WISDOM.C.AGUNTA. stdno.:127760
&
Geoffrey Laah. stdno.:068345
Company
LOGO
Way my presentation is going to go:
1. Introduce myself/topic, which I did previously.
2. Introduction to the topic.
3. Into the topic proper
4. Summary / Conclusion
5. Final Thought.
6. Question Time.
ITEC 317
INTRODUCTION:
 First of all, I will start with the definition of
trust. Trust is Believe in the reliability,
truth, ability, or strength of something.
Then this presentation is on the BREAK of
that trust in the accept of internet
perspective.
ITEC 317
Breaking Trust on the Internet




Identity Theft
Phishing and Examples.
Chat Room Predators
Ethical Evaluations of Police “Sting”
Operations
 False Information
 Cyber Bulling
ITEC 317
Identity Theft
 Definition: when someone uses your personal
information without your permission to commit fraud or
other crime.
This can be done in various ways like using someone’s






Name.
Social security number.
Date of birth.
Credit card number.
Bank account number.
Etc.
ITEC 317
Identity Theft
Rating:
30%
25%
24%
25%
20%
16% 16%
14%
15%
10%
6%
3% 2% 2%
5%
1% 1% 1% 1%
0%
ITEC 317
Rating:
How it Occurs:
 Good, Old fashioned stealing.
ITEC 317
How it Occurs:
 Dumpster diving.
 Skimming: The act of using a skimmer to
illegally collect data from the magnetic
stripe of a credit, debit or ATM card.
ITEC 317
How it Occurs:
 Phishing:
Emails that appear to
be from IRS
requesting you to
confirm information.
Emails that are
thanking you for a
recent purchase (or
something you didn’t
buy).
Phone Phishing
Examples of Phishing:
http://219.166.162.37/icons/www.wachovia.com/…
ITEC 317
http://kooptickets.nl/~claudia/mycfcu.com/…..
ITEC 317
Chat-Room Predators:




Chat room : supports real-time discussions
among many people connected to network
Some pedophiles(any sexual interest in
children or the act of child sexual abuse, often
termed "pedophilic behavior".) meeting
children.
Through chat rooms.
Police countering with “string” operations.
ITEC 317
Ethical Evaluations of Strings
 Utilitarian Evaluation:

in normative ethics, a tradition stemming from the late
18th- and 19th-century English philosophers and
economists Jeremy Bentham and John Stuart Mill
that an action is right if it tends to promote happiness
and wrong if it tends to produce the reverse of
happiness—not just the happiness of the performer of
the action but also that of everyone affected by it.
Such a theory is in opposition to egoism, the view that
a person should pursue his own self-interest, even at
the expense of others, and to any ethical theory that
regards some acts or types of acts as right or wrong
independently of their consequences.
ITEC 317
Ethical Evaluations of Strings
 Kantian Evaluation
 Social contract Theory Evaluation:
is the view that persons’ moral and/or
political obligations are dependent upon a
contract or agreement among them to form
the society in which they live.
ITEC 317
Cyber bullying
 CYBER BULLYING
TYPES
Use of the Internet or phone
system to inflict
psychological harm


ITEC 317
“Flaming’: Online
fights using electronic
messages with angry
and vulgar language
“Harassment”:
Repeatedly sending
offensive, rude, and
insulting messages
CYBER BULLYING TYPES
 “Cyber stalking”: Repeatedly sending messages that
include threats of harm or are highly intimidating.
Engaging in other on-line activities that make a person
afraid for his or her own safety
 “Denigration”: ‘Dissing’ someone online. Sending or
posting cruel gossip or rumors about a person to
damage his or her reputation or friendships
 “Impersonation”: Pretending to be someone else and
sending or posting material online that makes that
person look bad, gets that person in trouble or danger, or
damages that person’s reputation or friendships
ITEC 317
CYBER BULLYING TYPES
 “Outing and Trickery”: Sharing someone’s secret or
embarrassing information online. Tricking someone into
revealing secrets or embarrassing information which is
then shared online
 “Exclusion”: Intentionally excluding someone from an
on-line group, like a ‘buddy list’
ITEC 317
CYBER BULLYING
LEGAL ISSUES
‘What Everyone Needs to Know About Cyber Bullying’
(Aftab)
Many cases of child cyber bullying, like adult
counterparts of cyber-harassment, not criminal
Law Enforcement needs to be aware of:
 Difference between annoying and dangerous
communications
 How to investigate a cyber crime
 How to obtain information from an ISP
ITEC 317
Watch video on Cyber bullying:
 A Cyberbullying Suicide Story 6 - Ryan Halligan
Story
 http://www.youtube.com/watch?v=iDBiqUWRtM
o
 Cyberbullying - (British)
 http://www.youtube.com/watch?v=6kYeB2-qXe0
 Cyber Bullying - No dialogue
 http://www.youtube.com/watch?v=YxKYU3SIDhI
ITEC 317
Question For You To Answer
Are you a cyber bully?
http://www.stopcyberbullying.org/tweens/are_you_a_cyberbully.html
ITEC 317
False information:
 Quality of web-based information varies widely.
 Other media also have information of varying
quality like
 The New York Times v. The Nation Enquirer
 60muintes v. Conspiracy Theory
 Google (panda, penguin) attempts to reward
quality of web-based content.
 Ranking uses “voting” algorithm.
 If many links point to a page goggle search
engine ranks the page higher in web-based
content.
ITEC 317
Summary
 In summary all we have been taking about
is “BREAKING TRUST ON THE
INTERNET”. Deter, Detect, Defend



(At Home and At Work).
Deter (how do you prevent all of these)
Detect (how do you find out )
Defend (restoring your good name)
ITEC 317
Final thoughts:
 When in doubt, ask or “call back”
 Know this, your bank will NEVER ask you
for account number or password if they
initiated the communication.
 If you notice any sign of cyber bullying
please go the nearest police station and
report the case or let me say HAND OVER
the case to the police officers.
ITEC 317
QUESTION TIME:
ITEC 317
NA ONLY ME??
ITEC 317

similar documents