SlideShare una empresa de Scribd logo
1 de 10
Descargar para leer sin conexión
EDU 03
Technology and
Communication in Education
Legal and Ethical Issues:
Phishing, Software Privacy
Submitted by
Aswani V G
Roll No 29
Physical Science
Introduction
The ubiquitous growth of the Internet, and advances in
communications, networking, data gathering and storage
technologies, have exacerbated the vulnerability of information
systems. The extent, frequency, seriousness, and diversity of external
attacks to computer systems are unprecedented. Meanwhile, internal
attacks and abuse of proprietary information assets account for at
least half of the serious security and privacy incidents worldwide.
On another front, the personal data gathered and stored by
companies is ever more frequently used for profiling and analysis,
often without the knowledge or consent of the individuals or groups
concerned. Mobile computing with location aware capabilities
further exacerbates these concerns. The fast-paced development of
new artificial and augmented intelligence applications challenge
existing legal, regulatory and ethical frameworks. Thus, it is
imperative to better understand the laws, policies, strategies,
technologies, and actions by societies, organizations, groups, and
individuals that address these issues.
Human controls are applicable to computer security: the legal
system and ethics. The legal system has adapted quite well to
computer technology by reusing some old forms of legal protection
(copyrights and patents) and creating laws where no adequate ones
existed (malicious access). Still, the courts are not a perfect form of
protection for computer resources, for two reasons. First, the courts
tend to be reactive instead of proactive. That is, we have to wait for a
transgression to occur and then adjudicate it, rather than try to
prevent it in the first place. Second, fixing a problem through the
courts can be time consuming and expensive; the latter
characteristic prevents all but the wealthy from addressing most
security issues.
Ethics has not had to change, because ethics is more situational
and personal than the law. For example, the privacy of personal
information is becoming an important part of computer security.
Computers have become the primary repository of both personal
information and negotiable assets, such as bank records, securities
records, and other financial information. Other types of databases,
both statistical and otherwise, are assets with considerable value.
These assets can only be viewed, created, and altered by technical
and automated means. Those who can understand and exploit the
technology, plus those who have obtained access permission, have
power related to those assets.
The laws dealing with computer security affect programmers,
designers, users, and maintainers of computing systems and
computerized data banks. These laws protect, but they also regulate
the behaviour of people who use computers. Before recommending
change, however, professionals must understand the current state of
computers and the law. Three motivations for studying the legal
section are to know what protection the law provides for computers
and data, to appreciate laws that protect the rights of others with
respect to computers, programs, and data and to understand existing
laws as a basis for recommending new laws to protect computers,
data, and people.
Discussion
a) Phishing
Phishing is a type of social engineering where an attacker sends a
fraudulent (e.g., spoofed, fake, or otherwise deceptive) message
designed to trick a human victim into revealing sensitive
information to the attacker or to deploy malicious software on the
victim's infrastructure like ransomware (a type of malware that
threatens to publish the victim's personal data or perpetually block
access to it). That is, Phishing is a cybercrime in which a target or
targets are contacted by email, telephone or text message by
someone posing as a legal institution to lure individuals into
providing sensitive data such as personally identifiable information,
banking and credit card details, and passwords. The recipient is then
tricked into clicking a malicious link, which can lead to the
installation of malware, the freezing of the system as part of
a ransomware attack or the revealing of sensitive information. As of
2020, phishing is by far the most common attack performed by
cybercriminals
Common Features of Phishing Emails
1) Too Good To Be True : Lucrative offers and eye-catching or
attention grabbing statements are designed to attract people’s
attention immediately. For instance, many claim that you have won
an iPhone, a lottery, or some other lavish prize. Just don't click on
any suspicious emails. Remember that if it seems to good to be true,
it probably is!
2)Sense of Urgency : A favourite tactic amongst cybercriminals is to
ask you to act fast because the super deals are only for a limited
time. Some of them will even tell you that you have only a few
minutes to respond. When you come across these kinds of emails, it's
best to just ignore them. Sometimes, they will tell you that your
account will be suspended unless you update your personal details
immediately. Most reliable organizations give ample time before
they terminate an account and they never ask patrons to update
personal details over the Internet. When in doubt, visit the source
directly rather than clicking a link in an email.
3)Hyperlinks: A link may not be all it appears to be. Hovering over a
link shows you the actual URL where you will be directed upon
clicking on it. It could be completely different or it could be a
popular website with a misspelling or something like that.
4)Attachments : If you see an attachment in an email you weren't
expecting or that doesn't make sense, don't open it! They often
contain payloads like ransomware or other viruses. The only file
type that is always safe to click on is a .txt file.
5)Unusual Sender : Whether it looks like it's from someone you
don't know or someone you do know, if anything seems out of the
ordinary, unexpected, out of character or just suspicious in general
don't click on it!
Types of Phishing
Email phishing: Most phishing messages are delivered by email, and
are not personalized or targeted to a specific individual or company
this is termed "bulk" phishing. The content of a bulk phishing
message varies widely depending on the goal of the attacker–
common targets for impersonation include banks and financial
services, email and cloud productivity providers, and streaming
services.
Spear phishing: Spear phishing involves an attacker directly
targeting a specific organization or person with tailored phishing
communications. In contrast to bulk phishing, spear phishing
attackers often gather and use personal information about their
target to increase their probability of success of the attack.
Whaling and CEO fraud : It refers to spear phishing attacks
directed specifically at senior executives and other high-profile
targets. It involves the crafting of spoofed emails
purportedly from senior executives with the intention of getting
other employees at an organization to perform a specific action,
usually the wiring of money to an offshore account.
Voice phishing : is the use of telephony (often voice telephony) to
conduct phishing attacks. Attackers will dial a large quantity of
telephone numbers and play automated recording that make false
claims of fraudulent activity on the victim's bank accounts or credit
cards.
Prevent Phishing Attacks
To protect against spam mails, spam filters can be used. Generally,
the filters assess the origin of the message, the software used to send
the message, and the appearance of the message to determine if it’s
spam. Occasionally, spam filters may even block emails from
legitimate sources, so it isn’t always 100% accurate.
The browser settings should be changed to prevent fraudulent
websites from opening. Browsers keep a list of fake websites and
when you try to access the website, the address is blocked or an alert
message is shown.
Many websites require users to enter login information while the
user image is displayed. This type of system may be open to security
attacks. One way to ensure security is to change passwords on a
regular basis, and never use the same password for multiple
accounts, use of CAPTCHA etc.
Banks and financial organizations use monitoring systems to prevent
phishing. Individuals can report phishing to industry groups where
legal actions can be taken against these fraudulent websites.
Changes in browsing habits are required to prevent phishing. If
verification is required, always contact the company personally
before entering any details online.
If there is a link in an email, hover over the URL first. Secure
websites with a valid Secure Socket Layer (SSL) certificate begin with
“https”.
b) Software Privacy
Privacy software is software built to protect the privacy of its users.
The software typically works in conjunction with Internet usage to
control or limit the amount of information made available to third
parties. The software can apply encryption or filtering of various
kinds. It can mainly refer to two types of protection: The first type is
protecting a user's Internet privacy from the World Wide Web.
There are software products that will mask or hide a user's IP
address from the outside world to protect the user from identity
theft. The second type of protection is hiding or deleting the user's
Internet traces that are left on their PC after they have been surfing
the Internet. There is software that will erase all the user's Internet
traces and there is software that will hide and encrypt a user's traces
so that others using their PC will not know where they have been
surfing.
Types of Software Protection
Whitelisting and blacklisting : Whitelisting is a process in which a
company identifies the software that it will allow and does not try to
recognize malware. It permits acceptable software to run and either
prevents anything else from running or lets new software run in a
quarantined environment until its validity can be verified. Whereas
whitelisting allows nothing to run unless it is on the
whitelist, blacklisting allows everything to run unless it is on the
black. A blacklist then includes certain types of software that are not
allowed to run in the company environment.
Intrusion detection systems: These are designed to detect all types of
malicious network traffic and computer usage that cannot be
detected by a firewall. These systems capture all network traffic
flows and examine the contents of each packet for malicious traffic.
Encryption: is another form of privacy security. When organizations
do not have a secure channel for sending information, they use
encryption to stop unauthorized eavesdroppers. Encryption is the
process of converting an original message into a form that cannot be
read by anyone except the intended receiver.
Steganography: is sometimes used to hide messages from
eavesdropping and e-surveillance. It hides the data rather than
converting it. They ensure that messages can be hidden from being
exposed.
In short, Privacy rights ensure we have control over our data. If it's
your data, you should have control over it. Privacy rights dictate that
your data can only be used in ways you agree to and that you can
access any information about yourself. Privacy rights put you in the
driver's seat of your own life.
EDU 03 - Technology and Communication in Education: Phishing and Software Privacy

Más contenido relacionado

La actualidad más candente

An overview study on cyber crimes in internet
An overview study on cyber crimes in internetAn overview study on cyber crimes in internet
An overview study on cyber crimes in internetAlexander Decker
 
Disadvantages of-i ct-woww
Disadvantages of-i ct-wowwDisadvantages of-i ct-woww
Disadvantages of-i ct-wowwFloroRaphaell
 
Phishing exposed
Phishing exposedPhishing exposed
Phishing exposedtamfin
 
Frontiers of Computational Journalism week 11 - Privacy and Security
Frontiers of Computational Journalism week 11 - Privacy and SecurityFrontiers of Computational Journalism week 11 - Privacy and Security
Frontiers of Computational Journalism week 11 - Privacy and SecurityJonathan Stray
 
Phishing awareness
Phishing awarenessPhishing awareness
Phishing awarenessPhishingBox
 
Phishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark WorldPhishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark WorldAvishek Datta
 
What is Phishing - Kloudlearn
What is Phishing - KloudlearnWhat is Phishing - Kloudlearn
What is Phishing - KloudlearnKloudLearn
 
Online safety, security, and ethics
Online safety, security, and ethicsOnline safety, security, and ethics
Online safety, security, and ethicsJohnlery Guzman
 
Phishing
PhishingPhishing
Phishingdefquon
 
phishing and pharming - evil twins
phishing and pharming - evil twinsphishing and pharming - evil twins
phishing and pharming - evil twinsNilantha Piyasiri
 

La actualidad más candente (18)

An overview study on cyber crimes in internet
An overview study on cyber crimes in internetAn overview study on cyber crimes in internet
An overview study on cyber crimes in internet
 
Disadvantages of-i ct-woww
Disadvantages of-i ct-wowwDisadvantages of-i ct-woww
Disadvantages of-i ct-woww
 
Phishing exposed
Phishing exposedPhishing exposed
Phishing exposed
 
Phishing
PhishingPhishing
Phishing
 
Frontiers of Computational Journalism week 11 - Privacy and Security
Frontiers of Computational Journalism week 11 - Privacy and SecurityFrontiers of Computational Journalism week 11 - Privacy and Security
Frontiers of Computational Journalism week 11 - Privacy and Security
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Phishing
PhishingPhishing
Phishing
 
Phishing awareness
Phishing awarenessPhishing awareness
Phishing awareness
 
Phishing Incident Response Playbook
Phishing Incident Response PlaybookPhishing Incident Response Playbook
Phishing Incident Response Playbook
 
Phishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark WorldPhishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark World
 
Phishing
PhishingPhishing
Phishing
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
What is Phishing - Kloudlearn
What is Phishing - KloudlearnWhat is Phishing - Kloudlearn
What is Phishing - Kloudlearn
 
Seminar
SeminarSeminar
Seminar
 
Online safety, security, and ethics
Online safety, security, and ethicsOnline safety, security, and ethics
Online safety, security, and ethics
 
Phishing
PhishingPhishing
Phishing
 
Phishing
PhishingPhishing
Phishing
 
phishing and pharming - evil twins
phishing and pharming - evil twinsphishing and pharming - evil twins
phishing and pharming - evil twins
 

Similar a EDU 03 - Technology and Communication in Education: Phishing and Software Privacy

Cyber safety.pptx
Cyber safety.pptxCyber safety.pptx
Cyber safety.pptxAchu69
 
Cyber security.docx
Cyber security.docxCyber security.docx
Cyber security.docxsaivarun91
 
Crimes in digital marketing..pptx
Crimes in digital marketing..pptxCrimes in digital marketing..pptx
Crimes in digital marketing..pptxRajviNikeetaRathore
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of CybercrimeRubi Orbeta
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environmentelijahj01012
 
Combating Phishing Attacks
Combating Phishing AttacksCombating Phishing Attacks
Combating Phishing AttacksRapid7
 
Data privacy over internet
Data privacy over internetData privacy over internet
Data privacy over internetdevashishicai
 
Internet fraud and Common modes of security threats .pptx
Internet fraud and Common modes of security threats .pptxInternet fraud and Common modes of security threats .pptx
Internet fraud and Common modes of security threats .pptxMoizAhmed398372
 
7 Types of Cyber Security Threats | The Lifesciences Magazine
7 Types of Cyber Security Threats | The Lifesciences Magazine7 Types of Cyber Security Threats | The Lifesciences Magazine
7 Types of Cyber Security Threats | The Lifesciences MagazineThe Lifesciences Magazine
 
Computer Security for Lawyers
Computer Security for LawyersComputer Security for Lawyers
Computer Security for LawyersMark Lanterman
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptBushra22
 
E Mail Phishing Prevention and Detection
E Mail Phishing Prevention and DetectionE Mail Phishing Prevention and Detection
E Mail Phishing Prevention and Detectionijtsrd
 
2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptxSSPTRGCELL
 
A Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.comA Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.comBusiness.com
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptSukhdev48
 

Similar a EDU 03 - Technology and Communication in Education: Phishing and Software Privacy (20)

Cyber safety.pptx
Cyber safety.pptxCyber safety.pptx
Cyber safety.pptx
 
Cyber security.docx
Cyber security.docxCyber security.docx
Cyber security.docx
 
Information security
Information securityInformation security
Information security
 
Crimes in digital marketing..pptx
Crimes in digital marketing..pptxCrimes in digital marketing..pptx
Crimes in digital marketing..pptx
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of Cybercrime
 
Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environment
 
Combating Phishing Attacks
Combating Phishing AttacksCombating Phishing Attacks
Combating Phishing Attacks
 
Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
 
Data privacy over internet
Data privacy over internetData privacy over internet
Data privacy over internet
 
Internet fraud and Common modes of security threats .pptx
Internet fraud and Common modes of security threats .pptxInternet fraud and Common modes of security threats .pptx
Internet fraud and Common modes of security threats .pptx
 
7 Types of Cyber Security Threats | The Lifesciences Magazine
7 Types of Cyber Security Threats | The Lifesciences Magazine7 Types of Cyber Security Threats | The Lifesciences Magazine
7 Types of Cyber Security Threats | The Lifesciences Magazine
 
Cybersecurity awareness.pdf
Cybersecurity awareness.pdfCybersecurity awareness.pdf
Cybersecurity awareness.pdf
 
Computer Security for Lawyers
Computer Security for LawyersComputer Security for Lawyers
Computer Security for Lawyers
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
E Mail Phishing Prevention and Detection
E Mail Phishing Prevention and DetectionE Mail Phishing Prevention and Detection
E Mail Phishing Prevention and Detection
 
2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx
 
A Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.comA Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.com
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
Amir bouker
Amir bouker Amir bouker
Amir bouker
 

Último

Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 

Último (20)

Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 

EDU 03 - Technology and Communication in Education: Phishing and Software Privacy

  • 1. EDU 03 Technology and Communication in Education Legal and Ethical Issues: Phishing, Software Privacy Submitted by Aswani V G Roll No 29 Physical Science
  • 2. Introduction The ubiquitous growth of the Internet, and advances in communications, networking, data gathering and storage technologies, have exacerbated the vulnerability of information systems. The extent, frequency, seriousness, and diversity of external attacks to computer systems are unprecedented. Meanwhile, internal attacks and abuse of proprietary information assets account for at least half of the serious security and privacy incidents worldwide. On another front, the personal data gathered and stored by companies is ever more frequently used for profiling and analysis, often without the knowledge or consent of the individuals or groups concerned. Mobile computing with location aware capabilities further exacerbates these concerns. The fast-paced development of new artificial and augmented intelligence applications challenge existing legal, regulatory and ethical frameworks. Thus, it is imperative to better understand the laws, policies, strategies, technologies, and actions by societies, organizations, groups, and individuals that address these issues. Human controls are applicable to computer security: the legal system and ethics. The legal system has adapted quite well to computer technology by reusing some old forms of legal protection (copyrights and patents) and creating laws where no adequate ones existed (malicious access). Still, the courts are not a perfect form of protection for computer resources, for two reasons. First, the courts tend to be reactive instead of proactive. That is, we have to wait for a transgression to occur and then adjudicate it, rather than try to
  • 3. prevent it in the first place. Second, fixing a problem through the courts can be time consuming and expensive; the latter characteristic prevents all but the wealthy from addressing most security issues. Ethics has not had to change, because ethics is more situational and personal than the law. For example, the privacy of personal information is becoming an important part of computer security. Computers have become the primary repository of both personal information and negotiable assets, such as bank records, securities records, and other financial information. Other types of databases, both statistical and otherwise, are assets with considerable value. These assets can only be viewed, created, and altered by technical and automated means. Those who can understand and exploit the technology, plus those who have obtained access permission, have power related to those assets. The laws dealing with computer security affect programmers, designers, users, and maintainers of computing systems and computerized data banks. These laws protect, but they also regulate the behaviour of people who use computers. Before recommending change, however, professionals must understand the current state of computers and the law. Three motivations for studying the legal section are to know what protection the law provides for computers and data, to appreciate laws that protect the rights of others with respect to computers, programs, and data and to understand existing laws as a basis for recommending new laws to protect computers, data, and people.
  • 4. Discussion a) Phishing Phishing is a type of social engineering where an attacker sends a fraudulent (e.g., spoofed, fake, or otherwise deceptive) message designed to trick a human victim into revealing sensitive information to the attacker or to deploy malicious software on the victim's infrastructure like ransomware (a type of malware that threatens to publish the victim's personal data or perpetually block access to it). That is, Phishing is a cybercrime in which a target or targets are contacted by email, telephone or text message by someone posing as a legal institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords. The recipient is then tricked into clicking a malicious link, which can lead to the installation of malware, the freezing of the system as part of a ransomware attack or the revealing of sensitive information. As of 2020, phishing is by far the most common attack performed by cybercriminals Common Features of Phishing Emails 1) Too Good To Be True : Lucrative offers and eye-catching or attention grabbing statements are designed to attract people’s attention immediately. For instance, many claim that you have won an iPhone, a lottery, or some other lavish prize. Just don't click on
  • 5. any suspicious emails. Remember that if it seems to good to be true, it probably is! 2)Sense of Urgency : A favourite tactic amongst cybercriminals is to ask you to act fast because the super deals are only for a limited time. Some of them will even tell you that you have only a few minutes to respond. When you come across these kinds of emails, it's best to just ignore them. Sometimes, they will tell you that your account will be suspended unless you update your personal details immediately. Most reliable organizations give ample time before they terminate an account and they never ask patrons to update personal details over the Internet. When in doubt, visit the source directly rather than clicking a link in an email. 3)Hyperlinks: A link may not be all it appears to be. Hovering over a link shows you the actual URL where you will be directed upon clicking on it. It could be completely different or it could be a popular website with a misspelling or something like that. 4)Attachments : If you see an attachment in an email you weren't expecting or that doesn't make sense, don't open it! They often contain payloads like ransomware or other viruses. The only file type that is always safe to click on is a .txt file. 5)Unusual Sender : Whether it looks like it's from someone you don't know or someone you do know, if anything seems out of the ordinary, unexpected, out of character or just suspicious in general don't click on it!
  • 6. Types of Phishing Email phishing: Most phishing messages are delivered by email, and are not personalized or targeted to a specific individual or company this is termed "bulk" phishing. The content of a bulk phishing message varies widely depending on the goal of the attacker– common targets for impersonation include banks and financial services, email and cloud productivity providers, and streaming services. Spear phishing: Spear phishing involves an attacker directly targeting a specific organization or person with tailored phishing communications. In contrast to bulk phishing, spear phishing attackers often gather and use personal information about their target to increase their probability of success of the attack. Whaling and CEO fraud : It refers to spear phishing attacks directed specifically at senior executives and other high-profile targets. It involves the crafting of spoofed emails purportedly from senior executives with the intention of getting other employees at an organization to perform a specific action, usually the wiring of money to an offshore account. Voice phishing : is the use of telephony (often voice telephony) to conduct phishing attacks. Attackers will dial a large quantity of telephone numbers and play automated recording that make false claims of fraudulent activity on the victim's bank accounts or credit cards.
  • 7. Prevent Phishing Attacks To protect against spam mails, spam filters can be used. Generally, the filters assess the origin of the message, the software used to send the message, and the appearance of the message to determine if it’s spam. Occasionally, spam filters may even block emails from legitimate sources, so it isn’t always 100% accurate. The browser settings should be changed to prevent fraudulent websites from opening. Browsers keep a list of fake websites and when you try to access the website, the address is blocked or an alert message is shown. Many websites require users to enter login information while the user image is displayed. This type of system may be open to security attacks. One way to ensure security is to change passwords on a regular basis, and never use the same password for multiple accounts, use of CAPTCHA etc. Banks and financial organizations use monitoring systems to prevent phishing. Individuals can report phishing to industry groups where legal actions can be taken against these fraudulent websites. Changes in browsing habits are required to prevent phishing. If verification is required, always contact the company personally before entering any details online. If there is a link in an email, hover over the URL first. Secure websites with a valid Secure Socket Layer (SSL) certificate begin with “https”.
  • 8. b) Software Privacy Privacy software is software built to protect the privacy of its users. The software typically works in conjunction with Internet usage to control or limit the amount of information made available to third parties. The software can apply encryption or filtering of various kinds. It can mainly refer to two types of protection: The first type is protecting a user's Internet privacy from the World Wide Web. There are software products that will mask or hide a user's IP address from the outside world to protect the user from identity theft. The second type of protection is hiding or deleting the user's Internet traces that are left on their PC after they have been surfing the Internet. There is software that will erase all the user's Internet traces and there is software that will hide and encrypt a user's traces so that others using their PC will not know where they have been surfing. Types of Software Protection Whitelisting and blacklisting : Whitelisting is a process in which a company identifies the software that it will allow and does not try to recognize malware. It permits acceptable software to run and either prevents anything else from running or lets new software run in a quarantined environment until its validity can be verified. Whereas whitelisting allows nothing to run unless it is on the whitelist, blacklisting allows everything to run unless it is on the black. A blacklist then includes certain types of software that are not allowed to run in the company environment.
  • 9. Intrusion detection systems: These are designed to detect all types of malicious network traffic and computer usage that cannot be detected by a firewall. These systems capture all network traffic flows and examine the contents of each packet for malicious traffic. Encryption: is another form of privacy security. When organizations do not have a secure channel for sending information, they use encryption to stop unauthorized eavesdroppers. Encryption is the process of converting an original message into a form that cannot be read by anyone except the intended receiver. Steganography: is sometimes used to hide messages from eavesdropping and e-surveillance. It hides the data rather than converting it. They ensure that messages can be hidden from being exposed. In short, Privacy rights ensure we have control over our data. If it's your data, you should have control over it. Privacy rights dictate that your data can only be used in ways you agree to and that you can access any information about yourself. Privacy rights put you in the driver's seat of your own life.