plagiarism-hacking-software_piracy

53
COMPUTER PROJECT COMPILED BY- SALONI SHUKLA IX STANDARD THE JAIN INTERNATIONAL SCHOOL

Upload: abhishek-shukla

Post on 04-Aug-2015

66 views

Category:

Education


0 download

TRANSCRIPT

COMPUTER PROJECT

COMPILED BY- SALONI SHUKLA IX STANDARD

THE JAIN INTERNATIONAL SCHOOL

TOPICS WE ARE DEALING WITH-

PLAGIARISM

HACKING & ITS STUFF

PIRACY

Plagiarism

Plagiarism is when a person copies the writing of another person and submits

it as their own

Types of Plagiarism: Copying

The most well-known and, sadly, the most common type of plagiarism is the simplest: copying. If you copy someone else's work and put your name on it, you have plagiarized.

Copying: An Example

"Children are totally insensitive to their parents'

shyness; it is the rare child who labels a parent shy [...] This is understandable, since parents are in positions of control and authority in their homes and may not reveal their shy side to their children. Also, since shyness is viewed as undesirable by many children, it may be threatening to think of parents in these terms. At this young age, the parent is still idealized as all-knowing and all-powerful - - not dumb, ugly, or weak."

Copying: An Example

This one is pretty straightforward. If a writer copies, word for word, the text from Dr. Zimbardo's book and does not acknowledge in any way that it was Dr. Zimbardo's work, the writer has committed plagiarism.

Types: Patchwork Plagiarism

The second kind of plagiarism is similar to copying and is perhaps the second most common type of plagiarism: patchwork plagiarism. This occurs when the plagiarizer borrows the "phrases and clauses from the original source and weaves them into his own writing" (McConnell Library, Radford University) without putting the phrases in quotation marks or citing the author.

Patchwork: An Example

With regard to children, they are totally insensitive to their parents' shyness. Rare is the child who labels a parent shy. It is easy to understand this, since the parents are in positions of control and authority in their own homes and may not necessarily show their shy side to their children. Moreover, since shyness is viewed as unfavorable by most children, it may be threatening for them to think of their parents in that light. During the formative years, the parent is idealized as all-knowing and all-powerful -- not dumb, ugly, or weak.

Patchwork: An Example

Now, had the "author" of this passage put the colored phrases in quotation marks and added a citation after the quotation, like (Zimbardo 62), the "author" would have been safe. Without the quotation marks and the proper citation, the "author" has committed plagiarism.

Types: Paraphrasing Plagiarism

The third type of plagiarism is called paraphrasing plagiarism. This occurs when the plagiarizer paraphrases or summarizes another's work without citing the source. Even changing the words a little or using synonyms but retaining the author's essential thoughts, sentence structure, and/or style without citing the source is still considered plagiarism.

Paraphrasing: An Example

Children are completely insensitive to their parents' shyness and rarely label their parents as shy. Because the parents are the authority and controlling figures in the home, they may not feel shy and therefore not show their shy side. Moreover, during the formative years, parents are seen as omnipotent and omniscient and not stupid, unattractive, or pathetic; it may be frightening for children to view their parents in terms of shyness.

Paraphrasing: An Example

Now, had the "author" of this paragraph used footnotes or parenthetical citations to acknowledge Dr. Zimbardo's work, he or she would have been in the clear. However, since the "author" acts like these ideas are his or her own, and does not acknowledge Dr. Zimbardo, it's plagiarism.

Types: Unintentional

The fourth type of

plagiarism is called unintentional plagiarism -- it occurs when the writer incorrectly quotes and/or incorrectly cites a source they are using.  How is this plagiarism, if the author didn't mean to do it?

Types: Unintentional

If a writer has incorrectly quoted or incorrectly cited a source, it could be misconstrued as dishonesty on the writer's part. The dishonest usage of another's work is most often considered plagiarism. Therefore, the incorrect usage of another's work, whether it's intentional or not, could be taken for "real" plagiarism.

Also: WE DON’T READ MINDS.

We don’t know what you *MEANT* to do!

Avoiding Plagiarism

Avoiding plagiarism is quite simple. The best method for avoiding it is to simply be honest; when you've used a source in your paper, give credit where it's due. Acknowledge the author of the original work you've used.

Avoiding Plagiarism

Another way to avoid plagiarism is to use your own work as often as possible. Quoting and citing sources is usually required and inevitable when doing research -- that's how you "back up" your own work. But using someone else's work excessively can be construed as plagiarism.

Another way to it is to quote and/or cite your sources properly.

What is Hacking?

Hacking refers to an array of activities which are done to intrude some one else’s personal information space so as to use it for malicious, unwanted purposes.

Hacking is a term used to refer to activities aimed at exploiting security flaws to obtain critical information for gaining access to secured networks.

Agenda

• Hackers and their vocabulary• Threats and risks• Types of hackers• Gaining access• Intrusion detection and prevention• Legal and ethical issues

Hacker Terms

Hacking - showing computer expertise Cracking - breaching security on software or systems Phreaking - cracking telecom networks Spoofing - faking the originating IP address in a

datagram Denial of Service (DoS) - flooding a host with

sufficient network traffic so that it can’t respond anymore

Port Scanning - searching for vulnerabilities

A Brief History of Hacking

1980s- Cyberspace coined-414 arrested-Two hacker groups formed-2600 published

1990s-National Crackdown on hackers-Kevin Mitnick arrested-Microsoft’s NT operating system pierced

A Brief History of Hacking

2001– In one of the biggest denial-of-service attack, hackers

launched attacks against eBay, Yahoo!, CNN.com., Amazon and others.

2007– Bank hit by “biggest ever” hack. Swedish Bank, Nordea

recorded nearly $1 Million has been stolen in three months from 250 customer account.

Famous Hackers in History

Ian Murphy Kevin Mitnick Johan Helsinguis

Mark AbeneLinus Torvalds Robert Morris

*The threats

*Denial of Service (Yahoo, eBay, CNN, MS)

*Defacing, Graffiti, Slander, Reputation

*Loss of data (destruction, theft)

*Divulging private information (AirMiles, corporate espionage, personal financial)

*Loss of financial assets (CitiBank)

Types of hackers Professional hackers

Black Hats – the Bad Guys White Hats – Professional Security Experts

Script kiddies Mostly kids/students

User tools created by black hats, To get free stuff Impress their peers Not get caught

Underemployed Adult Hackers Former Script Kiddies

Can’t get employment in the field Want recognition in hacker community Big in eastern european countries

Ideological Hackers hack as a mechanism to promote some political or

ideological purpose Usually coincide with political events

General Hacking Methods

A typical attacker works in the following manner:

1. Identify the target system.

2. Gathering Information on the target system.

3. Finding a possible loophole in the target system.

4. Exploiting this loophole using exploit code.

5. Removing all traces from the log files and escaping without a trace.

Types of Hackers

Criminal Hackers Real criminals, are in it for whatever they can get no

matter who it hurtsCorporate Spies

Are relatively rareDisgruntled Employees

Most dangerous to an enterprise as they are “insiders” Since many companies subcontract their network services

a disgruntled vendor could be very dangerous to the host enterprise

Gaining access• Front door

– Password guessing– Password/key stealing

• Back doors– Often left by original developers as debug and/or diagnostic tools– Forgot to remove before release

• Trojan Horses– Usually hidden inside of software that we download and install

from the net (remember nothing is free)– Many install backdoors

• Software vulnerability exploitation– Often advertised on the OEMs web site along with security

patches– Fertile ground for script kiddies looking for something to do

Back doors & Trojans

• e.g. Whack-a-mole / NetBus• Cable modems / DSL very vulnerable• Protect with Virus Scanners, Port Scanners,

Personal Firewalls

Software vulnerability exploitation

• Buffer overruns• HTML / CGI scripts• Poor design of web applications

– Javascript hacks– PHP/ASP/ColdFusion URL hacks

• Other holes / bugs in software and services• Tools and scripts used to scan ports for vulnerabilities

Password guessing

• Default or null passwords• Password same as user name (use finger)• Password files, trusted servers• Brute force

– make sure login attempts audited!

Password/key theft• Dumpster diving

– Its amazing what people throw in the trash• Personal information• Passwords• Good doughnuts

– Many enterprises now shred all white paper trash

• Inside jobs– Disgruntled employees– Terminated employees (about 50% of intrusions

resulting in significant loss)

ONCE INSIDE, THE HACKER CAN... Modify logs

To cover their tracks To mess with you

Steal files Sometimes destroy after stealing A pro would steal and cover their tracks so to be

undetected Modify files

To let you know they were there To cause mischief

Install back doors So they can get in again

Attack other systems

Intrusion detection systems (IDS)A lot of research going on at universities

Doug Somerville- EE Dept, Viktor Skorman – EE Dept

Big money available due to 9/11 and Dept of Homeland Security

Vulnerability scanners pro-actively identifies risks User use pattern matching

When pattern deviates from norm should be investigated

Network-based IDS examine packets for suspicious activity can integrate with firewall require one dedicated IDS server per segment

Intrusion prevention

• Patches and upgrades (hardening)• Disabling unnecessary software• Firewalls and Intrusion Detection

Systems• ‘Honeypots’• Recognizing and reacting to port

scanning

Intrusion detection systems (IDS) Host-based IDS

monitors logs, events, files, and packets sent to the host installed on each host on network

Honeypot decoy server collects evidence and alerts admin

Risk managementP

roba

bilit

y

Impact

Ignore

(e.g. delude yourself)

Prevent

(e.g. firewalls, IDS, patches)

Backup Plan

(e.g. redundancies)

Contain & Control

(e.g. port scan)

COMPUTER CRIMES Financial Fraud Credit Card Theft Identity Theft Computer specific crimes

Denial-of-service Denial of access to information Viruses Melissa virus cost New Jersey man 20 months in jail

Melissa caused in excess of $80 Million Intellectual Property Offenses

Information theft Trafficking in pirated information Storing pirated information Compromising information Destroying information

Content related Offenses Hate crimes Harrassment Cyber-stalking

Child privacy

FEDERAL STATUTES

Computer Fraud and Abuse Act of 1984 Makes it a crime to knowingly access a federal computer

Electronic Communications Privacy Act of 1986 Updated the Federal Wiretap Act act to include electronically stored

data U.S. Communications Assistance for Law Enforcement Act of

1996 Ammended the Electronic Communications Act to require all

communications carriers to make wiretaps possible Economic and Protection of Proprietary Information Act of 1996

Extends definition of privacy to include proprietary economic information , theft would constitute corporate or industrial espionage

Health Insurance Portability and Accountability Act of 1996 Standards for the electronic transmission of healthcare information

National Information Infrastructure Protection Act of 1996 Amends Computer Fraud and Abuse Act to provide more protection to

computerized information and systems used in foreign and interstate commerce or communications

The Graham-Lynch-Bliley Act of 1999 Limits instances of when financial institution can disclose nonpublic

information of a customer to a third party

Legal Recourse

• Average armed robber will get $2500-$7500 and risk being shot or killed; 50-60% will get caught , convicted and spent an average of 5 years of hard time

• Average computer criminal will net $50K-$500K with a risk of being fired or going to jail; only 10% are caught, of those only 15% will be turned in to authorities; less than 50% of them will do jail time

• Prosecution – Many institutions fail to prosecute for fear of advertising

• Many banks absorb the losses fearing that they would lose more if their customers found out and took their business elsewhere

– Fix the vulnerability and continue on with business as usual

Software Piracy

In comparison to literature, music, and

movies, computer software is a new form of intellectual property. However the same laws govern computer software, and stealing this property is no different than stealing any other form of copyrighted content, and the punishment for doing so is the same.

What is Software Piracy?

What is Software Piracy?

A single individual can commit hundreds of acts of software piracy everyday.

To the right are the top ten most infringed software in 2007.

Top Ten Infringed Software Titles in 2007

1. Symantec Norton Anti-Virus2. Adobe Acrobat3. Symantec PC Anywhere4. Adobe Photoshop5. AutoDesk AutoCAD6. Adobe Dreamweaver7. Roxio Easy CD/DvD Creator8. Roxio Toast Titanium9. Ipswitch WS_FTP10. Nero Ultra Edition

WHAT IS SOFTWARE PIRACY?• The means to steal this

content is much easier than to steal most other products. As technology increases, with advances in internet systems and filesharing programs, the ease to access these copyrighted digital files is continuously easier, and the risk of getting caught is next to nothing (Moores, T. T., 2008 p. 39).

WHAT IS SOFTWARE PIRACY?

• Unfortunately, despite this reality, there are many people who engage in software piracy and whenever a piece of software that is unlicensed is used, it deprives software companies of their earnings. The thousands of hours of time that are spent working on programs by writers, programmers, design artists and others, goes uncompensated.

The most obvious and direct impact would be if you partake in software piracy, you put yourself at risk to corrupt files intended to steal personal information or damage your computer.

How Does Software Piracy Affect Me?

How Does Software Piracy Affect Me? You are also at risk

for being caught for your illegal activities by either being turned in by vigilante individuals or by investigations targeting a specific popular program.

Even if you do not partake in software piracy it has a direct impact on you because of the strain it puts on society. The global economy alone loses approximately 12 billion dollars a year on software piracy which doesn’t include other forms of stolen media such as movies and music (Moores, T. T., 2008 p. 39).

How Does Software Piracy Affect Me?

Naturally the repercussions of this dramatic financial loss would be a loss of jobs, increased prices on legal software, flourishing illegal copywriting organizations, uncompensated work by talented individuals.

This further impacts you as 80 percent of the world’s software is produced in the U.S.

(Source: Software & Information Industry Association) The issue brings the morals of society into

question as this type of crime is being swept under the rug.

How Does Software Piracy Affect Me?

How Can I Help?

The first step of action would include educating yourself further about the issue.

To do this there are numerous organizations out there dedicated to the issue of Software piracy including the BSA, SIIA, RIAA and many others including the corporations themselves such as Microsoft and Adobe.

How Can I Help?

These coalitions and companies will gladly help in your education of software piracy as they all have atleast a section on their sites dedicated to it, some even have hotlines.

They will inform you on how to pick out and diagnose illegal or unregistered software to keep yourself safe from its dangers.

How Can I Help?

Another way to help, albeit it sounding cliché, is to raise awareness to others. Make sure your friends and family are not partaking in software piracy and if they are inform them of the risks to themselves and to society.

Any reasonable individual can identify software piracy as theft if it is brought to their attention or explained to them in a logical manner.

How Can I Help?

A final example of an easy way to help would be to report cases of software piracy or suspicious looking programs to the proper place.

The SIIA has a section in which you can fill out a piracy report and be eligible for up to 1 million dollars if your information leads to a beneficial conclusion. Most software companies have areas designated for reporting software piracy or hotlines if there are any questions.

THANKING YOU

01/02/2015

MRS. JYOTI JOHRI

For providing me the opportunity to work on this assignment cum project.