2014年10月22日星期三

Chapter 9

9.1 Cyber legalities overview:
Computer-assisted crime: computer was used as a tool to help carry out a crime.
Computer-targeted crime: crimes for computer and its owner.
Computer is incidental: when crime was carried out, computer is involved.

9.2 Type of legal system:
Civil law system: different locations have different civil law. (Europe, Russia, South America, Central America)
Common law system: it uses judges and juries of peers. It includes criminal, civil/tort. (North America, Oceania, England)
Customary law system: local customs
Religious law system: the law based on religious beliefs. (Middle East)
Mixed law system: two or more legal system is used together.

9.3 Intellectual property laws and privacy:
Patent grants ownership and enables that owners to legally enforce their rights.
Copyright protects expression of ideas.
Trademarks protect words, names, product shapes, symbols, colors, or a combination of these used to identify products or company.
Privacy information: full name, national id, IP address, vehicle plate number, driver license, fingerprints, handwriting, credit card information, birthday, birthplace, genetic information.

9.4 Investigations
A few different attack types:
Salamis: the attacker commits several small crimes with the hope that the overall larger crime will go unnoticed.
Data diddling: change existing data and many times it happens before data entered into application..
Password sniffing: sniffing network traffic with the hope of capturing passwords being sent between computers.

IP spoofing: change IP address within a packet and spoofing others.

没有评论:

发表评论