Security in Computing

One of the issues in regards to the Internet is that information never disappears, e.g. what happens to a new hacking tool that has been published on the Internet. The tool will be downloaded and mirrored in hacker sites around the world and also added to private software collections. This means that if the initial Web site that offered the tool is closed down, it will appear in a number of other locations around the world. If those sites are closed, the information will just appear on other sites. The proliferation of destructive information is one of the key factors in helping to promote a culture of Cyber Vandalism (Furnell & Warren 1997).


Scenario 1: Denial of Service

Picture
Wikipedia describes DDoS Attacks as: "A denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack) is an attempt to make a computer resource unavailable to its intended users. Although the means to carry out, motives for, and targets of a DoS attack may vary, it generally consists of the concerted efforts of a person or persons to prevent an Internet site or service from functioning efficiently or at all, temporarily or indefinitely."


1. Why is denial of service should not be tolerated at all?

2. What do you think about implications of such acts?

Scenario 2: Hacking

Picture
Dave hacks into the systems of the Enormous Telecommunications Company (ETC) and copies a file that describes certain details of ETC's delicate switching equipment. When Dave is nabbed by the Feds, they charge him with theft. 

1. Is this correct? 

2. What if the document is provided essentially for free by ETC to anyone for the price of postage? 


Scenario 3: Hacking Tools

Picture
Without malicious intent, a computer hacker was scanning telephone numbers with his microcomputer and identifying those numbers that respond with a computer tone. He accessed one of these computers, using a telephone number he had acquired. Without entering any identification, he received a response welcoming him to an expensive and exclusive financial advisory service offered by a large bank. He was offered free of charge, a sample use of some of the services if he would give his name and address. He provided someone else's name and address and used the free promotional services. This stimulated his interest in the services that bank charged for and gave him sufficient knowledge of access protocol to attempt to use the services without authorization. He gained access to and examined the menus of services offered and instructions for use. However, he did not use the services. By examining the logging audit file and checking with the impersonated customer, bank officials identified the computer hacker and claimed that he had used the services without authorization. 



Form a group of four people and discuss the scenario:
1. Detail your conclusions on this scenario

2. Elect a representative of the group to present in front of the class

Disclaimer: This website is designed with material from different websites with the sole purpose of completing a class project on Mobile Learning. This is solely used for EDCT 793M class project. If you have questions any questions regarding this website please contact us at cipher1029@gmail.com or reuben.dlamini@gmail.com Once the project is complete the website will be accessed by log-in information.