Monday, April 28, 2014

COPYRIGHT INFRINGEMENT

COPYRIGHT INFRINGEMENT
                Stealing is an age old crime. Here it is not about pick pocketing, but about robing people of their ideas, inventions & creative expressions (i.e. Intellectual Property).

                It is a growing threat-especially with the rise of digital technologies and Internet File Sharing Networks.

INTERNET COPYRIGHT INFRINGEMENT
                It is a form of Intellectual Property theft, leading to significant security issues and legal penalties. For example-COPYRIGHT INFRINGEMENT- if a person attempts to use or distribute another person’s work, who has “exclusive rights” over it, without authorization, he may be  found guilty of copyright infringement.
a)      The Common Internet Copyright violations involve illegal download of movies, music files and pirating software applications.
b)      Posting of copyrighted work such as writing or graphics online without the permission of the owner may also constitute Internet Copyright Infringement.



Friday, April 25, 2014

COOKIE MANIPULATION:

COOKIE MANIPULATION:

          A cookie is a small file or text only string registered in the memory of a web browser, used to identify a website user. Websites use cookies to authenticate users (e.g. gmail.com) personalize data (e.g. my yahoo), to assist customers with online sales or services (e.g e-bay.com) or merely for collecting statistical and demographic data (e.g. doubleclick.com).

           Cookies which are saved in the form of simple text files can be deleted. If you delete a cookie while your browser is open, it will be recreated when you close the browser; because all cookies are held in the memory of your browser till you close the browser.

          Browser can be set to accept all, some or none of the incoming cookies or can be set to warm before accepting it. Many sites uses cookies to implement access control schemes of various sorts e.g. a subscription site that requires a user name and password might pass a cookie back to your browser the first time you log in; then it will give you access to restricted pages, once your browser passes valid cookie.

          This may vulnerable  to exploitation, here, hacker could use a packet sniffer to intercept the cookies as it passes from your browser to the server and then use it to obtain free access to the site.

6 PARAMETERS IN A COOKIE:

i)                    Name of the cookie;
ii)                   The value of the cookie;
iii)                 Expiration date of the cookie;
iv)                 The path valid for the cookie;
v)                  The domain valid for cookie;
vi)                 A secure connection to use the cookie.
Out of these 6 parameters two are compulsory (i.e. its name and its value). The semicolon; separates each parameter when it is set explicitly.
1)      NAME VALUE:
The name and the value of the cookie can be set by pairing them together e.g. Name = Sanya.
2)      EXPIRES:
This parameter allows you to set the lifetime of the cookie. If it is not set clearly or not set at all; then by default the expiry gets set to the end of the session.
3)      PATH:
This is most useful parameter out of the four optional settings. This parameter establishes the URL path within which the cookie remains valid.
4)      DOMAIN:
This parameter extends the path parameter a little. If a site uses multiple servers for one domain, here it becomes important to specify the domain parameter in such a way so as to make the cookie accessible to any of the pages of these multiple servers e.g. domain=www.cyber_security.net.
It is possible to assign cookies to either an individual machine or to an entire Internet Domain. To set a cookie for a domain, the server should be a member of that domain. If a domain parameter is not set explicitly then by default the full domain of the document that has created the cookies is taken.

5)      SECURE:

This parameters indicates that a cookie with this parameter should only be used under secure condition e.g. SSL (Secure Socket Layer).

Saturday, April 19, 2014

COMPUTER TRESS PASS:

COMPUTER TRESS PASS:

                A person is guilty of computer trespass if he or she intentionally and without authorization – access, alters, deletes, damages, destroys or disrupts any computer program or data. The key element for all computer trespass offenses is lack of authorization to access a computer or computer system.

                

Thursday, April 10, 2014

CLICK FRAUD:

CLICK FRAUD:

This Click-fraud occurs when a person or an automated computer program sham-clicks on a pay-per-click advertisement and this is done for the purpose of generating a change per click without having an actual interest in the ad’s content; which is done by companies to deplete their competitor’s advertising budget or by websites to gain revenue. This can be done by some web sites in order to inflate their customer’s bill.


CLICK-BOTS also can be used for click fraud; which are small pieces of code, spreading like viruses on many computers to generate clicks from different IP Addresses. These Bots are generally controlled remotely by the person who wishes to limit the clicks to ads that can generate a real profit.

Sunday, April 6, 2014

New Doctoral Degree at Dakota State University in Madison

MADISON, S.D. (AP) — Dakota State University in Madison is reinforcing its specialty in cyber security by offering a new doctoral degree this fall.
The doctor of science in cyber security degree is designed to prepare students for cyber security careers in government agencies and the private sector, or to teach the topic at higher education institutions. It marks just the second doctoral degree offered at Dakota State.
University officials expect to admit 20 students and graduate about 18 annually once the program is fully ramped up. The South Dakota Board of Regents approved the degree this week, but it must also receive approval by the Higher Learning Commission.
(Ref.: Bloomberg Businessweek-04th April 2014)

Saturday, April 5, 2014

BULLYING IN CYBER SPACE

CYBER BULLYING:

                This takes place when the internet and related technologies are used to bully other people, in a deliberate, repeated and hostile manner, which can be done via (a) text messages or images; (b) personal remarks posted online;   (c) hate speeches;   (d) instigating others to dislike any gang up on the target by making them the subject of ridicule in forums and   (e) posting false statements in order to humiliate or embarrass another person.

                This Cyber bully attackers may also disclose victim’s personal data e.g. real name, address, or workplace/school/college on the websites. Cases of piggy-backing on victim’s identity are now common, which are used to publish objectionable material in their name that defames or ridicules a subject.

LEGISLATION:

                Legislation for penalizing CYBER BULLYING has been introduced in United States of America and in various US States such as New York, Missouri, Rhode Island and Merry-land and two other states totaling to seven states in the year 2007. California is the state which has passed one of the first Laws in USA in August 2008 to directly deal with Cyber bullying.

                In India, Cyber bullying is covered by section 66 A of the INFORMATION TECHNOLOGY ACT (IT ACT); which is titled, “PUNISHMENT FOR SENDING OFFENSIVE MESSAGES THROUGH COMMUNICATION SERVICE; ETC.” This section provides imprisonment up-to 3 years and fine which penalizes for the following being sent through emails; smses etc.

(i)                  Information that is grossly offensive or has menacing character; or
(ii)                False Information sent for the purpose of causing annoyance, inconvenience, danger, obstruction, insult, injury, criminal intimidation, enmity, hatred or ill will.
This section also penalizes for sending attachments in text, image, audio, video as well as any additional electronic record transmitted with the message for the following purposes:

(a)    Causing annoyance or
(b)   Causing inconvenience or

(c)    To deceive or to mislead about the origin of the message.