1st: Identity theft- What is that? How does it harm to on the Internet? Give Examples.
Identity theft is the crime of obtaining the personal or financial information of another person for the sole purpose of assuming that person's name or identity to make transactions or purchases or other things such as getting into university, assume someone else's life . Identity theft is committed many different ways. Some identity thieves sift through trash bins looking for bank account and credit card statements; other more high-tech methods involve accessing corporate databases to steal lists of customer information Once they have the information they are looking for, identity thieves can ruin a person's credit rating and the standing of other personal information.I think the most easy way to think about it is to think it liken this, the fact that there are people who are willing to sell you their life on places like ebay means that is some way there is market for that, now imagine someone steals that from you whatever their purpose may be stealing is bad, especially information that involves someone's life and money. There are people who even still information from dead people in order to get insurance money, or to even use their record to go to college or whatever their purpose may be, this even has name is ghosting.
There are many ways that this could happen to somebody in the age of the internet, they could use your email to open a pre-approved credit and then go and spend it all, there is also phishing , there are also conning calls in which they ask you certain information pretending to be someone else and you like that give you information. Those are some example of how your identity could be stolen from you.
2nd: What is spyware? How to harm? Giving examples.
Spyware is a type of malware that is installed on a computer without the knowledge of the owner in order to collect the owner’s private information. Spyware is often hidden from the user in order to gather information about internet interaction, keystrokes (also known as keylogging), passwords, and other valuable data. Spyware can also negatively affect a computer’s performance by installing additional software, redirecting web browser searches, changing computer settings, reducing connection speeds, changing the homepage or even completely disrupting network connection ability. Spyware can also be used as a type of adware, where the software delivers unsolicited pop-up ads in addition to tracking user behavior. Typically, spyware is installed when a user installs a piece of free software that they actually wanted. When the desired software is installed, the spyware will piggyback on the installation and start collecting data from the user’s activities. The user can also be tricked into installing the spyware through a Trojan horse as well as it pretending to be a free piece of security software. Spyware authors have been known to pay shareware developers to bundle their spyware with the legitimate software as well as simply repackaging freeware and bundling it with their own spyware. Drive-by downloading is another method used to install spyware on an unsuspecting user’s computer.
I know this by myself when I was first time I download music with a unknow website and my computer sometime don’t work and I turn power off many times, and when I serve on the internet , I find out they are many advertisement that are no good and it is very slow, then I start to open the firewall, and it didn,t work,my dad told me is stuck with virus, so we throw that computer away and buy a new one, but this time I dowload the in application to defense the virus.
3rd: What are phishing and online fraud? How to harm? Giving examples.
The act of sending an email to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft.
Phishing email will typically direct the user to visit a website where they are asked to update personal information, such as a password, credit card, social security, or bank account numbers, that the legitimate organization already has. The website, however, is bogus and will capture and steal any information the user enters on the page.
Having essential information like credit card numbers, passwords, social security even your house direction is a dangerous thing to various degrees. This could potentially harm you financially, security wise because will know things about you personal things, this might mean you have to change house, change all you information and such just to keep yourself safe in real life. They know who you are and you don’t have the slightest idea of who they are. For example: Some people send mass emails asking for verification information for a website that looks like is real but all they do is copy the HTML code and make it look like it, but in reality you are just giving them your are actual information and is all a facade.
4th: What are spam, Adware? How to harm? Giving examples.
Spam can be used to spread computer viruses, trojan horses or other malicious software. The objective may be identity theft, or worse. Some spam attempts to capitalize on human greed, while some attempts to take advantage of the victims' inexperience with computer technology to trick them. Spam is the term used for unsolicited, impersonal bulk electronic messages. Although email spam is the most common form of spamming, others exist, like mobile phone messaging spam and instant messaging spam.
Spam involves sending nearly identical messages to thousands (or millions) of recipients. Spammers use software robots, called spambots (also Web crawlers or Web spiders) in order to get valid email addresses from company Websites, blogs and newsgroups. Common subjects of spam messages are pornographic or other sexually related Web sites, various financial services or get-rich-quick schemes and health products.Spam messages normally have a fake origin address, which is randomly generated, in order to keep the author of the message from being easily discovered.
On May 31, 2007, one of the world's most prolific spammers, Robert Alan Soloway, was arrested by US authorities. Described as one of the top ten spammers in the world, Soloway was charged with 35 criminal counts, including mail fraud, wire fraud, e-mail fraud, aggravated identity theft, and money laundering Prosecutors allege that Soloway used millions of "zombie" computers to distribute spam during 2003. This is the first case in which US prosecutors used identity theft laws to prosecute a spammer for taking over someone else's Internet domain name.
5th: What are "inappropriate sites" in the video? How to harm? Giving examples.
Inappropriate sites are what include information or images that upset your child, material that’s directed at adults, inaccurate information or information that might lead or tempt your child into unlawful or dangerous behaviour.
When children enter these sites and contact these bad information. They may intimate some bad behaviour.
My classmates in junior high school usually surf some sexually explicit materials sites which include graphic pictures and videos intended for adults. They can discuss something about sexual video in school. They even image they are in the video. Regarding sex, they get wrong and unhealthy information from these sexually explicit materials sites.
6th: What are malwares ( virus, worms, Trojans) ? How to harm? Giving examples.
A computer virus attaches itself to a program or file enabling it to spread from one computer to another, leaving infections as it travels., all viruses are attached to an executable file, which means the virus may exist on your computer but it actually cannot infect your computer unless you run or open the malicious program.one example of it is can happen in any file that you open is unsafe and unstrustable
Worms spread from computer to computer, but unlike a virus, it has the capability to travel without any human action. A worm takes advantage of file or information transport features on your system,The biggest danger with a worm is its capability to replicate itself on your system, so rather than your computer sending out a single worm, it could send out hundreds or thousands of copies of itself, One example would be for a worm to send a copy of itself to everyone listed in your e-mail address book. Then, the worm replicates and sends itself out to everyone listed in each of the receiver's address book, and the manifest continues on down the line.
Trojans are designed to be more annoying than malicious (like changing your desktop, adding silly active desktop icons) or they can cause serious damage by deleting files and destroying information on your system. Trojans are also known to create a backdoor on your computer that gives malicious users access to your system, possibly allowing confidential or personal information to be compromised. Unlike viruses and worms, Trojans do not reproduce by infecting other files nor do they self-replicate.
If we want to defense the malware on the internet it is better you open the firewall, and always updated the system with the new one so nothing can harm us, and is better to download a VIRUS APPLICATION TO DEFENSE.
7th:What are the differences among virus, worms, and Trojans?
According to the question 6th, one common mistake that people may make when the topic of a computer virus arises is to refer to a worm or Trojan horse as a virus. While the words Trojan, worm and virus are often used interchangeably, they are not exactly the same thing. Viruses, worms and Trojan Horses are all malicious programs that can cause damage to your computer, but there are differences among the three.
8th: questions about hackers
8.1 What is the stereotype toward them?
That they are evil and do bad things, like attacking and stealing information. They smart and that they are young, introverted with too much time in their hands. That they are boys. That they are terrorist and work in dark rooms by themselves. (cristina)
First came out in mind is they are someone who hacking others information and they are boys. But in fact, they can be good and also can be a girl.(dolphin)
My impression of Hackers is that they are all bad guy and always do illegal things.They are thin and their skin is fair because they always stay in room. They may wear all black . They enter computers illegally and steal information. They are thieves.(Amy)
I don’t think they are so bad but many people think they are just like to hack everyone's information on the internet.(yoyi)
8.2 What are their background?
I think this is quite a difficult question to answer, because since hacker's life in the anonymity thus gathering information about their background as a group is hard, there is not much information in the web because hackers can delete this information, even hack it and change it. If they can access USA military classify information I believe they can mess with other things too. However so far, the hackers that have being caught are for the most part white man between the ages of 21 and 40, there are speculations that the best ones are in Asia in countries like China because of the lack of international regulation there and the government censorship hackers who grew up in this environment of control have more “practice” when to comes to opening networks and deceiving the own government by making proxies or facade networks and activities.Without mentioning the countless machines that hackers can use and have access to in order to cut interceptions. They could looks like you and me, or the person sitting next to you in starbucks, that is what makes it so scary, considering that children have access to, the demographic for young hackers is said to be big too, but what laws are there for hacker underage people?
8.3 What are the similarities and differences among black, white, gray hackers based on populations and their motivations?
This is doesn’t make any sense, to me that is. In the hacker community especially one as big as Anonymous such information does not exist. The classification, is made by people who wants to put them in different type of “jobs” that they do, but in reality in the own community we really don’t know if such a thing exists for sure, simple because active members of the community don’t talk about it for protection. There is a lot of speculation when it comes to finding information about hacker because it may as well be planted information for their own benefit. Considering that a lot of the best hackers work for the government in different levels of security and work, and for security reason this information is for the most part classify in order to protect national security and personal too.
8.4 What social pressure do they face?
They have social pressure like blame and get catch by police, because in the police they can be the hackers too, or the public is going to help catch the hacker, like first be friendly with the hacker and later tell police about their information, so hacker really are busy and hiding from our normal people,it is very tired but they deserved it I think
8.5 Offer examples of black, white, gray hackers.
Black-
Robert Tappan Morris: Morris, son of former National Security Agency scientist Robert Morris, is known as the creator of the Morris Worm, the first computer worm to be unleashed on the Internet. As a result of this crime, he was the first person prosecuted under the 1986 Computer Fraud and Abuse Act.Morris wrote the code for the worm while he was a student at Cornell. He asserts that he intended to use it to see how large the Internet was. The worm, however, replicated itself excessively, slowing computers down so that they were no longer usable. It is not possible to know exactly how many computers were affected, but experts estimate an impact of 6,000 machines. He was sentenced to three years' probation, 400 hours of community service and a fined $10,500. Morris is currently working as a tenured professor at the MIT Computer Science and Artificial Intelligence Laboratory. He principally researches computer network architectures including distributed hash tables such as Chord and wireless mesh networks such as Roofnet.
White-
Linus Torvalds is the creator of Linux, a family of operating systems that brought the flexibility and security of Unix-based systems to the public in an easy-to-digest manner.Torvalds started his hacking by fiddling around with his personal machines when he was a child. In 1991, he created the first version of the Linux kernel using the Minix operating system as his source of inspiration. Eventually, he asked for contributors to help him out. Fast forward many years later and now Linux is popular worldwide.
Grey-
In August 2013 Khalil Shreateh, an unemployed computer security researcher, hacked the Facebook page of Mark Zuckerberg, Facebook’s CEO, in order to force action to correct a bug he discovered which allowed him to post to any user’s page without their consent. He had tried repeatedly to inform Facebook of this bug only to be told by Facebook that the issue was not a bug. After this incident, Facebook corrected this vulnerability which could have been a powerful weapon in the hands of professional spammers. Shreateh was not compensated by Facebook’s White Hat program because he violated their policies making this a grey hat incident.
9th question: what can people and government do to investigate/prevent/stop... cybercrime?
What I know in these year until now, the people, government police or whatever they can’t do anything when the hackers is seriously and don’t want us to know them, and so those people have no idea to arrest them and even don’t know who they are where they are.



