The Legal and Ethical Issues with Using Computers

 

 

Introduction

As much as information and technology are important in our lives, very few people understand the risks involved with the usage of computers and electronic devices these days. In this report we take a deeper look into the legal and ethical issues with using computers. Some examples of this act include, identity theft, keystroke logging, and packet sniffing. All topics listed have negative impacts, or abuse the "power" of modern day technology to use to the persons advantage.

 

Ethical Issues with Computers Related to Identity Theft

Identity theft is the crime of obtaining another person's identity for the purpose of making transactions or purchases.(1) Identity theft can be performed in many different ways, some look through trash bins for bank information and credit card statements. Others use more high-tech methods. With the use of computers people are able to access corporate databases to steal lists of customer information. In the most severe cases criminals are able to steal millions of dollars. Some consumers victimized by identity theft may lose out on job opportunities or even be denied loans for education, housing or cars because of negative information on their credit reports. In rare cases, they may even be arrested for crimes they did not commit.

CIBC, came out with the seven best ways to prevent identity theft(2). CIBC recommends you review your records regularly, this will help you to identify any discrepancies in your banking information. Another method would be to safeguard personal information. By keeping your personal information safe (e.g. your social insurance number, and credit card numbers) you are able to reduce the chances of another person taking your identity. It is recommended to provide your personal information only if you have initiated the contact and you are absolutely sure with whom you are dealing with.

 

Keystroke Logging

Keystroke logging, often referred to as keylogging is the act of capturing or recording the keys stuck on a keyboard(3). This is usually done covertly so the person does not know that they are being monitored. Keystroke logging is usually done through malicious computer programs or part of a legitimate security system. Keylogging is often considered an invasion of private information and can be very devastating if it is used to gain important private information. There are several steps that can be taken to help protect a computer and user from keystroke logging. As with most computer security issues, being cautious and using computer security software are the best ways of preventing against these problems.

Certain hardware devices can be used as keystroke loggers. These devices are plugged in between the cord of a keyboard and the input on a computer tower and are similar in size and appearance to a keyboard adapter plug(4). This is important as it is hard to identify making it and hard to protect yourself against. One of the best ways to protect yourself against keystroke logging include using a fire wall . In most instances, the keylogger has to transmit its information back to the attacker for it to do any harm. The keylogger must send data out from your computer via the internet. As your internet passes through a firewall there's a chance it will realize something isn't quite right. Another valuable and maybe not so complicated option would be to always change your passwords. Frequently changing your passwords will help minimize the potential damage of a keylogging attack. Your password may be stolen, but it would be uncommon for it to be stolen and used immediately unless that keylogger was targeted directly at you.

Packet Sniffing

Packet sniffing is the practice of gathering, collecting, and logging some or all packets that pass through a computer network, regardless of how the packet is addressed. In this way, every packet, or a defined subset of packets, may be gathered for further analysis. You as a network administrators can use the collected data for a wide variety of purposes like monitoring bandwidth and traffic.

A packet sniffer, sometimes called a packet analyzer, is composed of two main parts. First, a network adapter that connects the sniffer to the existing network. Second, software that provides a way to log, see, or analyze the data collected by the device.

Two Types Of Packet Sniffers

Hardware Packet Sniffers

A hardware packet sniffer is designed to be plugged into a network and to examine it. A hardware packet sniffer is particularly useful when attempting to see traffic of a specific network segment. By plugging directly into the physical network at the appropriate location, a hardware packet sniffer can ensure that no packets are lost due to filtering, routing, or other deliberate or inadvertent causes. A hardware packet sniffer either stores the collected packets or forwards them on to a collector that logs the data collected by the hardware packet sniffer for further analysis.

Software Packet Sniffers

Most packet sniffers these days are of the software variety. While any network interface attached to a network can receive every bit of network traffic that flows by, most are configured not to do so. A software packet sniffer changes this configuration so that the network interface passes all network traffic up the stack. This configuration is known as promiscuous mode for most network adapters. Once in promiscuous mode, the functionality of a packet sniffer becomes a matter of separating, reassembling, and logging all software packets that pass the interface, regardless of their destination addresses. Software packet sniffers collect all the traffic that flows through the physical network interface. That traffic is then logged and used according to the packet sniffing requirements of the software.

Summary

To summarize this article has covered the many different ethical issues with the usage of computers including, Identity theft, Keystroke logging, and lastly packet sniffing. All methods have a negative impact and/or abuse the power of modern day technology.

Questions

1. Describe some ways to prevent against Ideniy Theft.
2. What is the diffrence between hardware packet sniffers and software packet sniffers.
3. What makes it so hard to identify keystroke logging, Why is this an issue?
Answers

Bibliography

(1) Kagan, Julia. "Identity Theft Definition." Investopedia, Investopedia, 29 Jan. 2020,www.investopedia.com/terms/i/identitytheft.asp.
(2) "7 Tips to Protect Yourself From Identity Theft." CIBC, www.cibc.com/en/personal-banking/advice-centre/protect-whats-important/identity-theft.html.
(3)"keystroke Logging" Wiki, https://en.wikipedia.org/wiki/Keystroke_logging
(4)Wiesen, G., and Heather Bailey. "What Is Keystroke Logging?" WiseGEEK, Conjecture Corporation, 23 Jan. 2020,www.wisegeek.com/what-is-keystroke-logging.htm.
(5)O'Donnell, Andy. "What Are Packet Sniffers and How Do They Work?" Lifewire, Lifewire, 18 Nov. 2019,www.lifewire.com/what-is-a-packet-sniffer-2487312.