As much as information and technology are important in our lives, very few people understand the risks involved with the usage of computers and electronic devices these days. In this report we take a deeper look into the legal and ethical issues with using computers. Some examples of this act include, identity theft, keystroke logging, and packet sniffing. All topics listed have negative impacts, or abuse the "power" of modern day technology to use to the persons advantage.
Ethical Issues with Computers Related to Identity Theft
Identity theft is the crime of obtaining another person's identity for the purpose of making transactions or purchases.(1) Identity theft can be performed in many different ways, some look through trash bins for bank information and credit card statements. Others use more high-tech methods. With the use of computers people are able to access corporate databases to steal lists of customer information. In the most severe cases criminals are able to steal millions of dollars. Some consumers victimized by identity theft may lose out on job opportunities or even be denied loans for education, housing or cars because of negative information on their credit reports. In rare cases, they may even be arrested for crimes they did not commit.
CIBC, came out with the seven best ways to prevent identity theft(2). CIBC recommends you review your records regularly, this will help you to identify any discrepancies in your banking information. Another method would be to safeguard personal information. By keeping your personal information safe (e.g. your social insurance number, and credit card numbers) you are able to reduce the chances of another person taking your identity. It is recommended to provide your personal information only if you have initiated the contact and you are absolutely sure with whom you are dealing with.
Keystroke Logging
Certain hardware devices can be used as keystroke loggers. These devices are plugged in between the cord of a keyboard and the input on a computer tower and are similar in size and appearance to a keyboard adapter plug(4). This is important as it is hard to identify making it and hard to protect yourself against. One of the best ways to protect yourself against keystroke logging include using a fire wall . In most instances, the keylogger has to transmit its information back to the attacker for it to do any harm. The keylogger must send data out from your computer via the internet. As your internet passes through a firewall there's a chance it will realize something isn't quite right. Another valuable and maybe not so complicated option would be to always change your passwords. Frequently changing your passwords will help minimize the potential damage of a keylogging attack. Your password may be stolen, but it would be uncommon for it to be stolen and used immediately unless that keylogger was targeted directly at you.
A packet sniffer, sometimes called a packet analyzer, is composed of two main parts. First, a network adapter that connects the sniffer to the existing network. Second, software that provides a way to log, see, or analyze the data collected by the device.
Packet Sniffing
Packet sniffing is the practice of gathering, collecting, and logging some or all packets that pass through a computer network, regardless of how the packet is addressed. In this way, every packet, or a defined subset of packets, may be gathered for further analysis. You as a network administrators can use the collected data for a wide variety of purposes like monitoring bandwidth and traffic.
Two Types Of Packet Sniffers
Hardware Packet Sniffers
A hardware packet sniffer is designed to be plugged into a network and to examine it. A hardware packet sniffer is particularly useful when attempting to see traffic of a specific network segment. By plugging directly into the physical network at the appropriate location, a hardware packet sniffer can ensure that no packets are lost due to filtering, routing, or other deliberate or inadvertent causes. A hardware packet sniffer either stores the collected packets or forwards them on to a collector that logs the data collected by the hardware packet sniffer for further analysis.
Software Packet Sniffers
Most packet sniffers these days are of the software variety. While any network interface attached to a network can receive every bit of network traffic that flows by, most are configured not to do so. A software packet sniffer changes this configuration so that the network interface passes all network traffic up the stack. This configuration is known as promiscuous mode for most network adapters. Once in promiscuous mode, the functionality of a packet sniffer becomes a matter of separating, reassembling, and logging all software packets that pass the interface, regardless of their destination addresses. Software packet sniffers collect all the traffic that flows through the physical network interface. That traffic is then logged and used according to the packet sniffing requirements of the software.
Summary
To summarize this article has covered the many different ethical issues with the usage of computers including, Identity theft, Keystroke logging, and lastly packet sniffing. All methods have a negative impact and/or abuse the power of modern day technology.
Questions
1. Describe some ways to prevent against Ideniy Theft.
2. What is the diffrence between hardware packet sniffers and software packet sniffers.
3. What makes it so hard to identify keystroke logging, Why is this an issue?
Answers
Bibliography
(1) Kagan, Julia. "Identity Theft Definition." Investopedia, Investopedia, 29 Jan. 2020,www.investopedia.com/terms/i/identitytheft.asp.
(2) "7 Tips to Protect Yourself From Identity Theft." CIBC, www.cibc.com/en/personal-banking/advice-centre/protect-whats-important/identity-theft.html.
(3)"keystroke Logging" Wiki, https://en.wikipedia.org/wiki/Keystroke_logging
(4)Wiesen, G., and Heather Bailey. "What Is Keystroke Logging?" WiseGEEK, Conjecture Corporation, 23 Jan. 2020,www.wisegeek.com/what-is-keystroke-logging.htm.
(5)O'Donnell, Andy. "What Are Packet Sniffers and How Do They Work?" Lifewire, Lifewire, 18 Nov. 2019,www.lifewire.com/what-is-a-packet-sniffer-2487312.