Sie sind auf Seite 1von 4

SONY PICTURES

On November 24, 2014, A hacker group which identified itself by the name "Guardians of Peace"
(GOP) leaked a release of confidential data from the film studio Sony Pictures Entertainment.
The data included personal information about Sony Pictures employees and their families, emails between employees, information about executive salaries at the company, copies of thenunreleased Sony films, and other information.
In December 2014, the GOP group demanded that Sony pull its film The Interviewa comedy
about a plot to assassinate North Korean leader Kim Jong-un, and threatened terrorist attacks at
cinemas screening the film. After major U.S. cinema chains opted not to screen the film in
response to these threats, Sony elected to cancel the film's formal premiere and mainstream
release, opting to skip directly to a digital release followed by a limited theatrical release the next
day.[1][2][3]
United States intelligence officials, after evaluating the software, techniques, and network
sources used in the hack, alleged that the attack was sponsored by North Korea.[4] North Korea
has denied all responsibility
FIGHTING AGAINST CYBER CRIMES AND INTERNATIONAL COOPERATION
An Indian national was sentenced today to 81 months in prison on conspiracy and aggravated identity
theft charges arising from an international fraud scheme to "hack" into online brokerage accounts in
the United States and use those accounts to manipulate stock prices, announced Assistant Attorney
General Lanny A. Breuer of the Criminal Division and U.S. Attorney Deborah Gilg of the District of
Nebraska.
Jaisankar Marimuthu, 36, a native of Chennai, India, was also ordered to pay $2.4 million in
restitution. Marimuthu pleaded guilty on Feb. 5, 2010, to one count of conspiracy to commit wire
fraud, securities fraud, computer fraud and aggravated identity theft, and to one count of aggravated
identity theft before U.S. District Magistrate Judge F.A. Gossett III in Omaha, Neb. Marimuthu, who
was extradited to the United States following his arrest in Hong Kong, was sentenced today before
U.S. District Judge Laurie Smith Camp.
Hacker

In the computer security context, a hacker is someone who seeks and exploits weaknesses in
a computer system or computer network. Hackers may be motivated by a multitude of reasons,
such as profit, protest, challenge, enjoyment,[1] or to evaluate those weaknesses to assist in
removing them. The subculture that has evolved around hackers is often referred to as the
computer underground and is now a known community.[
Phishing

Phishing is the attempt to acquire sensitive information such as usernames, passwords,


and credit card details (and sometimes, indirectly, money), often for malicious reasons, by
masquerading as a trustworthy entity in an electronic communication.[1][2] The word is

a neologism created as a homophone of fishing due to the similarity of using a bait in an attempt
to catch a victim. Communications purporting to be from popular social web sites, auction sites,
banks, online payment processors or IT administrators are commonly used to lure unsuspecting
victims. Phishing emails may contain links to websites that are infected with malware.[3] Phishing
is typically carried out by email spoofing[4] or instant messaging,[5] and it often directs users to
enter details at a fake website whose look and feel are almost identical to the legitimate one.
Phishing is an example of social engineering techniques used to deceive users, and exploits the
poor usability of current web security technologies.[6] Attempts to deal with the growing number of
reported phishing incidents include legislation, user training, public awareness, and technical
security measures. Many websites have now created secondary tools for applications, like maps
for games, but they should be clearly marked as to who wrote them, and users should not use
the same passwords anywhere on the internet.
Electronic spamming is the use of electronic messaging systems to send unsolicited

messages (spam), especially advertising, as well as sending messages repeatedly on the same
site. While the most widely recognized form of spam is email spam, the term is applied to similar
abuses in other media: instant messaging spam, Usenet newsgroup spam, Web search engine
spam, spam in blogs, wiki spam,online classified ads spam, mobile phone messaging
spam, Internet forum spam, junk fax transmissions, social spam, televisionadvertising and file
sharing spam. It is named after Spam, a luncheon meat, by way of a Monty Python sketch in
which Spam is included in every dish.[1] The food is stereotypically disliked/unwanted, so the word
came to be transferred by analogy.
Spamming remains economically viable because advertisers have no operating costs beyond the
management of their mailing lists, and it is difficult to hold senders accountable for their mass
mailings. Because the barrier to entry is so low, spammers are numerous, and the volume of
unsolicited mail has become very high. In the year 2011, the estimated figure for spam messages
is around seven trillion. The costs, such as lost productivity and fraud, are borne by the public
and by Internet service providers, which have been forced to add extra capacity to cope with the
deluge. Spamming has been the subject of legislation in many jurisdictions. [2]
A person who creates electronic spam is called a spammer.[3]

Workplace Monitoring
Employee monitoring is the act of monitoring employee activity. Organizations engage in
employee monitoring to track performance, avoid legal liability, protect trade secrets, and
address other security concerns. The practice may impact employee satisfaction due to its
impact on privacy
Employee monitoring often is in conflict with employees' privacy.[3] Monitoring often collects not
only work-related activities, but also employee's personal, not related to work information.
Monitoring does not mean that there are no limits to what should be collected. Monitoring in the
workplace may put employers and employees at odds because both sides are trying to protect
personal interests. Employees want to maintain privacy while employers want to ensure

company resources aren't misused. In any case, companies can maintain ethical monitoring
policies by avoiding indiscriminate monitoring of employees' activities.[4] The employee needs to
understand what is expected of them while the employer needs to establish that rule.

CONSUMER PROFILING
When you know your customers' needs, you can tailor your small business to meet them.
One of the best ways to understand your customers is by creating customer profiles, or
documents that list what kinds of people use or are likely to use your product or service.
While customer profiles can be a good business tool, they can also cause ethical issues.
Ads by Google

Bitrix24 - Best Free CRM


Bitrix24 - Free CRM, Sales, Calls, Email Marketing, More. 100% Free.
bitrix24.com/Free_CRM

Gathering Information
To develop customer profiles, businesses must collect information about their customers.
How businesses collect that information, however, is an ethical dilemma, and businesses
do not all agree where the ethical boundary lies. Some businesses collect customer
information using surveys and order-form questionnaires. Other businesses use software
programs that track what sites customers visit online. Some businesses have privacy
policies that guarantee that an individual's personal information will not be sold, while
others have websites expressly for the purpose of gathering and sharing customer
information.

Using Information
Most businesses use the information they gather about their customers to refine and
market existing products and create new innovations. Using the information for other
purposes, however, is an ethical boundary that many believe businesses should not
cross. For example, when a California supermarket attempted to reveal the alcohol
purchases logged on a man's shopper card as part of its defense in a injury lawsuit, they
were not received well. At least one other supermarket chain discontinued its card after
the incident.
Related Reading: Customer Tracking Ethics in the Hospitality Industry

Customer Mistreatment
Often, businesses collect demographic information about customers, such as their race
and gender, to help them understand who is buying their products. But when businesses
use that information to mistreat customers or single customers out for additional
scrutiny, most agree they have crossed an ethical boundary. For example, a number of
lawsuits have been filed against hotels, restaurants and department stores claiming that
store employees targeted customers for poor treatment because of their race.
Complainants argue that they were forced to prepay for meals and accused of shoplifting
as a result of a company's racial-profiling practice.

Marketing

Businesses must market their products and services to the groups that are most likely to
buy them. However, advertisements also help perpetuate societal stereotypes. For
example, advertisements that feature women cleaning in an attempt to sell cleaning
products perpetuate the stereotype that women are responsible for housekeeping.
Determining how they should use customer profiles to create effective advertising
without perpetuating stereotypes or creating advertisements that may be offensive to
some populations is an ethical dilemma that businesses must face

Cybersquatting (also known as domain squatting), according to the United States federal
law known as the Anticybersquatting Consumer Protection Act, is registering, trafficking in, or
using an Internet domain name with bad faith intent to profit from the goodwill of a trademark
belonging to someone else.

SPYWARE
software that enables a user to obtain covert information about another's computer activities
by transmitting data covertly from their hard drive.

Cyberbullying is bullying that takes place using electronic technology. Electronic


technology includes devices and equipment such as cell phones, computers, and tablets as
well as communication tools including social media sites, text messages, chat, and websites.

Das könnte Ihnen auch gefallen