Monday, June 25, 2012

Cyber crime: Companies taking controversial steps to chase cyber criminals


Frustrated by their inability to stop sophisticated hacking attacks or use the law to punish their assailants, an increasing number of US companies are taking retaliatory action.
Known in the cybersecurity industry as "active defense" or "strike-back" technology, the reprisals range from modest steps to distract and delay a hacker to more controversial measures. Security experts say they even know of some cases where companies have taken action that could violate laws in the United States or other countries, such as hiring contractors to hack the assailant's own systems.

What is Cyber crime ?????????????



Parents, teachers, non-profits, government, and industry have been working hard to protect kids online. However, we also need to think about protecting the Internet from kids who might abuse it.The Department of Justice categorizes computer crime in three ways:
  1. The computer as a target - attacking the computers of others (spreading viruses is an example).
  2. The computer as a weapon - using a computer to commit "traditional crime" that we see in the physical world (such as fraud or illegal gambling).
  3. The computer as an accessory - using a computer as a "fancy filing cabinet" to store illegal or stolen information.
Reports of alleged computer crime have been a hot news item of late. Especially alarming is the realization that many of the masterminds behind these criminal acts are mere kids. In fact, children no longer need to be highly skilled in order to execute cyber crimes. "Hacker tools" are easily available on the Net and, once downloaded, can be used by even novice computer users. This greatly expands the population of possible wrongdoers. Children (and in some cases - their parents) often think that shutting down or defacing Web sites or releasing network viruses are amusing pranks. Kids might not even realize that what they are doing is illegal. Still other kids might find themselves hanging out online with skilled hackers who share hacking tools with them and encourage them to do inappropriate things online. Unfortunately, some of these kids don't realize that they are committing crimes until it is too late. Even more distressing and difficult to combat is the fact that some in the media portray the computer criminal as a modern day Robin Hood. Nothing could be further from the truth.
So what are cyber crimes? Can the law enforcement authorities find criminals online? How can you create context for your children to understand what cyber crimes are? The following information (and areas throughout the site) will help familiarize you with unethical and illegal online behavior. Additionally, to learn more about cyber crime, visit the Department of Justice Computer Crime & Intellectual Property Section's website at www.cybercrime.gov. The Computer Emergency Response Team (CERT) atwww.cert.org and the National Infrastructure Protection Center at the FBI at www.infragard.net provides regularly updated information and descriptions of cyber crimes. 

Communication


Communication is defined as a process by which we assign and convey meaning in an attempt to create shared understanding. This process requires a vast repertoire of skills in intrapersonal and interpersonal processing, listening, observing, speaking, questioning, analyzing, and evaluating. Use of these processes is developmental and transfers to all areas of life: home, school, community, work, and beyond. It is through communication that collaboration and cooperation occur.
Fundamental Beliefs About Curriculum and Assessment - If there is one unifying theme that crosses all disciplines, it is communication. Communication is our window to basic literacy and academic excellence. Reaching levels of excellence and accuracy of expression mandate mastery of formal English. These are the capabilities that cultivate the potential in each student and the possibilities for our future.