Transcript ch01
Cyberlaw
– Law governing the use of computers and the
Internet
– Made up of state and federal constitutional,
statutory, and case law
– Builds on traditional laws that apply to brickand-mortar companies
©2004 West Legal Studies in Business
A Division of Thomson Learning
1
The Internet
– Network of computer networks
• Used for e-mail, file transfer, chatrooms
– Different from the World Wide Web (WWW)
• Used for commerce and information dissemination
©2004 West Legal Studies in Business
A Division of Thomson Learning
2
History of the Internet
• 1969 ARPANET
– Department of Defense built to enable defense researchers at
various sites across the country to communicate and collaborate
• Universities Began to Use
– Discussion groups, access to databases, and file transfers
• 1973 ARPANET Grew
– Connected to more networks, including those in other countries
• 1980’s National Science Foundation
– Built its own network
• 1990 ARPANET
– Ceased to exist
• WWW in 1991
– Until this time commercial use was prohibited
©2004 West Legal Studies in Business
A Division of Thomson Learning
3
WWW
• 1991 CERN European Laboratory for
Particle Physics
– For physicists to exchange formatted
academic and technical papers
– 1990 Tim Berners-Lee developed and named
the WWW
©2004 West Legal Studies in Business
A Division of Thomson Learning
4
Internet Works
• Individual user connects to an Internet Service Provider
(ISP) by phone line, satellite dishes, or cable television
lines
• Slower connections use modems; faster connections use
network interfaces
• The bandwidth is the capacity of the line
• Larger ISPs connected to the backbone of the Internet,
and have their own international networks
©2004 West Legal Studies in Business
A Division of Thomson Learning
5
Internet Addresses
• Every computer connected to the Internet has a
unique Internet protocol (IP) address that
consists of four series of three numbers ranging
from 1 to 256, separated by periods.
• Hard to remember 12 numbers
• Domain Name System (DNS) implemented in
1984
– Matches the 12 numbers with a text name in a
manner similar to a telephone directory.
– Type in the text address into a browsers (IE), the
domain server connects the name with the number
and connects the two computers
©2004 West Legal Studies in Business
A Division of Thomson Learning
6
Domain Names
• Top-level domain name and subdomain
names
– TLDs - Every country given a top-level
domain name
• UK = co.uk for company in United Kingdom
• US = com, gov, net, org
– Legal Issue – conflict between domain name
and trade name or mark
©2004 West Legal Studies in Business
A Division of Thomson Learning
7
Language of the Internet
– Need for a common language
– Hypertext markup language (HTML) =
common language
– Hypertext transfer protocol (http) = a way of
exchanging such files http://
– HTML can be viewed on any type of
computer, using any operating system, as
long as it has an appropriate viewer = web
browsers
©2004 West Legal Studies in Business
A Division of Thomson Learning
8
URL Uniform Resource Locator
• Within a domain, there may be many web
pages or files
• Each file is identified by its URL
• Files are stored on the web server of that
Internet node
• Files are transferred from server to a client
or browser
©2004 West Legal Studies in Business
A Division of Thomson Learning
9
Transmitting Information
• All info is transmitted by digital
transmissions, represented by zeroes and
ones
• All data travels in packets
– Each packet has a header with the address of
the computer to which it is being sent
©2004 West Legal Studies in Business
A Division of Thomson Learning
10
Packet Communication
• Files and messages are carved
(Packetized) into standard size bundles of
information.
– A network must have a system for carving
information into packets at the sending end
(packetizing) and reassembling the packets
into messages and files at the receiving end
(de-packetizing)
• Not all packets follow the same route to
the end address
©2004 West Legal Studies in Business
A Division of Thomson Learning
11
Netiquette
• Culture on the Internet
©2004 West Legal Studies in Business
A Division of Thomson Learning
12
Regulation of Cyberspace
• No one owns the Internet = self policing
• Internet Society oversees boards and task
forces that make policy
– Engineering Steering Group = Internet Standards
– Internet Engineering Task Force = protocol
engineering and development group
– ICANN = domain names
– WWW Consortium (W3C) develops Web technologies
©2004 West Legal Studies in Business
A Division of Thomson Learning
13
Designed to be
“Open” and Unsecured
• Now e-commerce lacks security & privacy
– Cookies = server stores on user’s machine
• Information about last visit: may include name,
address, sex, pages visited, etc.
– Java enables the sender to execute programs
on the visitor’s machine
• JVM java virtual machine program in the browser
supposed to protect user from harmful java
programs being put on the user’s machine – does
not always work
©2004 West Legal Studies in Business
A Division of Thomson Learning
14
Cache
• Temporary storage space on the user’s
hard drive
• When a web page is viewed, a copy is
held in this storage space
• Overwritten each time web page is visited
©2004 West Legal Studies in Business
A Division of Thomson Learning
15
Information Security
• Firewalls
– programs that limit the access to computers or files on
a computer by many methods: passwords, time of
day, etc.
• Filters
– Block access to certain sites based on keywords
contained in the document
– W3C developed Platform for Internet Content
Selection (PICS) – how to insert labels in documents
based on rating criteria developed by others
©2004 West Legal Studies in Business
A Division of Thomson Learning
16
Information Security cont.
• Need to protect packets as they travel
through the Internet
– Private key – encrypt and decrypt using same
key
– Public key – encrypt and decrypt using two
keys
©2004 West Legal Studies in Business
A Division of Thomson Learning
17
Information Security cont.
• Carnivore – FBI’s system capable of monitoring
Internet transmission by intercepting at the ISP
level
– Foiled by good encryption
• Magic Lantern - a program that enables FBI to
install a program on a user’s computer that will
capture the key strokes of the user, key logging
systems (KLS) and reveal the password to the
encryption to the FBI
©2004 West Legal Studies in Business
A Division of Thomson Learning
18
Information Security cont.
• Digital signatures
– Encrypt your signature with your private key
– Receiver has public key to unencrypt
– This proves it is your signature and not
spoofing
©2004 West Legal Studies in Business
A Division of Thomson Learning
19
Weaknesses of the Internet
• Denial of service attacks by overloading a
server – Ping of Death
• Viruses
• Passwords stolen
©2004 West Legal Studies in Business
A Division of Thomson Learning
20
Business Uses of Internet
Technologies
• Intranet - solely within an organization
• Extranet - open your intranet to a limited number of
people on the outside (customers, clients)
• Virtual Private Networks ( secure a piece of the Internet
for your use only)
• File transfer protocol (FTP) – move files from one
computer to another
• Peer-to-Peer networks: Kazaa and Gnutella
– Connect individual machines for the purpose of sharing files
without the need for a third-party server
©2004 West Legal Studies in Business
A Division of Thomson Learning
21
Business Uses continued
• Instant messaging – communicating in real time
• Videoconferencing –
• E-Mail
– Spam
– Flooding
©2004 West Legal Studies in Business
A Division of Thomson Learning
22
Globalization
• 2002 more than two-thirds of the Internet users
are outside of U.S.
©2004 West Legal Studies in Business
A Division of Thomson Learning
23
Law and Cyberspace
–
–
–
–
–
–
–
–
–
–
–
–
–
Chapter 1
Chapter 2
Chapter 3
Chapter 4
Chapter 5
Chapter 6
Chapter 7
Chapter 8
Chapter 9
Chapter 10
Chapter 11
Chapter 12
Chapter 13
E-Business an Cyberlaw
Jurisdiction
Trademarks
Copyrights
Business Method Patents
Online Contracting and Licensing Agreements
Sales Tax in E-Commerce
Online Security Offerings
Privacy
Obscenity
Defamation
Internet and Information Security
Internet and Computer Crime
©2004 West Legal Studies in Business
A Division of Thomson Learning
24