• Question 29 Virus writers generally write viruses to steal information and destroy data. • Question 30 Which of the following is true? • Question 31 What major category of information warfare/cyber-terror does “web site defacement” fall into? • Question 32 Hackers were generally considered to be “criminals” as early as the 60s. • Question 33 The motives for many writers of malicious software have changed from profit to curiosity and revenge.
Cyber terrorists can be motivated to target organizations that will result in the radical’s group to cause the most harm and/or receive the most attention for their party. Cyberterrorists use the internet to spread propaganda and enlist new members and use DoS/DDoS attacks to cause disruption to companies that represent actions against their belief’s (Vacca & Rudolph, 2011). Cyber terrorists can also steal information to be used for self-serving strategic purposes. Kostadinov (2012) makes the distinction between cybercrime and cyberterrorism in that the latter should resemble terrorist attacks via traditional methods but perpetrated virtually. Kostadinov goes on to note that most cyberterrorism actions are generally focused on website sabotage and email blasting.
Which one is the most dangerous to you and society? Some issues with technology are finding reliable sites on the web because anyone can make a website. Also Hacking and identity theft through the internet are the most dangerous in my society. (2 pts) What is your impression of reading books on a device like the Kindle? If given the chance would you download your class textbooks to a Kindle rather than purchasing them in the bookstore?
In social networks people make “friends” without knowing the person and make personal information easily available” (Sauter, Poltrack, & Allen, 2012, para. 2). Criminals using social media use tools that will go through a dictionary on the Internet searching for common passwords. Facbook users can be victims of this type of hacking because many of the passwords used are common. Another way criminals use Facbook is a way to commit cyber-crime by profile cloning.
Port scans are the way in for the attacker. The port scan lets the attacker know what ports on a machine are open. This is basically an unlocked door into that machine. The attacker can gain access to information they will use in their attack on the system itself. These attacks can lead to the theft of any information stored in the network and is a serious threat to information security.
They break into our computer for several reasons but mainly to acquire personal information for financial gain, shut down hardware, steal people’s credit information, and destroy data. To protect ourselves from hackers, we should equip our computer with Firewall. This hardware “prevents unauthorized Internet users from accessing private information” (Williams & Sawyer, 2013, p. 361). Identity theft is a serious crime in which thieves steal your name and identity and use to later to make a purchase under your name. Thieves access your personal information by sending out fake e-mail, mining the trash, and stealing your
Tevin Hutchinson 11/10/2012 English 102 Technology plays a huge role in our everyday life. I do believe that technology has made our lives easier, but it also has made us more dependent on the technology itself. When using the internet for a dictionary you could easily get distracted. Anyone can put anything on the internet, so what you find might not be accurate. Most people find that looking things up on the internet is distracting because you are already on the web so why not check YouTube for a funny video, or update your status on the social network.
David Foster Wallace states, “Learning how to think really means learning how to exercise control over how and what you think (Carr 195). According to Carr, “The seductions of technology are hard to resist, and in our age of instant information the benefits of speed and efficiency can seem desirable beyond debate” (224). Unlike machines, human beings possess free will. People can choose to limit internet usage. They can choose to engage in deep thinking activities.
However, with the advancement in technology and its wide use, a new type of bullying has developed, cyberbullying, which is when a person uses technology and/or electronic devices to bully another person, typically by sending messages or posting comments of an intimidating or threatening nature. What makes cyber-bullying much more dangerous than regular bullying is that because if it on the internet, it will stay there for a long time and for everyone to see. What’s worse, is that the bully can easily hide under a different name or profile, making it harder to find out who is responsible in terms of facing consequences. It is very important to delete cyberbullying because when teenagers begin to abuse the convenience of the internet to harass others, it creates a very dangerous environment that extends outside the classroom or school. When someone is being harassed or embarrassed online, it reaches far outside of their world, and strangers all
Companies such as this are required not only legally, but ethically to protect the customers’ private information or be held accountable by law. It is also bad practice to allow this sensitive information to be disseminated and stolen by cyber criminals. Since this kind of data must be protected at all costs, certain regulations were put in place so that standards for information security could be monitored. One of these standards is that all personal information is to be encrypted when being sent over the internet and also on the servers. This will make it much harder for the hacker to access the information easily.