Community paper presentation 3 l.jpg
This presentation is the property of its rightful owner.
Sponsored Links
1 / 7

Community Paper Presentation #3 PowerPoint PPT Presentation


  • 246 Views
  • Updated On :
  • Presentation posted in: Funny / Jokes

Community Paper Presentation #3. Leann Daddario & Chris . Community Question. Are computer hacks legitimate political activities?

Download Presentation

Community Paper Presentation #3

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -

Presentation Transcript


Community paper presentation 3 l.jpg

Community Paper Presentation #3

Leann Daddario & Chris


Community question l.jpg

Community Question

  • Are computer hacks legitimate political activities?

  • Is it a good way to express dislike or anger over the actions of a politician or government agency, or is it just garden variety vandalism, the equivalent of spray painting something on the wall of a public building?

  • Is it civil disobedience to take down a site and is it effective?


It attacks cost corporations and governments cost millions of dollars l.jpg

IT attacks cost corporations and governments cost millions of dollars.

  • Terrorists are attacking under the name of:

    • politics

    • religion

    • Anti corporate beliefs


The internet is used for business l.jpg

The Internet is used for business

  • Cyber-terrorism only serves to increase public skepticism and caution no matter what the alleged reasoning of the terrorist may be.

    • Vital information is being shared

      • Social security numbers

      • Credit card numbers

      • Home addresses

      • Bank account numbers


Hacking can be seen as a relatively safe method of terrorism l.jpg

Hacking can be seen as a relatively safe method of terrorism

  • Air Tran/ValuJet hacking example

    • Air Tran lost millions because of the crash

    • Hacking the website further debilitated reconstruction

    • Cyber terrorism is harmful but preferable to physical attacks


Comparing hacking incidents l.jpg

Comparing Hacking Incidents

  • RSA Security, Library of Congress and the Air Force were all hacked into

    • Hacked our of personal vendetta or mere vandal humor

    • Hacking is the equivalent to a random act of vandalism

      • Expensive to prevent and repair

      • These costs are passed onto the consumer or taxpayer


Internet terrorism is effective for protest retaliation and destruction but serves no cause l.jpg

Internet Terrorism is effective for protest, retaliation and destruction, but serves no cause

  • Hurts consumers in the long run

  • Hard to prevent

  • Will slow down with the advent of safer technology


  • Login