community paper presentation 3
Download
Skip this Video
Download Presentation
Community Paper Presentation #3

Loading in 2 Seconds...

play fullscreen
1 / 7

Community Paper Presentation 3 - PowerPoint PPT Presentation


  • 282 Views
  • Uploaded on

Community Paper Presentation #3. Leann Daddario & Chris . Community Question. Are computer hacks legitimate political activities?

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'Community Paper Presentation 3' - Melvin


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
community paper presentation 3

Community Paper Presentation #3

Leann Daddario & Chris

community question
Community Question
  • Are computer hacks legitimate political activities?
  • Is it a good way to express dislike or anger over the actions of a politician or government agency, or is it just garden variety vandalism, the equivalent of spray painting something on the wall of a public building?
  • Is it civil disobedience to take down a site and is it effective?
it attacks cost corporations and governments cost millions of dollars
IT attacks cost corporations and governments cost millions of dollars.
  • Terrorists are attacking under the name of:
    • politics
    • religion
    • Anti corporate beliefs
the internet is used for business
The Internet is used for business
  • Cyber-terrorism only serves to increase public skepticism and caution no matter what the alleged reasoning of the terrorist may be.
    • Vital information is being shared
      • Social security numbers
      • Credit card numbers
      • Home addresses
      • Bank account numbers
hacking can be seen as a relatively safe method of terrorism
Hacking can be seen as a relatively safe method of terrorism
  • Air Tran/ValuJet hacking example
    • Air Tran lost millions because of the crash
    • Hacking the website further debilitated reconstruction
    • Cyber terrorism is harmful but preferable to physical attacks
comparing hacking incidents
Comparing Hacking Incidents
  • RSA Security, Library of Congress and the Air Force were all hacked into
    • Hacked our of personal vendetta or mere vandal humor
    • Hacking is the equivalent to a random act of vandalism
      • Expensive to prevent and repair
      • These costs are passed onto the consumer or taxpayer
internet terrorism is effective for protest retaliation and destruction but serves no cause
Internet Terrorism is effective for protest, retaliation and destruction, but serves no cause
  • Hurts consumers in the long run
  • Hard to prevent
  • Will slow down with the advent of safer technology
ad