1 / 7

Community Paper Presentation #3

Community Paper Presentation #3. Leann Daddario & Chris . Community Question. Are computer hacks legitimate political activities?

Melvin
Download Presentation

Community Paper Presentation #3

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Community Paper Presentation #3 Leann Daddario & Chris

  2. Community Question • Are computer hacks legitimate political activities? • Is it a good way to express dislike or anger over the actions of a politician or government agency, or is it just garden variety vandalism, the equivalent of spray painting something on the wall of a public building? • Is it civil disobedience to take down a site and is it effective?

  3. IT attacks cost corporations and governments cost millions of dollars. • Terrorists are attacking under the name of: • politics • religion • Anti corporate beliefs

  4. The Internet is used for business • Cyber-terrorism only serves to increase public skepticism and caution no matter what the alleged reasoning of the terrorist may be. • Vital information is being shared • Social security numbers • Credit card numbers • Home addresses • Bank account numbers

  5. Hacking can be seen as a relatively safe method of terrorism • Air Tran/ValuJet hacking example • Air Tran lost millions because of the crash • Hacking the website further debilitated reconstruction • Cyber terrorism is harmful but preferable to physical attacks

  6. Comparing Hacking Incidents • RSA Security, Library of Congress and the Air Force were all hacked into • Hacked our of personal vendetta or mere vandal humor • Hacking is the equivalent to a random act of vandalism • Expensive to prevent and repair • These costs are passed onto the consumer or taxpayer

  7. Internet Terrorism is effective for protest, retaliation and destruction, but serves no cause • Hurts consumers in the long run • Hard to prevent • Will slow down with the advent of safer technology

More Related