рефераты
рефераты рефераты
 логин:   
 пароль:  Регистрация 

МЕНЮ
   Архитектура
География
Геодезия
Геология
Геополитика
Государство и право
Гражданское право и процесс
Делопроизводство
Детали машин
Дистанционное образование
Другое
Жилищное право
Журналистика
Компьютерные сети
Конституционное право зарубежныйх стран
Конституционное право России
Краткое содержание произведений
Криминалистика и криминология
Культурология
Литература языковедение
Маркетинг реклама и торговля
Математика
Медицина
Международные отношения и мировая экономика
Менеджмент и трудовые отношения
Музыка
Налоги
Начертательная геометрия
Оккультизм и уфология
Педагогика
Полиграфия
Политология
Право
Предпринимательство
Программирование и комп-ры
Психология - рефераты
Религия - рефераты
Социология - рефераты
Физика - рефераты
Философия - рефераты
Финансы деньги и налоги
Химия
Экология и охрана природы
Экономика и экономическая теория
Экономико-математическое моделирование
Этика и эстетика
Эргономика
Юриспруденция
Языковедение
Литература
Литература зарубежная
Литература русская
Юридпсихология
Историческая личность
Иностранные языки
Эргономика
Языковедение
Реклама
Цифровые устройства
История
Компьютерные науки
Управленческие науки
Психология педагогика
Промышленность производство
Краеведение и этнография
Религия и мифология
Сексология
Информатика программирование
Биология
Физкультура и спорт
Английский язык
Математика
Безопасность жизнедеятельности
Банковское дело
Биржевое дело
Бухгалтерский учет и аудит
Валютные отношения
Ветеринария
Делопроизводство
Кредитование



Главная > Другое > Cyberterrorism

Другое : Cyberterrorism

Cyberterrorism

Computer crimes -> cyberterrorism, hacking


Defined broadly, the term "computer crime" could reasonably include a wide variety of criminal offenses, activities, or issues. The potential scope is even larger when using the frequent companion or substitute term "computer-related crime." Given the pervasiveness of computers in everyday life, even in the lives of those who have never operated a computer, there is almost always some nontrivial nexus between crime and computers.

By the FBI's definition, cyberterrorism is well beyond the scope of this paper. With increasing frequency this term is being used by the mass media. Absent any evidence of activity, we'll leave it in the "eye of the beholder" to determine whether cyberterrorism is currently being deterred, is a phantom menace…or somewhere in between.

A key distinction between electronic civil disobedience and politicized hacking is anonymity. The motive for remaining secret is simple: the majority of politically motivated hacks are clearly illegal. Most institutions recognize that breaking into an opponent's computer and adding, changing or deleting (HTML) code, even if it is juvenile graffiti, violates some other’s rights. Attitudes and opinions begin to diverge markedly around this point however. One person’s activist is another’s terrorist.

"A lot of groups are claiming that they're hacking into sites for a higher moral purpose, but they're hiding beyond anonymity or pseudonymity. Taking responsibility is not something we see happening."

At the heart of this discussion is the question of motive. Opinions differ just as much within the hacker community as outside over the efficacy of certain actions. The spate of (zombie) DDoS attacks against prominent e-commerce sites that occurred in February 2000 sparked a debate between two prominent hacker collectives. The Electrohippies Collective claims the Internet as a public space liable to be used by groups and individuals as a means of protest. As activists, they admit no practical difference between how cyberspace and the street are used by society.

Recent actions on the Internet against e-commerce sites represent a fundamental disagreement about the purposes of the Internet, and the increasing emphasis on the use of the ‘Net as a vehicle for profitable trade rather than of knowledge and discussion.

The cDc, says, the targeted sites were selected for their name recognition and prestige value, not for their commercial attributes or activities.

You may make yourself feel good and get a lot of attention, but when you crack a Web site, you are violating another person's rights. …what does that mean? CRIME!





Информационная Библиотека
для Вас!



 

 Поиск по порталу:
 

© ИНФОРМАЦИОННАЯ БИБЛИОТЕКА 2010 г.