Verified Document

Hacktivism Securing The Electronic Frontier Consider How Essay

Hacktivism Securing the Electronic Frontier

Consider how cybercrime is defined and how it relates to the issue Internet vulnerabilities.

Cybercrime is any illegal or illicit activity which is mediated by internet usage and which is aimed at accessing, stealing or destroying online data. This may include hacking of government websites, phishing scams, disruption of commercial service sites or penetration of privately held databases containing personal information about private citizens. The presentation given by Hypponen (2011) at a recent TED conference helps to underscore the vulnerabilities to which the Internet exposes us, indicating that both our privacy and our financial security are at risk on the web. Cybercrime presents an ongoing challenge to database hosting services, commercial entities, political organizations and government agencies, all of which must find a balance between creating user-friendly, accessible web experiences and establishing fortified defenses against potential breaches of privacy, security or stability.

Parts of this document are hidden

View Full Document
svg-one

What are trespass, unauthorized access, and hacktivism? How does Lessig's framework apply?
Cybercrime comes in many forms, some financially motivated, some ideologically driven and others committed largely for the satisfaction of doing something subversive. Trespass involves gaining access to a computer or computer network that is otherwise restricted with the intent of dismantling, removing or stealing data. Unauthorized access is the penetration of administrative pages, databases or other sensitive data. Hacktivism is the politically motivated use of cybercrime to further certain ideological goals. As the third of these, the text by Goel (2011) indicates that "Sociopolitical groups (operating in- dependently or under tacit patronage from national governments) are anoth- er potent cyberthreat, with large social followings used for both propaganda and attacks." (Goel, p. 134)

The relevance of Lessig's framework is that it helps us to thing of the rules and parameters of web usage and vulnerability in completely objective terms. According to…

Sources used in this document:
Works Cited:

Goel, S. (2011). Cyberwarfare: Connecting the Dots in Cyber Intelligence. Communications of the ACM, 54(8).

Hypponen, M. (2011). Three types of online attack. TED.com. Retrieved on June 16, 2012 at http://www.ted.com/talks/mikko_hypponen_three_types_of_online_attack.html

Spinello, R.A. (2004). Reading in Cyber ethics (2nd ed.). (4th ed.). Sudbury, MA: Jones and Bartlett Learning. Chapter 5

Spinello, R.A. (2011).Cyberethics - Morality and Law in Cyberspace (4th ed.). (4th Ed.). Sudbury, MA: Jones and Bartlett Learning. Chapter 6
Cite this Document:
Copy Bibliography Citation

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now