Verified Document

Hacktivism Securing The Electronic Frontier Consider How Essay

Hacktivism Securing the Electronic Frontier

Consider how cybercrime is defined and how it relates to the issue Internet vulnerabilities.

Cybercrime is any illegal or illicit activity which is mediated by internet usage and which is aimed at accessing, stealing or destroying online data. This may include hacking of government websites, phishing scams, disruption of commercial service sites or penetration of privately held databases containing personal information about private citizens. The presentation given by Hypponen (2011) at a recent TED conference helps to underscore the vulnerabilities to which the Internet exposes us, indicating that both our privacy and our financial security are at risk on the web. Cybercrime presents an ongoing challenge to database hosting services, commercial entities, political organizations and government agencies, all of which must find a balance between creating user-friendly, accessible web experiences and establishing fortified defenses against potential breaches of privacy, security or stability.

What are trespass, unauthorized access, and hacktivism? How does Lessig's framework apply?
Cybercrime comes in many forms, some financially motivated, some ideologically driven and others committed largely for the satisfaction of doing something subversive. Trespass involves gaining access to a computer or computer network that is otherwise restricted with the intent of dismantling, removing or stealing data. Unauthorized access is the penetration of administrative pages, databases or other sensitive data. Hacktivism is the politically motivated use of cybercrime to further certain ideological goals. As the third of these, the text by Goel (2011) indicates that "Sociopolitical groups (operating in- dependently or under tacit patronage from national governments) are anoth- er potent cyberthreat, with large social followings used for both propaganda and attacks." (Goel, p. 134)

The relevance of Lessig's framework is that it helps us to thing of the rules and parameters of web usage and vulnerability in completely objective terms. According to…

Sources used in this document:
Works Cited:

Goel, S. (2011). Cyberwarfare: Connecting the Dots in Cyber Intelligence. Communications of the ACM, 54(8).

Hypponen, M. (2011). Three types of online attack. TED.com. Retrieved on June 16, 2012 at http://www.ted.com/talks/mikko_hypponen_three_types_of_online_attack.html

Spinello, R.A. (2004). Reading in Cyber ethics (2nd ed.). (4th ed.). Sudbury, MA: Jones and Bartlett Learning. Chapter 5

Spinello, R.A. (2011).Cyberethics - Morality and Law in Cyberspace (4th ed.). (4th Ed.). Sudbury, MA: Jones and Bartlett Learning. Chapter 6
Cite this Document:
Copy Bibliography Citation

Related Documents

Securing the Electronic Frontier P.
Words: 1009 Length: 3 Document Type: Research Paper

Part 2 - Reflective Diary The security of customer's data is very critical in the contemporary business environment because of the increase in the data breach that could make organizations to face bad publicity within and outside the United States. Essentially, organizations are required to secure employees' and customers' data to enhance Pretty Good Privacy (PGP) within the IT environment. One of the strategies to enhance customers' privacy is to implement

Securing the Electronic Transfer Securing
Words: 976 Length: 3 Document Type: Research Paper

Essentially, securing the electronic frontier is very critical because of the potential harms that cyber crime and fraud cause to individual, businesses and nations as a whole. One of the effective strategies that could be employed to secure the electronic frontier is the collaboration of the government with the private and public organizations. Increasing number of governments has implemented method to secure the electronic frontier without success. Since corporate organizations

Computer Hacker Nefarious Notions III
Words: 9646 Length: 35 Document Type: Term Paper

(Hackers Chronology, 2006). 1989 The first case of cyber espionage is recognized in Germany (west). This reportedly involved the CHAOS computer club. "Mentor releases the hacker manifesto Conscience of a hacker, which ends with the intriguing line: 'You may stop the individual, but you can't stop us all.'" (Hackers Chronology, 2006). 1990 Electronic Frontier, Freedom on the Internet advocacy group, is launched Polymorphic viruses (which modifies themselves when they spread), along with other sophisticated kinds of

Released by the FBI and
Words: 17274 Length: 65 Document Type: Research Proposal

" Human development- behavioral shifts in human being that tae place during the course of an entire lifespan ("Human Behavior"). Risk Analysis- the activity of determining and analyzing the dangerous natural and human caused negative events. This analysis takes into consideration the risks these event pose to businesses individuals and governments. Within the domain of information technology risk analysis reports are utilized to tailor technology-related objectives with a an organization's business objectives.

Internet Security Measures an Assessment
Words: 3999 Length: 10 Document Type: Term Paper

Internet Security Measures- An Assessment The world of the Internet is truly an amazing and wonderful place where any information on any topic is available, right at your fingertips, with the mere click of a button. The Internet is very much like a huge city where high rises filled with honest people and slums filled with the lower classes coexist side by side; where there are both good people as well

Study the Potential of Moving Bahrain Ministries It Services Into...
Words: 3512 Length: 10 Document Type: Research Proposal

Bahrain Ministries IT Service Studying the Potential of Moving Bahrain Ministries IT Services Into Private Cloud Computing Information technology (IT) is not only an important part of life for many people, but it is also a booming business (Amies, et al., 2012). One of the most significant steps IT has made in recent years is the advent of cloud computing. This is similar to the old style of storing information, where everything

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now