This document contains 10 questions about hacking, hacktivism, and computer crimes. It asks the reader to define key terms, discuss why hacking is a threat and how to deal with it, analyze the politics of hacktivism and whether hacking is under control. It also prompts discussion around effective legislation to prevent hacking, types of hacker crimes, sources of computer crimes, low crime reporting rates, and ways to address insider abuse.
This document contains 10 questions about hacking, hacktivism, and computer crimes. It asks the reader to define key terms, discuss why hacking is a threat and how to deal with it, analyze the politics of hacktivism and whether hacking is under control. It also prompts discussion around effective legislation to prevent hacking, types of hacker crimes, sources of computer crimes, low crime reporting rates, and ways to address insider abuse.
This document contains 10 questions about hacking, hacktivism, and computer crimes. It asks the reader to define key terms, discuss why hacking is a threat and how to deal with it, analyze the politics of hacktivism and whether hacking is under control. It also prompts discussion around effective legislation to prevent hacking, types of hacker crimes, sources of computer crimes, low crime reporting rates, and ways to address insider abuse.
(i) Hacker (ii) Hacktivist (iii) Cracker 2. Why is hacking a big threat to system security? 3. What is the best way to deal with hacking? 4. Discuss the politics of dealing with hacktivism. 5. Following the history of hacking, can you say that hacking is getting under control? Why or why not? 6. What kind of legislation can be effective to prevent hacking? 7. List and discuss the types of hacker crimes. 8. Discuss the major sources of computer crimes. 9. Why is crime reporting so low in major industries? 10. Insider abuse is a major crime category. Discuss ways to solve it.