Hacktivism Securing the Electronic Frontier Consider How Essay

Total Length: 591 words ( 2 double-spaced pages)

Total Sources: 4

Page 1 of 2

Hacktivism

Securing the Electronic Frontier

Consider how cybercrime is defined and how it relates to the issue Internet vulnerabilities.

Cybercrime is any illegal or illicit activity which is mediated by internet usage and which is aimed at accessing, stealing or destroying online data. This may include hacking of government websites, phishing scams, disruption of commercial service sites or penetration of privately held databases containing personal information about private citizens. The presentation given by Hypponen (2011) at a recent TED conference helps to underscore the vulnerabilities to which the Internet exposes us, indicating that both our privacy and our financial security are at risk on the web. Cybercrime presents an ongoing challenge to database hosting services, commercial entities, political organizations and government agencies, all of which must find a balance between creating user-friendly, accessible web experiences and establishing fortified defenses against potential breaches of privacy, security or stability.

Stuck Writing Your "Hacktivism Securing the Electronic Frontier Consider How" Essay?



2. What are trespass, unauthorized access, and hacktivism? How does Lessig's framework apply?

Cybercrime comes in many forms, some financially motivated, some ideologically driven and others committed largely for the satisfaction of doing something subversive. Trespass involves gaining access to a computer or computer network that is otherwise restricted with the intent of dismantling, removing or stealing data. Unauthorized access is the penetration of administrative pages, databases or other sensitive data. Hacktivism is the politically motivated use of cybercrime to further certain ideological goals. As the third of these, the text by Goel (2011) indicates that "Sociopolitical groups (operating in- dependently or under tacit patronage from national governments) are anoth- er potent cyberthreat, with large social followings used for both propaganda and attacks." (Goel, p. 134)

The relevance of Lessig's framework is that it helps us to thing of the rules and parameters of web usage.....

Show More ⇣


     Open the full completed essay and source list


OR

     Order a one-of-a-kind custom essay on this topic


sample essay writing service

Cite This Resource:

Latest APA Format (6th edition)

Copy Reference
"Hacktivism Securing The Electronic Frontier Consider How" (2013, April 18) Retrieved May 2, 2024, from
https://www.aceyourpaper.com/essays/hacktivism-securing-electronic-frontier-89794

Latest MLA Format (8th edition)

Copy Reference
"Hacktivism Securing The Electronic Frontier Consider How" 18 April 2013. Web.2 May. 2024. <
https://www.aceyourpaper.com/essays/hacktivism-securing-electronic-frontier-89794>

Latest Chicago Format (16th edition)

Copy Reference
"Hacktivism Securing The Electronic Frontier Consider How", 18 April 2013, Accessed.2 May. 2024,
https://www.aceyourpaper.com/essays/hacktivism-securing-electronic-frontier-89794