Sunday, April 15, 2012

Chapter 5: Crime HACTIVISM

Name Class time:

KEEP THIS TO 1-3 – PAGES LONG (excluding reference page)

Author:

Date of Publication:

Book:

Sections read:

1. (Knowledge)Tell three interesting elements of this chapter:

a.

b.

c.

2. (Comprehension) Summarize what is being discussed within this chapter?

This article is about computer hackers, or people who take other people property and how it affect the people who spend hours working and hacker just come and take it a way.

3. (Application)Name a specific example or NEW solution for this type of problem/similar situation in society or that you have experienced – be specific and explain?

Fourteen people were arrested Tuesday for allegedly mounting a cyberattack on the website of PayPal in retaliation for its suspending the accounts of WikiLeaks FBI agents executed more than 35 search warrants around the country in an ongoing investigation into coordinated cyberattacks against major companies and organizations. It's really hard to arrest 30,000 people with evidence that is rock solid "Maybe I would get arrested, but my neighbor was using my Wi-Fi and the authorities thought I was running the software, but it's really my neighbor or even someone driving by in their car." people always have an excuse so they can get way with things. Computers hackers are the most difficulty issue to resolve in world wind, because it could be anybody in the world trying to get into the system.

A new solution for this problem is to limit all Wi- fi access in the neighbor only people who have password should allowed to use the internet and if there is a problem they should be responsible for their action.

.

4. (Analysis)Address ANY that apply. How can you compare one of the situations in this chapter to something that does not relate to computers, technology, or the Internet? Be sure to reference the chapter and your solution. What ideas NEW can you add to the issue that is being presented within the reading? Try to connect what you have by reading this article and how it applies to the stages in Bloom's taxonomy in 2 full sentences.

Computers hackers Compare to Robbery, people have found an easy way to still money to other people. Is much easy to hackers into the system than showing up in person to still. Thief use to robbery a bank and get in the get away car , and the police would be able to track them if someone saw what kid car it was and their plate number of the car. In today world everything is done by electronic therefor there is no need to robbery a company in person when you can do it on the computer. the only solution for this kind problem is to make sure we keep safe our personal information and have a security for every site we use.

5. (Synthesis) Address all that apply. Do you agree with what is being said within the article (Why/Why not? Back up with FACTS)? What new conclusions can you draw about this (or other topics) after reading this material?

I agree with what is being said in this article, because people who are over the law should be taking in punishment for their actions. Hacking into someone banking or property is crime they don't have the right to break in people property, therefor they should be punish for what they done to people. illegal computer use should not to allowed in any ways, most of people in the United State are in dangerous of identity lost due to illegal activities that people are doing online. "The pursuit of cybercriminals is complicated by the fact that the Internet affords considerable anonymity to its users".

6. (Evaluation) Address all that apply. Judge whether or not this topic is relevant in today’s society? Evaluate why you are viewing the topic in this manner based on your experiences. What ethical evaluations (see Chap1-1.4 for exp of Ethics) or decisions were made/can be assumed from this chapter? What new ideas will you make after reading this chapter?

This topic is relevant in today society, because internet use has become physical to the world. The ethics chose is avoid them and save the personal information in privacy location. Many of people are losing their found because of computer hacking. Technology has increase the problems we are having in the world to day when technology was not around back in the days things were not as bad compare to today problems.



No comments:

Post a Comment