Hacktivism - iup.edu

Hacktivism - iup.edu

Hacktivism Lauren Tanking COSC 101-007 Presentation Overview This presentation will show: What is hacktivism and activism The difference between a hacker and a hacktivist The causes of hacktivism What risks hacktivism Some famous examples of Hacktivism What is Hacktivism?

The act of hacking, or breaking into a computer system, for a politically or socially motivated purpose. It is the fusion of hacking and activism. Example of Hacktivism: Chinese-American Plane Collision in 2001. They were both hacktivists. What is Activism? The term activism is defined as a policy of taking direct and militant action to achieve a political or social goal. Therefore, hacktivism and activism go hand in hand.

Hacker vs. Hacktivist A hacker is a person who accesses a computer system by destroying its security system A hacktivist is a person who hacks a computer system to bring attention to a political and social cause

A hacktivist uses the same tools and techniques as a hacker, except that profit and data theft are not important to hacktivists; they would rather embarrass others by defacing a website. Defacing is a common technique for a hacktivist. Causes of Hacktivism A hacktivists top priority is to embarrass the government. A person who supports hacktivism mostly wants the power

of politics. Unlike hacking, hacktivism is not motivated by money and high visibility. However, hacktivists are in it for the revenge, politics, ideology, protest and a desire to humiliate victims. Some see hacktivism as a necessary tool against oppression, while others see it as nothing more than cyber-terrorism.

The Risks of Hacktivism It is another wakeup call to remind us that not maintaining a good balance between security and freedom for your employees can in itself be a risk. A risk for the hacktivist is that they could go jail if they would get caught. World Famous Incidents of Hacktivism

These incidents are all examples of hacktivists all over the world: 1989- NASA and the WANKWORM 1999- The Hong Kong Blondes 2000- Human Rights Violation 2010- Anonymous and Operation Payback Conclusion Hacktivism is the act of hacking, or breaking into a computer system, for a politically or socially motivated purpose. It is the acts of hacking and

activism combined. A hacktivists top priority is to steal and leak any classified government information. They want the top power of politics. All they want is revenge. A good balance and connection is needed between security and freedom for your employees. Bibliography

"Hacking Motivations Hacktivism." GFI - Web, Email and Network Security Solutions for SMBs on Premise and Hosted. Emmanuel Carabott, 04 Aug. 2011. Web. 04 Dec. 2011. . "Hacktivism." Imperva. 2011. Web. . "World Famous Incidents Of HACKTIVISM." CRASHDEX. WoodSpoon SDC, 10 Dec. 2010. Web. 05 Dec. 2011.

world-famous-incidents-of-hacktivism/>. "What Is Hacktivism? - Definition from Whatis.com." Information Security Information, News and Tips - SearchSecurity.com. TechTarget, May 2001. Web. 07 Dec. 2011. .

Recently Viewed Presentations

  • PowerPoint 簡報 - ShareCourse 學聯網

    PowerPoint 簡報 - ShareCourse 學聯網

    Primary Key & Foregin Key . Primary . Key : 該欄位不得為空. 值且. 為. 唯一。 Foregin. Key : 該欄位的值需參考. 其他表格中的. 欄位,當被參考表格中不存在該值時便不可輸入該筆
  • Lexington Medical Society Physician Wellness Program Decision Brief

    Lexington Medical Society Physician Wellness Program Decision Brief

    LMS Physician Wellness Program Decision Brief, Sept. 1, 2015. Six PhDs and One M.S. Based in Lexington, can later do a Louisville option through them . Located in private setting. Charge $130 per visit. Members call their office line directly...
  • Transcendentalism - Elida High School

    Transcendentalism - Elida High School

    Characteristics of Transcendentalism Everything in the world, including human beings, is a reflection of the Divine Soul. The physical facts of the natural world are a doorway to the spiritual or ideal world. People can use their intuition to behold...
  • Diapositive 1

    Diapositive 1

    Arial Lucida Grande Calibri MS Pゴシック Trebuchet MS Times New Roman Sylfaen Symbol Wingdings 3 Thème Office 2006_trudeau Image Diapositive 1 Diapositive 2 Diapositive 3 Diapositive 4 Diapositive 5 Diapositive 6 Diapositive 7 Diapositive 8 Diapositive 9 Diapositive 10 Diapositive...
  • Organic Chemistry Fifth Edition - Instructor Pages

    Organic Chemistry Fifth Edition - Instructor Pages

    RCNH2 O Amides Having an NH2 Group CH3CNH2 O Acetamide 3-Methylbutanamide O (CH3)2CHCH2CNH2 CNH2 O Benzamide Amides Having Substituents on N Name the amide as before. Precede the name of the amide with the name of the appropriate group or...
  • Home and School Association (HSA) - Good Shepherd

    Home and School Association (HSA) - Good Shepherd

    Staff booths in the Family Center. Set up and take down of booths in Family Center . Guide new parents and students around campus. Volunteer in GSCS Bookstore
  • Mental Health Housing Related Support October 2019 Context

    Mental Health Housing Related Support October 2019 Context

    CCG Area. Number of accommodation units. Dartford, Gravesham & Swanley ... South Kent Coast. 27. Canterbury & Coastal. 15. Ashford . 10. West Kent. 99. What we know. Differing eligibility requirements and referral processes. Range of needs from quite complex...
  • Lesson 11-1 - marshall.k12.mn.us

    Lesson 11-1 - marshall.k12.mn.us

    LESSON 11-1. POSTING FROM A PURCHASES JOURNAL TO AN ACCOUNTS PAYABLE LEDGER. page 301. 1. Write the date. 2. Write the journal page number. 3. Write the credit amount.