Premium Essay

Nt1330 Case 5.1

Submitted By
Words 458
Pages 2
1) In Section 5.2.2, we described the incident in which a hacker group hacked into the Bay Area Rapid Transit (BART) system to protest BART’s shut down of wireless communication in some BART stations. Was this a form of hacktivism? Was it ethical? Give reasons.
The term hacking has a number of different definitions, and may have positive or negative depending on the situation and people affected or not. A group hacked into the Bay Area Rapid Transit (BART) system and released emails, passwords, and personal information about a few thousand BART customers. It was done to protest BART's controversial shutdown of wireless communication in several BART stations to thwart a planned protest demonstration. People who agree with the political or social position of the hackers will tend to see an act as "activism," while those who disagree will tend to see it as ordinary crime. …show more content…
(See Section 5.2.6.) Would you support such a law? Why?
I would support a law making the writing and publication of a computer virus a crime. The increase use of computers in this information age, especially in critical infrastructures, a law will help slow down cyber – crime. Computer viruses can be perpetrated instantaneously and its effects can spread with incredible quickness.

3.) In Section 5.3.2, we gave an analogy between merchants accepting some amount of shoplifting, on the one hand, and merchants and credit card companies accepting some amount of credit card fraud, on the other hand. Identify strength and a weakness of this analogy.
Strength
• Merchant and CC companies benefit by customers returning to

Similar Documents

Premium Essay

Test

...Windows environment. Windows Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program:    IS4799 NT2799 IS4670 ISC Capstone Project Capstone ProjectCybercrime Forensics NSA    NT2580 NT2670  Introduction to  Information Security IS4680 IS4560 NT2580 NT2670 Email and Web Services Hacking and Introduction to  Security Auditing for Compliance Countermeasures Information Security Email and Web Services      NT1230 NT1330 Client-Server Client-Server  Networking I Networking II  IS3230 IS3350 NT1230 NT1330  Issues Client-Server Client-Server  SecurityContext in Legal Access Security Networking I Networking II   NT1110  NT1210 Structure and Introduction to  ComputerLogic Networking    IS3120 IS3110 NT1210 Network  Risk Management in Introduction to General Education / General Studies NT2580 NT2799 Communications Information Technology Introduction to Information Security NSANetworking Capstone Project IS4550 NT2640 Security Policies and Implementation IP NT2640 Networking IP Networking PT2520...

Words: 2305 - Pages: 10