SOC 3750 Lecture Notes - Lecture 9: Innocent Victims, Suicide Of Amanda Todd, Iceberg

32 views7 pages

Document Summary

Hackers individuals with an interest in technology who use their knowledge to access computers and devices with or without authorization from the owner. Hacking is deviant, but not always malicious: testing security of hardware and software, the challenge is valued, some share their knowledge to improve design and security. Malicious activity: development and distribution of malware. Most didn"t want to cause damage challenge and sense of power that mattered: others sought to exploit vulnerabilities. Anxiety over youth and computer technology facilitated a hacker archetype: pathologically addiction to computers, lonely, socially inept, yet, they had an unbounded, magical power over computers. Late 1980s, us business demanded legal action computer security industry emerged with warnings: hackers constructed as a criminal threat. 1990s emergence of the internet, e-commerce, and vast global networks: hacking community grew increasingly global, criminal minority capitalized on proliferation of targets. Estimated cost of cybercrime to global economy in 2013 - billion to trillion.

Get access

Grade+
$40 USD/m
Billed monthly
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
10 Verified Answers
Class+
$30 USD/m
Billed monthly
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
7 Verified Answers

Related Documents