SOCI-224 Lecture Notes - Lecture 18: Dark Web, Child Pornography, Exhibitionism
Document Summary
From hacking to illegal downloads that are copyrighted. Is used to gain information or cause problems for the system. Distributed denial (designs a trojan that moves into computers and a certain time/date that fires a request to act; all computers overloads the server at once and forces it to shut down). Luring: aimed at children to use social media chat rooms and set up meetings with children, mainly for sexual purposes. Stalking: emails, texts, behaviors that cause fear or annoyance. Commonly occurs in a breakup of a relationship. Legitimate organizations that have to get permission from every person on their email list to send them emails are affected by this. If the illegal spammers get caught then they are charged but they don"t follow the legislation. They ask for your bank account information so that they can transfer" the money.