CCJ 4934 Lecture Notes - Lecture 8: Child Pornography, Cyber Intelligence Sharing And Protection Act, Unique User
Document Summary
Increased awareness of cybercrime; office training on shredding documents, what can and cannot be emailed. Data is stored on plastic- like id cards, bus passes, atm cards. Difficult to study- movement away from social engineering, or social engineering in a tech form. Allowed elite hackers to connect and exchange info: most systems are built on similar programming languages. Most info was not only exchanged but also read by gen pop: allowed knowledge on attacking or circumventing systems to be shared o. Proliferation of hacker subculture values: all hackers interested in potential strengths/weaknesses of a system or programming language regardless of malicious intent. Ip address cannot be tied to any one individual. Consider what is installed on your computer. Impression management: when we interact with people, if real name is attached or actions are tied to us, we behave differently; try to manage the impressions of others. o o o. Individuals attempt to influence perceptions of other people or themselves.