CCJ 4934 Lecture Notes - Lecture 8: Child Pornography, Cyber Intelligence Sharing And Protection Act, Unique User

16 views4 pages

Document Summary

Increased awareness of cybercrime; office training on shredding documents, what can and cannot be emailed. Data is stored on plastic- like id cards, bus passes, atm cards. Difficult to study- movement away from social engineering, or social engineering in a tech form. Allowed elite hackers to connect and exchange info: most systems are built on similar programming languages. Most info was not only exchanged but also read by gen pop: allowed knowledge on attacking or circumventing systems to be shared o. Proliferation of hacker subculture values: all hackers interested in potential strengths/weaknesses of a system or programming language regardless of malicious intent. Ip address cannot be tied to any one individual. Consider what is installed on your computer. Impression management: when we interact with people, if real name is attached or actions are tied to us, we behave differently; try to manage the impressions of others. o o o. Individuals attempt to influence perceptions of other people or themselves.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers