Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
Brief note on plagiarism
Plagiarism is problematic
Plagiarism is problematic
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: Brief note on plagiarism
Dissecting the Hack: The Forb1dd3n Network raises the awareness that everyone, both corporate entities and private individuals, is susceptible to a hacking attack. The book is segmented in two parts. The first part contains an interesting work of fiction containing a fairly complex hacking plot. The story is told in the fashion of a Jason Bourne or James Bond plotline. There is mystery, murder, and an air of honesty that involves the reader from start to finish. Part two is the technical "how to" portion of the book that explains in great detail how all of the espionage in the preceding part one actually works. Part two is referred to as Security Threats Are Real (STAR). The book functions well as both a "how to" and as a good story. After enjoying both aspects of the book, one may wonder what others thought about it. Upon discovering a review posted on a personal blog, the McGrew Security website, a reader's opinion of the book may change. The author as a whole gives the narrative portion of the book a fairly positive review; however, the second section did not receive the same consideration (McGrew, 2009a). Apparently the author of the blog found more than a few items plagiarized directly from the Internet. Perhaps even more concerning was that many of the passages were taken directly from Wikipedia: a questionable source for documenting the "scholarly" section of the book (Wikipedia, 2013). For someone interested in learning about hacking and other ethical dilemmas, a question of integrity of the work obviously raises concerns. After doing research, one can find solutions to this problem. Upon discovering the blatant plagiarism that was rampant in the STAR section of the book, the publisher immediately pulled the book from th... ... middle of paper ... ...ty.com/2010/07/27/book-review-revised-edition-of-dissecting-the-hack-the-f0rb1dd3n-network/ Penn, J. (2013, June 13). Writers: 5 Tips on How to Identify Your Target Audience. Retrieved from http://www.thecreativepenn.com/2013/06/13/identify-your-target-audience/ RichM. [pseudonym] (2010, Oct. 1). Book Review: Dissecting the Hack: The F0rb1dd3n Network, Revised Edition. Retrieved from https://www.ethicalhacker.net/features/book-reviews/book-review-dissecting-the-hack-the-f0rb1dd3n-network-revised-edition Street, J., Nabors, K., Baskin, B. (2010). Dissecting the Hack: The Forb1dd3n Network. Burlington, MA: Syngress. Weiner-Bronner, D. (2013, Dec. 5). Facebook, Google, Twitter Users Among the Nearly 2 Million Accounts Hacked by Botnets. Retrieved from http://news.yahoo.com/facebook-google-twitter-users-among-nearly-2-million-124811240.html;_ylt=A2KJ3Ca5f6BStHIA5kXQtDMD
They started a petition on Change.org, and created a campaign on one star reviews on Amazon in attempts to prevent people from purchasing the book. In the beginning Scholastic, the book’s publisher, stood beside the author and illustrator of the book giving support and telling people that the book is not as bad as it seems. The School Library Journal then issued their review and criticism of the books claiming that
However, I feel users had a different vision/perspective on security mechanisms and they trusted each other during those times and did not have to worry about protecting their information (this is how exactly, one person’s ignorance becomes another’s person’s - hacker, here bliss). This book helps us to understand the vulnerabilities; its impacts and why it is important to address/ fix those holes.
Writing with Readings and Handbook. 3rd ed. New York: W.W. Norton & Company, Inc., 2013. 52-57. Print.
J. A. Reinking & R. von der Osten, R. (2007). Strategies for successful writing: A rhetoric, research guide, reader, and handbook (8th ed.). Upper Saddle River, NJ: Pearson Prentiss Hall. ISBN: 0-13-189195-2.
When you think of the internet, usually what first comes to mind is social networking, online marketplaces, and other places that don’t sound that bad. Look deeper and you’ll find that the internet isn’t as nice as you thought it was. This “dark side” of the net is comprised of everything looked down upon in the real world – drugs, weapons, false identities, and even hit men for hire exist in this rough-and-tumble darknet. Not just physical products, but virtual products float around as well; from term papers to file sharing and even e-currency populate this dark area.
The Hacker Crackdown: Law and Disorder on the Electronic Frontier by Bruce Sterling is a book that focuses on the events that occurred on and led up to the AT&T long-distance telephone switching system crashing on January 15, 1990. Not only was this event rare and unheard of it took place in a time when few people knew what was exactly going on and how to fix the problem. There were a lot of controversies about the events that led up to this event and the events that followed because not only did it happen on Martin Luther King Day, but few knew what the situation truly entailed. There was fear, skepticism, disbelief and worry surrounding the people that were involved and all of the issues that it incorporated. After these events took place the police began to crackdown on the law enforcement on hackers and other computer based law breakers. The story of the Hacker Crackdown is technological, sub cultural, criminal, and legal. There were many raids that took place and it became a symbolic debate between fighting serious computer crime and protecting the civil liberties of those involved.
The documentary discusses different types of hackers; teenagers hacking as a prank and professionals hacking to disrupt nuclear advancement in Iran. This is in some ways related to the macro-level theory of train theory concerning subcultures in gangs (Choi, Week 3). This theory was the differential opportunity theory, which described how gangs met their goals through legitimate or illegitimate means (Choi, Week 3). The teenage hackers would be classified more in the criminal gangs scoring range as they were able to meet their goal of pranking their victim through illegitimate means. In the case of the nuclear facility incident in Iran with stuxnet, these types of hackers could be viewed as violent gang members. While the methods used would traditionally be considered illegal, due to the fact that the virus seemed to be sanctioned by some country, the means may have been
There are three areas of cyber conflict that hackers choose to think are the ethical issues, but are the most problematic.
The use of hacking to identify weaknesses in computer security has become an increasingly controversial issue in recent years. Awareness of this issue is important, because our ever increasing reliance on technology means that breaches in computer security have the potential to have wide-ranging and devastating consequences to society, worldwide. This essay will begin by clearly defining the term ‘hacking’ and will examine the type of people who hack and for what reasons. There will then follow a discussion of the moral argument on hacking before examining a few brief examples. The essay will then conclude by arguing against the use of hacking as a means of identifying weaknesses in computer security.
The 20 Enemies of the Internet. 1999. Radio Free Europe / Radio Liberty. Feb 20, 2001. <http://www.rferl.org/nca/special/enemies.html>.
Whitman, M., & Mattord, H. (2011). Reading & cases in information security: law & ethics. (2011 custom ed., p. 264). Boston, MA: Cengage Learning.
Literature: An Introduction to Reading and Writing. Ed. Edgar V. Roberts. 4th AP ed. New Jersey: Pearson, 2008. 528-35. Print.
Harvey, Brian. A. Computer Hacking and Ethics. Ed. Paul Goodman, P.G., a.k.a. Electrical Engineering and Computer Science.
My strong curiosity towards the field of Cybersecurity dates back to my pre-university days when I started reading sci-fi novels. Digital Fortress, a techno-thriller novel written by Dan Brown, explored the theme of government surveillance, security and civil liberties. This theme is brought out in the book by portraying cryptographic techniques, security policies and implications of these policies. This gravitated me towards the field of security. With little programming experience, I was eager to begin my nascent adventure in the field of Cybersecurity. Although I’ve gained exposure in the field of security during the course of my Bachelor’s degree, I believe pursuing a master’s degree in Cybersecurity will allow me to explore the field of security in greater depth and utilize it effectively to address more real-world challenges.
The internet offers high speed connectivity between countries, which allows criminals to commit cybercrimes from anywhere in the world. Due to the demand for the internet to be fast, networks are designed for maximum speed, rather than to be secure or track users (“Interpol” par. 1). This lack of security enables hacker...