2014. Web. 16 Apr. 2014. Giacomazzo, Bernadette R. “OpenSSL Heartbleed Computer Virus Fix and Security: How to Protect Yourself from the Latest Internet Bug”.
With computers on the rise, and the government converting to computers, the government needed a way to discourage and prosecute someone that damaged or gained access to the government’s information, and any other kind of computer. This law was also made to protect any kind of businesses computers or servers. The CFAA also is considered a net that Congress throws all the bad fish in. Including “fraud, hacking, piracy, DOS (Denial of Service) attacks, trafficking passwords, (selling, stealing, and buying passwords), and distributing malicious code.” To summarize the Computer Fraud and Abuse Act it protects “anything that connects to the internet”. Computers were on the rise (being used more often), and so were computer crimes.
The gray hats are hackers that find security vulnerabilities and post them on the internet, forcing system administrators to patch up the holes. Usually, they inform the vendor ahead of time. Then, if they deem the company is not taking them seriously, and malicious hackers will exploit the threat, they post it on a forum. Though acting in good faith, the ethics of full disclosure of security holes are in debate, including: how full disclosure can cause more harm then good, how long vendors should be allowed to fix the problem, and liabilities for posting on the internet. Issue 1: Full disclosure of security-related information can inflict more damage than good.
Blogs. Retrieved April 21, 2014, from https://blog.torproject.org/blog/openssl-bug-cve-2014-0160 17. Hern, A. (2014, April 17). Tor may be forced to cut back capacity after Heartbleed bug.
There are numerous threats that hacking brings to our world today. Despite this appalling fact, there are measures we can take to prevent it. Electronic hacking can be a deadly in many ways, but there are ways to prevent being affected. To begin with, on of the most common forms of hacking is done in a network that connects us all: the Internet. Through the Internet, social networks such as Facebook and Twitter have been hacked.
(1. Burgess, 2013) With all this data being sent across the network, what people do not know is that there data they post, view and upload online is being collected by organizations and governments or even hackers, and is being shared between them for their own use. Governments are monitoring our every movement online, organizations are selling our data for millions to other third party organizations/government and hackers are pretending to be someone else. 25 years ago a London-born computer scientist Sir Tim Berners-Lee invented the World Wide Web, and has called for a bill of rights to protect freedom of speech on the internet and users rights after Edward Snowden leaked information about the government surveillance of online activity last year. (2.
TechRepublic. Retrieved July 16, 2014, from http://www.techrepublic.com/blog/it-security/what-makes-cybercrime-laws-so difficult-to-enforce/
These emails are sent with the intent to obtain usernames, passwords and possibly even credit card details when the individuals click the website link. Issues with cyber security are becoming more and more common as individuals who Works Cited Malware. (n.d.). Retrieved April 21, 2014, from http://en.wikipedia.org/wiki/Malware#Infectious_malware:_viruses_and_worms Spam (electronic). (n.d.).
Often times, vi... ... middle of paper ... ...n. While many people don’t realize it, there is always risk when you use the internet. You must be able to know how to defend yourself against these attacks or you risk losing it all. References Denholm, Martin. "The Number One Threat to America's National Security." Tech Innovation Daily.
Ethics, Espionage, and Covert Action. Retrieved from Journal of Conflict Studies website: http://www.scu.edu/ethics/publications/submitted/Perry/repugnant.html#nine Roberts, D., & Ackerman, S. (2013, June 6). Anger swells after NSA phone records court order revelations | World news | The Guardian. Retrieved May 15, 2014, from http://www.theguardian.com/world/2013/jun/06/obama-administration-nsa-verizon-records