IU315
Questions:
1. (2 points) Can a meaningful distinction be drawn between hacking and "cracking"?
Hacking is activity by one who believes information sharing is a powerful positive good and it also is one who is programmed enthusiastically. Cracking is activity by someone who breaks security on a system. Crakers engage in vandalism, and theft once given access to a computer.
2. (1 point) What is meant by "active defense hacking" or "counter hacking"?
It is meant that hackers can use the computers of innocent persons as host computers to initiate their attacks. It is known as an act of “two wrongs making a right”.
3. (1 point) What, exactly, is cybercrime?
It is defined as a generic term covering a multiplicity of crimes found in penal code or in legistration having the use of computer technology as its central component.
4. (3 points) Identify and briefly describe the three categories of "genuine cybercrime" that was examined.
The first category is cyber privacy which is using cyber technology in unauthorized ways to reproduce copies of proprietary software or distribute proprietary information across a computer network. The next category is cyber trespass which is using cyber technology to gain or exceed unauthorized access to an individuals or organization computer system, or password-protected web site. The last category is cyber vandalism which is using cyber technology to unleash one or more programs that disrupt the transmission of electronic info across one or more computer networks, including the internet, also to destroy data resident in a computer or damage a computers resources.
5. (2 points) How might we distinguish between cyber-related crimes that are "cyber-exacerbated" and those that are "cyber-assisted"?
Cyber exacerbated is cyber stalking, internet pedophilia, or internet pornography. Cyber assisted online tax fraud, or physical assault with a computer. It also is a property damage using a computer hardware.
6. (1