Briefly describe hactivists from an information security point of view.

What will be an ideal response?


Hactivists are motivated by ideology. Unlike cyberterrorists, who launch attacks against nations, hactivists (a combination of the words hack and activism) direct their attacks at specific Web sites. Generally these attacks are intended to promote a political agenda and are in retaliation for a prior event. For example, hactivists might attempt to disable a bank's Web site because that bank stopped accepting online payments that were deposited into accounts belonging to the hactivists.

Computer Science & Information Technology

You might also like to view...

A Navigation ________ contains a Navigation Control with tabs that can be used to open forms and reports

A) bar B) pane C) form D) footer

Computer Science & Information Technology

How does a document appear when you choose the Final option from the Review tab?

A) Shows additions and deletions in balloons in the margin B) Shows the document if you accept all tracked changes C) Shows the document if all tracked changes are rejected D) Shows the additions as inserted text in the document and deletions in balloons in the margin

Computer Science & Information Technology

To add text to a SmartArt graphic, you can type in the shape placeholders or you can open the ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

You access the Folio Builder using which of the following?

A. The Adobe Content Viewer B. The Window menu C. The Tools menu D. The DPS Desktop Tools kit

Computer Science & Information Technology