List and describe the primary motivations for computer intrusion or theft of information in contemporary society
What will be an ideal response?
The answer should include the following points:
National origin, ideology, or demographics aside, there appear to be six primary motivations for computer intrusion or theft of information in contemporary society:
? Boredom
? Intellectual challenge (mining for knowledge—pure hackers)
? Revenge (insiders, disgruntled employees, etc.)
? Sexual gratification (stalking, harassment, etc.)
? Economic (criminals)
? Political (hacktivists, terrorists, spies, etc.)
You might also like to view...
What is sum after the following loop terminates?
``` int sum = 0; int item = 0; do { item++; sum += item; if (sum > 4) break; } while (item < 5); ``` A. 7 B. 8 C. 6 D. 5
In a client/server network, each network node communicates directly with every other node on the network
Indicate whether the statement is true or false
A computer that a hacker has gained control of in order to launch DoS attacks is known as a computer
a. rootkit b. compromised c. zombie d. breached
The ________ displays across the top of the program window, grouping commands features in the manner in which they would most logically be used
Fill in the blank(s) with correct word