1. *THE GAP BETWEEN EDUCATED AND
UNEDUCATED,
ECONOMIC CLASSES AND GLOBAL CLASS
*SKILLED AND NON SKILLED PEOPLE
2.
1. RESOLVING THE DIGITAL DEVIDE DEMANDS A NATIONAL
INITIATIVE
2. COMMUNITY RELEVANCE AND COMMUNITY
INVOLVEMENT
3.RETHINK EDUCATIONAL APPROACHES
4. CONTINUE AND EXPAND GOVERNMENT PROGRAMS AND
PROVIDE ADDITIONAL FUNDING TO RESOLVE THE DIGITAL
DIVIDE
5. RETHINK MARKET APPROACHES
6.MORE RESEARCH, DATA COLLECTION AND EVALUATION
7. BETTER TECHNOLOGY AND MORE MINORITY OWNED
BUSINESSES.
BY “THE NET WORKING AND INFORMATION TECHNOLOGY
RESEARCH AND DEVELOPMENT”
<http://www.nitrd.gov/PUBS/pitac/digital_divide/pres2feb00ddlresc.aspx>
3. CYBER RELATED CRIME
OR INTERNET RELATED CRIMES DEPEND ON THE SCOPE OF
THE CRIME. SO CYBER RELATED SCOPE WISE CRIME IS CYBER
RELATED CRIMES. IT COULD BE LOCAL, STATE WISE, FEDERAL
AND INTERNATIONAL. FOR EXAMPLE:
*COMPUTER INTRUSION I.E. HACKING
*PASSWORD TRAFFICKING
*COUNTERFEITING OF CURRENCY
*CHILD EXPLOITATION AND INTERNET FRAUD
*SPAM AND HARASSMENT
*BOMB THREAT IN INTERNET
www.justice.gov/criminal/cybercrime/reporting.html by THE
UNITED STATES DEPARTMENT OF JUSTICE
4.
Hacker means a clever programmer who break into
computer information or systems or software that means
stealing information from computer. They are spying on
people, government. They are too selfish that they may
crash a system and claim that they do nothing intentionally.
They can freeload all secured information which they
should not.
Cracker
The bad boy who tries to break the line of systems security
for special codes destroy vital data.
Hacker are interested in the hidden and obscure parts of a
computer or operating system. Hackers actually find the
weak point in the security systems and keeps the owner in
continuous check up. They are looking for knowledge(more
in my video)
http://lerablog.org/technology/the-difference-between-cracker-and-hacker by LERA BLOG
5.
1. Do not do any harm. Do not damage computer or data.
Most of the time they stay funny, many people experience
them.
2. They do not alter or destroy any data as the crackers.
They want to explore the system and learn more. So they
have a thirst for knowledge. Hacker thinks hacking is
harmless but to fix it victims need to spend their valuable
times and efforts. Hackers do not want to waste anything.
3. keep a low profile
4. if suspected and accused then deny it.
5. they like free flow of information
6. sharing
6.
ACCORDING TO U.S. FEDERAL BUREAU OF
INVESTIGATION, CYBER TERRORISM IS ANY POLITICALLY
MOTIVATED ATTACK AGAINST INFORMATION, COMPUTER
SYSTEMS, COMPUTER PROGRAMS, DATA WHICH RESULTS
IN VIOLENCE AGAINST NON- COMBATANT TARGETS.
THE OBJECT OF CYBER TERRORISM IS HARMING OTHER
PEOPLE FINANCIALLY, PHYSICALLY.
TARGET OF CYBER TERRORISM IS THE BANKING
INDUSTRY, MILITARY INSTALLATIONS, POWER
PLANTS, AIR TRAFFIC CONTROL CENTERS OR ANY
SOCIETAL SYSTEMS.
HTTP://SEARCHSECURITY.TECHTARGET.COM/DEFINITION/CYBERTERRORISM BY
ROUSE MARGARET IN “CYBERTERRORISM”
7.
IT IS THE STRUGGLE OVER THE INFORMATION AND
COMMUNICATION PROCESS. INFORMATION WARFARE IS
THE APPLICATION OF DESTRUCTIVE FORCE ON A LARGE
SCALE AGAINST INFORMATION ASSETS AND SYSTEMS
AGAINST THE COMPUTERS AND NETWORKS THAT
SUPPORT THE FOUR CRITICAL INFRASTRUCTURES:
THE POWER GRID
COMMUNICATIONS
FINANCIAL
TRANSPORTATION.
http://www.fas.org/irp/eprint/snyder/infowarfare.html. INFORMATION WARFARE BY BRIAN
C. LEWIS
8.
INFORMATION WARFARE PROHIBITS ENEMIES TO ASSURE
THE INTEGRITY, AVALIBILITY AND INTEROPERABILITY OF
FRIENDLY INFORMATION ASSETS BY NDU. SO WE HAVE TO
CONTROL INFORMATION FOR POSSIBLE TERRORISM.
INFORMATION MUST BE DEFENDED AGAINST THEFT,
MODIFICATION AND DESTRUCTION. INFORMATION MUST
BE VERIFIED AFTER RECEIVING. INFORMATION MUST BE
PROTECTED AND TRUSTED AT ALL LEVELS. DISTRIBUTION
OF INFORMATION MUST BE SECURED. WE HAVE TO TRY
TO KNOW THE ENEMIES INFORMATION AND TRY TO
AFFECT THE ROOT OF THE THINKING OF THE ENEMIES
AND AFFECT THAT.
CYBERWAR MAINLY CORRELATED WITH MILITARY
REALM.
(DESCRIPTIONS IN MY VIDEOS IN THE EMAIL)