SlideShare a Scribd company logo
This is a 1 -2 page essay on an issue you found interesting while reading Cuckoos Egg.
Examples include the continuing conflict between the FBI and Apple or Kevin Mitnick or
Stuxnet or how terrorists use the Internet or how the US government decision to attack ISIS
digitally. These are master’s level essays not college descriptive essays. You must find and
analyze interesting and challenging issue. Prior to submitting the paper, you must submit a five
source annotated bibliography with two paragraphs about each source. The first is a summary of
the article. The second is your reflection on the article – what it makes you think about. Each
paragraph contains a minimum of five sentences. Submit to me on blackboard. The document
should include the paper and the annotated bibliography
Solution
Kevin Mitnick:
-->The hacker who change his hat.He is the most famous hacker drones on about technoology.
-->The nebulous language of section 814 does not clearly differenciate between a computer
crime or an electronic
prank and an international act of terror.
--> Kevin Mitnick did anything all that illegal, but there's no denying that he was the world's
first high profile computer criminal.
-->hacker Kevin Mitnick is (although he is undeniably great), but how devastatingly effective he
is at tricking people into
revealing critical information in casual conversations
-->Under this legislation,Mafiaboy or kevin Mitnick would be considered a cyber-terrorist,even
though they were
not acting against critical national infrastructures.
-->This is like equating a water-balloon attack with a political assassination.
-->Mitnick became a legend in the nascent hacking community for some of his cunning stunts:
dumpster-diving
outside businesses to uncover discarded staff manuals and access codes, posing as an IT
department staff member
so that other workers would voluntarily cough up passwords over the phone.
-->He was proclaimed "the world's most notorious cyber-thief" in The New York Times, and
"the poster boy for computer crime"
on TV's 60 Minutes.
--> The FBI finally nailed him, living under a fake identity in North Carolina.
-->Mitnick was presented in court as extremely dangerous, "the world's most wanted"
computer criminal, and his trial
coincided with a time when American cyber paranoia was at an all-time high.
Stuxnet:
--> The FBI defines cyber terrorism as a “premeditated, politically motivated attack against
information,
computer systems, computer programs and data which results in violence against non-combatant
targets by
subnational groups or clandestine agents.
-->a terror group might launch a “digital Pearl Harbor” to Stuxnet-like sabotage (ahem,
committed by state forces)
to hacktivism, WikiLeaks and credit card fraud. As one congressional staffer put it, the way we
use a term like
cyber terrorism “has as much clarity as cybersecurity — that is, none at all.
--> “It is possible for a terrorist group to develop cyber-attack tools on their own or to buy them
on the black market,” Lynn warned.
“A couple dozen talented programmers wearing flip-flops and drinking Red Bull can do a lot of
damage.”
-->Taking down hydroelectric generators, or designing malware like Stuxnet that causes nuclear
centrifuges to spin out of
sequence doesn’t just require the skills and means to get into a computer system. It’s also
knowing what to do once you are in.
To cause true damage requires an understanding of the devices themselves and how they run,
the engineering and physics behind the target.
-->The Stuxnet case, for example, involved not just cyber experts well beyond a few wearing
flip-flops, but also experts in areas that ranged
from intelligence and surveillance to nuclear physics to the engineering of a specific kind of
Siemens-brand industrial equipment.
-->It also required expensive tests, not only of the software, but on working versions of the
target hardware as well.

More Related Content

Similar to This is a 1 -2 page essay on an issue you found interesting while re.pdf

Cyber warfare ss
Cyber warfare ssCyber warfare ss
Cyber warfare ss
Maira Asif
 
Sit presentation - Hacking
Sit presentation - HackingSit presentation - Hacking
Sit presentation - Hackingmsolis0710
 
Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011hassanzadeh20
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its Prevention
Dinesh O Bareja
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
Buy A Paper Gallatin
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
Bharat Thakkar
 
Ii congresso de crimes eletrônicos e formas de proteção – 27 09-2010 – aprese...
Ii congresso de crimes eletrônicos e formas de proteção – 27 09-2010 – aprese...Ii congresso de crimes eletrônicos e formas de proteção – 27 09-2010 – aprese...
Ii congresso de crimes eletrônicos e formas de proteção – 27 09-2010 – aprese...FecomercioSP
 
Assignment 2 LASA 2 Dropbox AssignmentThis assignment comp.docx
Assignment 2 LASA 2 Dropbox AssignmentThis assignment comp.docxAssignment 2 LASA 2 Dropbox AssignmentThis assignment comp.docx
Assignment 2 LASA 2 Dropbox AssignmentThis assignment comp.docx
MerrileeDelvalle969
 
CYBER
CYBERCYBER
CYBER
Jay Owens
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
ANKITA VISHWAKARMA
 
Report on hacking crime and workable solution
Report on hacking crime and workable solutionReport on hacking crime and workable solution
Report on hacking crime and workable solution
Shohag Prodhan
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
loverakk187
 
Computer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
Computer Security,Types of Hackers,Installation of Kali Linux, Common KeywordsComputer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
Computer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
khansalman19
 
Top 5 notorous Hackers
Top 5 notorous HackersTop 5 notorous Hackers
Top 5 notorous Hackers
Vinuammu
 
Future of Chinese Cyber Warfare
Future of Chinese Cyber WarfareFuture of Chinese Cyber Warfare
Future of Chinese Cyber Warfare
Bill Hagestad II
 
Honeypots in Cyberwar
Honeypots in CyberwarHoneypots in Cyberwar
Honeypots in Cyberwar
Mehdi Poustchi Amin
 
Historical genesis and evolution of cyber crimes new
Historical genesis and evolution of cyber crimes newHistorical genesis and evolution of cyber crimes new
Historical genesis and evolution of cyber crimes new
Dr. Arun Verma
 
Assignment 2 LASA 2 Submissions AssignmentThis assignment .docx
Assignment 2 LASA 2 Submissions AssignmentThis assignment .docxAssignment 2 LASA 2 Submissions AssignmentThis assignment .docx
Assignment 2 LASA 2 Submissions AssignmentThis assignment .docx
annrodgerson
 
Judgement Day - Slovakia
Judgement Day  - SlovakiaJudgement Day  - Slovakia
Judgement Day - Slovakia
OCTF Industry Engagement
 

Similar to This is a 1 -2 page essay on an issue you found interesting while re.pdf (20)

Cyber warfare ss
Cyber warfare ssCyber warfare ss
Cyber warfare ss
 
Hacking (cs192 report )
Hacking (cs192 report )Hacking (cs192 report )
Hacking (cs192 report )
 
Sit presentation - Hacking
Sit presentation - HackingSit presentation - Hacking
Sit presentation - Hacking
 
Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its Prevention
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
 
Ii congresso de crimes eletrônicos e formas de proteção – 27 09-2010 – aprese...
Ii congresso de crimes eletrônicos e formas de proteção – 27 09-2010 – aprese...Ii congresso de crimes eletrônicos e formas de proteção – 27 09-2010 – aprese...
Ii congresso de crimes eletrônicos e formas de proteção – 27 09-2010 – aprese...
 
Assignment 2 LASA 2 Dropbox AssignmentThis assignment comp.docx
Assignment 2 LASA 2 Dropbox AssignmentThis assignment comp.docxAssignment 2 LASA 2 Dropbox AssignmentThis assignment comp.docx
Assignment 2 LASA 2 Dropbox AssignmentThis assignment comp.docx
 
CYBER
CYBERCYBER
CYBER
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Report on hacking crime and workable solution
Report on hacking crime and workable solutionReport on hacking crime and workable solution
Report on hacking crime and workable solution
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Computer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
Computer Security,Types of Hackers,Installation of Kali Linux, Common KeywordsComputer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
Computer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
 
Top 5 notorous Hackers
Top 5 notorous HackersTop 5 notorous Hackers
Top 5 notorous Hackers
 
Future of Chinese Cyber Warfare
Future of Chinese Cyber WarfareFuture of Chinese Cyber Warfare
Future of Chinese Cyber Warfare
 
Honeypots in Cyberwar
Honeypots in CyberwarHoneypots in Cyberwar
Honeypots in Cyberwar
 
Historical genesis and evolution of cyber crimes new
Historical genesis and evolution of cyber crimes newHistorical genesis and evolution of cyber crimes new
Historical genesis and evolution of cyber crimes new
 
Assignment 2 LASA 2 Submissions AssignmentThis assignment .docx
Assignment 2 LASA 2 Submissions AssignmentThis assignment .docxAssignment 2 LASA 2 Submissions AssignmentThis assignment .docx
Assignment 2 LASA 2 Submissions AssignmentThis assignment .docx
 
Judgement Day - Slovakia
Judgement Day  - SlovakiaJudgement Day  - Slovakia
Judgement Day - Slovakia
 

More from deepakarora871

please show stepsworking thanks Simplify Sin theta (cosec theta - s.pdf
please show stepsworking thanks Simplify Sin theta (cosec theta - s.pdfplease show stepsworking thanks Simplify Sin theta (cosec theta - s.pdf
please show stepsworking thanks Simplify Sin theta (cosec theta - s.pdf
deepakarora871
 
mutations in the LDL receptor are linked to familial hypercholestero.pdf
mutations in the LDL receptor are linked to familial hypercholestero.pdfmutations in the LDL receptor are linked to familial hypercholestero.pdf
mutations in the LDL receptor are linked to familial hypercholestero.pdf
deepakarora871
 
Name at least three ancillary departments in a hospital that dire.pdf
Name at least three ancillary departments in a hospital that dire.pdfName at least three ancillary departments in a hospital that dire.pdf
Name at least three ancillary departments in a hospital that dire.pdf
deepakarora871
 
Linear Algebra QuestionI have been trying at these for hours. I ca.pdf
Linear Algebra QuestionI have been trying at these for hours. I ca.pdfLinear Algebra QuestionI have been trying at these for hours. I ca.pdf
Linear Algebra QuestionI have been trying at these for hours. I ca.pdf
deepakarora871
 
Match the following parts of an EKG with what part of the heartbeat t.pdf
Match the following parts of an EKG with what part of the heartbeat t.pdfMatch the following parts of an EKG with what part of the heartbeat t.pdf
Match the following parts of an EKG with what part of the heartbeat t.pdf
deepakarora871
 
Let X = U+V, U is exponentially distributed with mean = 2 and V is a.pdf
Let X = U+V, U is exponentially distributed with mean = 2 and V is a.pdfLet X = U+V, U is exponentially distributed with mean = 2 and V is a.pdf
Let X = U+V, U is exponentially distributed with mean = 2 and V is a.pdf
deepakarora871
 
Lets try to summarize Darwins observations that drive changes in .pdf
Lets try to summarize Darwins observations that drive changes in .pdfLets try to summarize Darwins observations that drive changes in .pdf
Lets try to summarize Darwins observations that drive changes in .pdf
deepakarora871
 
In a single-phase region of a p-v-T diagram, which of the following a.pdf
In a single-phase region of a p-v-T diagram, which of the following a.pdfIn a single-phase region of a p-v-T diagram, which of the following a.pdf
In a single-phase region of a p-v-T diagram, which of the following a.pdf
deepakarora871
 
If the CFTR doesnt work correctly due to a mutation, Cl^- movement .pdf
If the CFTR doesnt work correctly due to a mutation, Cl^- movement .pdfIf the CFTR doesnt work correctly due to a mutation, Cl^- movement .pdf
If the CFTR doesnt work correctly due to a mutation, Cl^- movement .pdf
deepakarora871
 
How does the Drosophila embryo get its pair-rule stripes How is the .pdf
How does the Drosophila embryo get its pair-rule stripes How is the .pdfHow does the Drosophila embryo get its pair-rule stripes How is the .pdf
How does the Drosophila embryo get its pair-rule stripes How is the .pdf
deepakarora871
 
Explain the difference between an assumption and a constraint.So.pdf
Explain the difference between an assumption and a constraint.So.pdfExplain the difference between an assumption and a constraint.So.pdf
Explain the difference between an assumption and a constraint.So.pdf
deepakarora871
 
Each group should plot on graph paper the ½ life of the radioisotope.pdf
Each group should plot on graph paper the ½ life of the radioisotope.pdfEach group should plot on graph paper the ½ life of the radioisotope.pdf
Each group should plot on graph paper the ½ life of the radioisotope.pdf
deepakarora871
 
Dr. Liu did a genetic screen for yeast cells that fail to synthesize .pdf
Dr. Liu did a genetic screen for yeast cells that fail to synthesize .pdfDr. Liu did a genetic screen for yeast cells that fail to synthesize .pdf
Dr. Liu did a genetic screen for yeast cells that fail to synthesize .pdf
deepakarora871
 
Children with Down Syndrome generally show a pattern of retarded men.pdf
Children with Down Syndrome generally show a pattern of retarded men.pdfChildren with Down Syndrome generally show a pattern of retarded men.pdf
Children with Down Syndrome generally show a pattern of retarded men.pdf
deepakarora871
 
Choose the statement that describes the first stage of phagocytosis .pdf
Choose the statement that describes the first stage of phagocytosis  .pdfChoose the statement that describes the first stage of phagocytosis  .pdf
Choose the statement that describes the first stage of phagocytosis .pdf
deepakarora871
 
Are logarithms prolems used for career jobsSolutionLogarithmi.pdf
Are logarithms prolems used for career jobsSolutionLogarithmi.pdfAre logarithms prolems used for career jobsSolutionLogarithmi.pdf
Are logarithms prolems used for career jobsSolutionLogarithmi.pdf
deepakarora871
 
All based on Zybooks = AP Java with zylabsPlease answer all questi.pdf
All based on Zybooks = AP Java with zylabsPlease answer all questi.pdfAll based on Zybooks = AP Java with zylabsPlease answer all questi.pdf
All based on Zybooks = AP Java with zylabsPlease answer all questi.pdf
deepakarora871
 
a) The following is a list of terms to do with how digital informati.pdf
a) The following is a list of terms to do with how digital informati.pdfa) The following is a list of terms to do with how digital informati.pdf
a) The following is a list of terms to do with how digital informati.pdf
deepakarora871
 
5. What is the difference between mutually exclusive alternatives and.pdf
5. What is the difference between mutually exclusive alternatives and.pdf5. What is the difference between mutually exclusive alternatives and.pdf
5. What is the difference between mutually exclusive alternatives and.pdf
deepakarora871
 
“Our solar system is a molecule on a snowflake on the tip of the ice.pdf
“Our solar system is a molecule on a snowflake on the tip of the ice.pdf“Our solar system is a molecule on a snowflake on the tip of the ice.pdf
“Our solar system is a molecule on a snowflake on the tip of the ice.pdf
deepakarora871
 

More from deepakarora871 (20)

please show stepsworking thanks Simplify Sin theta (cosec theta - s.pdf
please show stepsworking thanks Simplify Sin theta (cosec theta - s.pdfplease show stepsworking thanks Simplify Sin theta (cosec theta - s.pdf
please show stepsworking thanks Simplify Sin theta (cosec theta - s.pdf
 
mutations in the LDL receptor are linked to familial hypercholestero.pdf
mutations in the LDL receptor are linked to familial hypercholestero.pdfmutations in the LDL receptor are linked to familial hypercholestero.pdf
mutations in the LDL receptor are linked to familial hypercholestero.pdf
 
Name at least three ancillary departments in a hospital that dire.pdf
Name at least three ancillary departments in a hospital that dire.pdfName at least three ancillary departments in a hospital that dire.pdf
Name at least three ancillary departments in a hospital that dire.pdf
 
Linear Algebra QuestionI have been trying at these for hours. I ca.pdf
Linear Algebra QuestionI have been trying at these for hours. I ca.pdfLinear Algebra QuestionI have been trying at these for hours. I ca.pdf
Linear Algebra QuestionI have been trying at these for hours. I ca.pdf
 
Match the following parts of an EKG with what part of the heartbeat t.pdf
Match the following parts of an EKG with what part of the heartbeat t.pdfMatch the following parts of an EKG with what part of the heartbeat t.pdf
Match the following parts of an EKG with what part of the heartbeat t.pdf
 
Let X = U+V, U is exponentially distributed with mean = 2 and V is a.pdf
Let X = U+V, U is exponentially distributed with mean = 2 and V is a.pdfLet X = U+V, U is exponentially distributed with mean = 2 and V is a.pdf
Let X = U+V, U is exponentially distributed with mean = 2 and V is a.pdf
 
Lets try to summarize Darwins observations that drive changes in .pdf
Lets try to summarize Darwins observations that drive changes in .pdfLets try to summarize Darwins observations that drive changes in .pdf
Lets try to summarize Darwins observations that drive changes in .pdf
 
In a single-phase region of a p-v-T diagram, which of the following a.pdf
In a single-phase region of a p-v-T diagram, which of the following a.pdfIn a single-phase region of a p-v-T diagram, which of the following a.pdf
In a single-phase region of a p-v-T diagram, which of the following a.pdf
 
If the CFTR doesnt work correctly due to a mutation, Cl^- movement .pdf
If the CFTR doesnt work correctly due to a mutation, Cl^- movement .pdfIf the CFTR doesnt work correctly due to a mutation, Cl^- movement .pdf
If the CFTR doesnt work correctly due to a mutation, Cl^- movement .pdf
 
How does the Drosophila embryo get its pair-rule stripes How is the .pdf
How does the Drosophila embryo get its pair-rule stripes How is the .pdfHow does the Drosophila embryo get its pair-rule stripes How is the .pdf
How does the Drosophila embryo get its pair-rule stripes How is the .pdf
 
Explain the difference between an assumption and a constraint.So.pdf
Explain the difference between an assumption and a constraint.So.pdfExplain the difference between an assumption and a constraint.So.pdf
Explain the difference between an assumption and a constraint.So.pdf
 
Each group should plot on graph paper the ½ life of the radioisotope.pdf
Each group should plot on graph paper the ½ life of the radioisotope.pdfEach group should plot on graph paper the ½ life of the radioisotope.pdf
Each group should plot on graph paper the ½ life of the radioisotope.pdf
 
Dr. Liu did a genetic screen for yeast cells that fail to synthesize .pdf
Dr. Liu did a genetic screen for yeast cells that fail to synthesize .pdfDr. Liu did a genetic screen for yeast cells that fail to synthesize .pdf
Dr. Liu did a genetic screen for yeast cells that fail to synthesize .pdf
 
Children with Down Syndrome generally show a pattern of retarded men.pdf
Children with Down Syndrome generally show a pattern of retarded men.pdfChildren with Down Syndrome generally show a pattern of retarded men.pdf
Children with Down Syndrome generally show a pattern of retarded men.pdf
 
Choose the statement that describes the first stage of phagocytosis .pdf
Choose the statement that describes the first stage of phagocytosis  .pdfChoose the statement that describes the first stage of phagocytosis  .pdf
Choose the statement that describes the first stage of phagocytosis .pdf
 
Are logarithms prolems used for career jobsSolutionLogarithmi.pdf
Are logarithms prolems used for career jobsSolutionLogarithmi.pdfAre logarithms prolems used for career jobsSolutionLogarithmi.pdf
Are logarithms prolems used for career jobsSolutionLogarithmi.pdf
 
All based on Zybooks = AP Java with zylabsPlease answer all questi.pdf
All based on Zybooks = AP Java with zylabsPlease answer all questi.pdfAll based on Zybooks = AP Java with zylabsPlease answer all questi.pdf
All based on Zybooks = AP Java with zylabsPlease answer all questi.pdf
 
a) The following is a list of terms to do with how digital informati.pdf
a) The following is a list of terms to do with how digital informati.pdfa) The following is a list of terms to do with how digital informati.pdf
a) The following is a list of terms to do with how digital informati.pdf
 
5. What is the difference between mutually exclusive alternatives and.pdf
5. What is the difference between mutually exclusive alternatives and.pdf5. What is the difference between mutually exclusive alternatives and.pdf
5. What is the difference between mutually exclusive alternatives and.pdf
 
“Our solar system is a molecule on a snowflake on the tip of the ice.pdf
“Our solar system is a molecule on a snowflake on the tip of the ice.pdf“Our solar system is a molecule on a snowflake on the tip of the ice.pdf
“Our solar system is a molecule on a snowflake on the tip of the ice.pdf
 

Recently uploaded

June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
gb193092
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
chanes7
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
Mohammed Sikander
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
Wasim Ak
 

Recently uploaded (20)

June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
 

This is a 1 -2 page essay on an issue you found interesting while re.pdf

  • 1. This is a 1 -2 page essay on an issue you found interesting while reading Cuckoos Egg. Examples include the continuing conflict between the FBI and Apple or Kevin Mitnick or Stuxnet or how terrorists use the Internet or how the US government decision to attack ISIS digitally. These are master’s level essays not college descriptive essays. You must find and analyze interesting and challenging issue. Prior to submitting the paper, you must submit a five source annotated bibliography with two paragraphs about each source. The first is a summary of the article. The second is your reflection on the article – what it makes you think about. Each paragraph contains a minimum of five sentences. Submit to me on blackboard. The document should include the paper and the annotated bibliography Solution Kevin Mitnick: -->The hacker who change his hat.He is the most famous hacker drones on about technoology. -->The nebulous language of section 814 does not clearly differenciate between a computer crime or an electronic prank and an international act of terror. --> Kevin Mitnick did anything all that illegal, but there's no denying that he was the world's first high profile computer criminal. -->hacker Kevin Mitnick is (although he is undeniably great), but how devastatingly effective he is at tricking people into revealing critical information in casual conversations -->Under this legislation,Mafiaboy or kevin Mitnick would be considered a cyber-terrorist,even though they were not acting against critical national infrastructures. -->This is like equating a water-balloon attack with a political assassination. -->Mitnick became a legend in the nascent hacking community for some of his cunning stunts: dumpster-diving outside businesses to uncover discarded staff manuals and access codes, posing as an IT department staff member so that other workers would voluntarily cough up passwords over the phone. -->He was proclaimed "the world's most notorious cyber-thief" in The New York Times, and "the poster boy for computer crime" on TV's 60 Minutes. --> The FBI finally nailed him, living under a fake identity in North Carolina.
  • 2. -->Mitnick was presented in court as extremely dangerous, "the world's most wanted" computer criminal, and his trial coincided with a time when American cyber paranoia was at an all-time high. Stuxnet: --> The FBI defines cyber terrorism as a “premeditated, politically motivated attack against information, computer systems, computer programs and data which results in violence against non-combatant targets by subnational groups or clandestine agents. -->a terror group might launch a “digital Pearl Harbor” to Stuxnet-like sabotage (ahem, committed by state forces) to hacktivism, WikiLeaks and credit card fraud. As one congressional staffer put it, the way we use a term like cyber terrorism “has as much clarity as cybersecurity — that is, none at all. --> “It is possible for a terrorist group to develop cyber-attack tools on their own or to buy them on the black market,” Lynn warned. “A couple dozen talented programmers wearing flip-flops and drinking Red Bull can do a lot of damage.” -->Taking down hydroelectric generators, or designing malware like Stuxnet that causes nuclear centrifuges to spin out of sequence doesn’t just require the skills and means to get into a computer system. It’s also knowing what to do once you are in. To cause true damage requires an understanding of the devices themselves and how they run, the engineering and physics behind the target. -->The Stuxnet case, for example, involved not just cyber experts well beyond a few wearing flip-flops, but also experts in areas that ranged from intelligence and surveillance to nuclear physics to the engineering of a specific kind of Siemens-brand industrial equipment. -->It also required expensive tests, not only of the software, but on working versions of the target hardware as well.