* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download Hackers On the Computer Should Get Prosecuted
Survey
Document related concepts
Transcript
Mayling Nil CIS 1055 Section 22 Practice of modifying computer hardware Practice of modifying computer software Most common among teenagers and young adults They enjoy programming and have expert level skills in particular programs Enjoys learning details of a programming language Enjoys doing the programming Person capable of appreciating someone else’s hacking Person who pick up programming quickly Person who is an expert in a particular programming language How to program Get one of the open source Unixes Learn how to use the internet and write HTML Know functional English 1970s- Origins of Hacker Subculture 1980s- 1985 – All Fun and War Games 1985 – 1990 – Theft and Bugs 1990- Combating the Perceived Hacker Threat 2000 – New Trends Graph of Home Computers Do Not Regularly Update Anti-Virus Software Do Not Have Properly and Securely Configured Firewalls Parents Do Not Use Parental Controls Users Have Spyware Lurking on Home Computers 0% 20% 40% 60% 80% 100% 120% Hackers’ computer equipment, modems and storage devices should be taken away. First offense Second offense Third offense Guy Hacking Into Temple’s Network "Facts/Statistics About Computer Security and Loss of Data." Google Answers. 6 Feb. 2004. 8 Aug. 2008 <http://answers.google.com/answers/threadview?id=30430 8>. Harvey, Brian. "What is a Hacker?" What is a Hacker? 8 Aug. 2008 <http://www.cs.berkeley.edu/~bh/hacker.html>. Heaton, Jordana. "Hacker History." Hacker History. 8 Aug. 2008 <http://www.slais.ubc.ca/people/students/studentprojects/j_heaton/>. Hinders, Dana. "What is Computer Hacking?" What is Computer Hacking? 8 Aug. 2008 <http://www.wisegeek.com/what-is-computerhacking.html>.