SOC 2070 Lecture Notes - Lecture 21: Computer Security, Cybercrime

38 views2 pages

Document Summary

Hackers individuals with an interest in technology who use their knowledge to access computers and devices with or without authorization from the owner (holt and kilger 2012) Hacking is deviant, but not always malicious. Many individuals considered hackers whose job it is it to test various parameters of hardware and software the challenge is what most hackers value. Some even share their knowledge to improve design and security. Software that can destroy or corrupt files, steal sensitive data, deface websites, render systems inoperable, etc. Early 1980"s computer technology and bulletin board systems (bbs) Explore the capabilities and limits of computers. Some youth started accessing and controlling government and private sector computers. Most didn"t want to cause damage, it was the challenge and sense of power that mattered. Anxiety over youth and computer technology facilitated a hacker archetype (when overall anxiety combined with new technology youths are going to take this into oblivion, what to do next?)

Get access

Grade+
$40 USD/m
Billed monthly
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
10 Verified Answers
Class+
$30 USD/m
Billed monthly
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
7 Verified Answers

Related Documents