Reference no: EM133196512
First Assault Line: Hacking, Malware, and Distributed Denial of Service (DDoS)
Many people who explore the Internet do so with curiosity and honorable intentions. Often, they are surprised at how easily they can cross lines and enter private domains. Unfortunately, some people intentionally cross boundary lines by hacking into databanks, e-mail accounts, and other domains of service. Many individuals and companies have experienced hacking into their private e-mail servers. This form of hacking involves persons with personal, political, or financial agendas that can bring harm to others.
Malware are sophisticated viruses used to obtain money illegally, steal identity information (e.g., bank PIN numbers or password information), and control computers primarily for spamming purposes. Some people are paid to write computer malware, and others do it because they like the challenge. Even more sophisticated attacks involve distributed denial of service (DDoS). This involves using multiple computers and Internet connections to attack a targeted source usually distributed via botnets. This form of malicious malware can force a targeted system to shut down and prevent it from providing services to its clients. Often people who engage in these types of cybercrimes do not appreciate or care about the consequences of their behavior, both legal and civil. They also do not grasp or care about the harm they cause others.
This week, you will explore the impact of hacking and malware distribution as it relates to ethical and criminal behavior. You will examine a case study involving hacking and opine on motivations and intent. In addition, you will submit your career choice for the Final Project.
Learning Objectives
Students will:
- Evaluate motivations of cyber experimenters and hackers
- Analyze differences between cyber experimentation and cybercriminal behavior
- Analyze ethical and moral considerations involved in hacking
- Analyze career roles in cybercrime