#Trevizonotecards6thperiod

Identifying Strategic Targets

Source:
Lewis, James Andrews. "Hackers Are Not a Threat to Cybersecurity." Hacking and Hackers, 2014 Content Level = Intermediate 2014: n. pag. Opposing Viewpoints in Context. Web. 21 Apr. 2015. <http://ic.galegroup.com/ic/ovic/ViewpointsDetailsPage/ViewpointsDetailsWindow?failOverType=&query=&prodId=OVIC&windowstate=normal&contentModules=&display-query=&mode=view&displayGroupName=Viewpoints&limiter=&u=j071909010&currPage=&disableHighlighting=true&displayGroups=&sortBy=&source=&search_within_results=&p=OVIC&action=e&catId=&activityType=&scanId=&documentId=GALE|EJ3010883207>.

Quote:

"Strikes on critical infrastructure carry a higher degree of risk for the attacker if they are used against targets outside the theater of military operations or in the opponent's homeland. This is one area where cyber attack, because of its global reach, may resemble nuclear war. Just as the U.S. "

My Ideas:

Some cyber hackers and threads have very complicated strategies, to be ready to attack.

History:
Created: 04/22/15 02:09 PM

Internet Facilitates Crime

Source:
Berg, Terrence. "The Internet Facilitates Crime." Does the Internet Benefit Society?, 2005 Content Level = Intermediate 2005: n. pag. Opposing Viewpoints in Context. Web. 21 Apr. 2015. <http://ic.galegroup.com/ic/ovic/ViewpointsDetailsPage/ViewpointsDetailsWindow?failOverType=&query=&prodId=OVIC&windowstate=normal&contentModules=&display-query=&mode=view&displayGroupName=Viewpoints&limiter=&u=j071909010&currPage=&disableHighlighting=true&displayGroups=&sortBy=&source=&search_within_results=&p=OVIC&action=e&catId=&activityType=&scanId=&documentId=GALE|EJ3010400206>.

Quote:

"The Internet provides criminals with abundant opportunities for wrongdoing. For example, offenders can steal personal information, commit fraud (such as taking money but not delivering merchandise), solicit child pornography, or launch damaging computer viruses."

My Ideas:

This proves how criminals have more access to personal information, look at what they want, and share what they can to feel they're in control. This problem makes others uncountrable by knowing someone else is using their personal information incorrectly.

History:
Created: 04/22/15 01:50 PM

The Internet Criminal's Advantage

Source:
Berg, Terrence. "The Internet Facilitates Crime." Does the Internet Benefit Society?, 2005 Content Level = Intermediate 2005: n. pag. Opposing Viewpoints in Context. Web. 21 Apr. 2015. <http://ic.galegroup.com/ic/ovic/ViewpointsDetailsPage/ViewpointsDetailsWindow?failOverType=&query=&prodId=OVIC&windowstate=normal&contentModules=&display-query=&mode=view&displayGroupName=Viewpoints&limiter=&u=j071909010&currPage=&disableHighlighting=true&displayGroups=&sortBy=&source=&search_within_results=&p=OVIC&action=e&catId=&activityType=&scanId=&documentId=GALE|EJ3010400206>.

Quote:

"Two other strategic advantages the Internet offers criminals are its almost limitless pool of victims and its veil of anonymity. Fraud artists seeking to victimize investors or persuade consumers to send money in advance for nonexistent goods can reach a vast number of possible victims cheaply and effectively through the Internet without ever risking any personal contact or identification."

My Ideas:

This shows how the criminal persuades its prey and manipulates their information to their benefit, through lies.

History:
Created: 04/22/15 01:57 PM

The Threat of Deterrence

Source:
Lewis, James Andrews. "Hackers Are Not a Threat to Cybersecurity." Hacking and Hackers, 2014 Content Level = Intermediate 2014: n. pag. Opposing Viewpoints in Context. Web. 21 Apr. 2015. <http://ic.galegroup.com/ic/ovic/ViewpointsDetailsPage/ViewpointsDetailsWindow?failOverType=&query=&prodId=OVIC&windowstate=normal&contentModules=&display-query=&mode=view&displayGroupName=Viewpoints&limiter=&u=j071909010&currPage=&disableHighlighting=true&displayGroups=&sortBy=&source=&search_within_results=&p=OVIC&action=e&catId=&activityType=&scanId=&documentId=GALE|EJ3010883207>.

Quote:

Century ago, armies discovered that technology could be the key to victory. Since then there has been a steady stream of new weapons, new technologies, and new ways to attack. Perhaps it is best to see the Internet and cyber attack as the latest in a long line of technologies that have changed warfare and provided new military capabilities.

My Ideas:

This shows how technology is an open door either for the good and the evil, for an army or a hacker, its purpose will remain the same.

History:
Created: 04/28/15 05:54 PM

Comment Stream