computer science multi-part question and need guidance to help me learn.
IMPORTANT: When posting, you should thoughtfully explain a theme from lecture, then incorporate and cite at least one of your readings in your original response to the prompt, including the author, title, publication date, and page if available. Best form is to include that information at the end of your narrative response/as a footnote. You may even relate current events, ask a question about a “hazy” concept, or share a personal experience related to the topic. The goal is to demonstrate you have read and reflected on the lessons, readings, and considered the perspectives of your classmates.
Generating responses using AI tools like Chat GPT for graded course work is a violation of the course academic policies.
You should aim to post an original response to my prompt and reply to two of your classmate’s posts on the discussion board each week.
Your original response to the discussion prompt is worth 2 points each week
Each reply to a classmate’s post is worth 1 point.
Thus, for full credit, you should aim to post an original response and then reply to yjtrrpeers each week, for a total of 5 possible points per week (up to 50 total points for the quarter).
Take a moment to consider how you frame your thoughts before posting, incorporate our course material, and your life experience.
Brief, superficial posts/replies to peer posts, posts that seem generated by AI/ChatGPT, or those that do not follow the instructions above, will be given partial or no credit.
In light of the materials this week, what are your thoughts about evaluating the legality of hacking as a crime based on the ethics – or motives – of the hacker? How do you view “hacktivism” for social movement or political reasons, versus hacking as a way to steal valuable information or money, i.e., for personal economic gain? Is this dichotomy useful? You might consider the rise in “Script Kiddies” vs. the “OG” hacktivists!
Given the proliferation of criminal acts online, especially hacking at the scale of the massive SolarWinds attack in 2021, Chinese cyber espionage or suspected “spy balloons” gathering sensitive data in 2022-2023, or in the alternative, the Ukrainian government calling on “underground” hacktivists to defend against Russia with an “IT Army” since the war began, how useful is John Perry Barlow’s idealistic “Declaration of the Independence of Cyberspace”? In what ways does it – and does it not – stand the test of time?
(Notably, the Russian government has also called upon its masses to set up an “IT Army” of hacktivists…)
For an updated list of Significant Cyber Incidents by CSIS, link here.
John Perry Barlow, “A Declaration of the Independence of Cyberspace”Links to an external site.
The Mentor, “Hacker’s ManiLinks to an external site.festoLinks to an external site.”
CDF, Ch 3 “Computer Hackers and Hacking” Attached a pdf file
CSIS, “Significant Cyber IncidentsLinks to an external site.” Timeline
Note: Do not complete the discussion until you have
completed the video above.
Step 2: Respond to the Reflection Q
In a “reply” below, respond to the following question(s):What do you think of Kevin Mitnick’s prison sentence?
Requirements: n/a | .doc file