1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Andreas93 [3]
3 years ago
8

Should the use of hacktivists by a country against enemy organizations be considered an act of war? Why or why not? How about th

e use of cyberterrorists?
Computers and Technology
1 answer:
Artyom0805 [142]3 years ago
3 0

Explanation:

Hacktivist comes from the combination of two words --- "Hack" and " Activism" .

Hacktivist perform hacktivism that means they make use of technology and knowledge to support as well as promote the political agenda and any kind of change in the social event.

Cyberterrorism, on the other hand uses internet and technology and conduct terrorism and other anti national activities like to coerce the societies or the governments in pursuit of their goals which are  religious, ideological or political.

While Hacktivism is used for a political cause, and is done in a peaceful manner; whereas cyber terrorism tries to grab the attention of the public through their aggressive ways, specifically by putting fear among the public.

But there is no instance of any person of getting killed by a cyber-attack or cyber terrorism. The larger damage is however done by those viruses or malware which gets into other persons computers or enemy organization computer system and weakens them and steals information and data. They damage and harm the economy in a larger scale.

When Chinese government first introduced the Trojan virus on the computer systems of their opponents abroad, is that can be called as Hacktivism? In  essence, this act may be called as cyber terrorism and not hacktivism. Because the Chinese Government intend to cause major economic damage and harm to their opponents or enemy organization by targeting the software giants in the West.

These companies crashed and and many left jobless and unemployment, they caused economic problems and damage to the technologies.  However, the Chinese Government's perspective on this is that they addresses such a thing as hacktivism as it advocates the state censorship by filtering the politically or the socially-unacceptable ideas in their e-mail.

Thus, the answer is relative as to whose perspective we are looking. Either we are taking the perspective of the Chinese government or that of the enemy organization which is affected by the act of the state censorship and targeting the Western software giants.

Cyberterrorism will somehow become a serious threat to the society when people adept at hacking will sympathize and also align with terrorists activities and cause. It has become appealing since some of computer programs have the features that are easily exploited and conducive for committing cyber terrorism.

You might be interested in
Greg is the network administrator for a large stadium that hosts many events throughout the course of the year. They equip usher
Sav [38]

Answer:

Device Authentication

Explanation:

Device authentication allows the venue to restrict network access to authorized scanners but does not require individual ushers to sign in to the device. This seems an acceptable level of security for this environment, as the scanners are carefully controlled. Moving to any authentication scheme that requires user authentication would be unwieldy

6 0
3 years ago
Provide the user with a menu for the following 10 algorithms. Then ask which algorithm the user decides she/he wants to use. Fin
Vanyuwa [196]

Answer:

foiydvoihivherqpiufhqeripufhwpjferifyhgeqwpufwhrfiouerhfpiwruhwriufhriughrpifuwrhfpouwerhfpir3gherqiughwrpijfheriughrgiuehgukjetnbgipuhiugtrihugtrhuigrtuhtrgihugtrihugtrihuggriughrgiuhgthgtehuighirihghtrihuetiughto[ughwer[igut4hg[owjg[toughjr[ough42ouhetgpou4t2gouhpoughogu4tpiu24hgpouthpgouwithjgop2tijgpotu4hgp4igjtoihj2p4oughroug2jt4poiughj2rpougrtihugtrjgtjipoijhuigtrfkopfgtrigtlrijgrijgtju9gt3i;gtju;lk3j3g00j835uj3ggy366j6jujep6ppjysbgtvrjgtroijpgtrijptgwiugtugtjteggteuegtiuogtgtutge5gtuogtuotguutytgju5t5iujugtteg5ut5gugt58ut54ut5grut5rd8u5trdu8jt5rd8ut5r8ut5tttfgig5ri;grgtrtgijpogte5ijopgtijogtri0tg45i0t45ij9gt54p98uhtrhuothjpiughtgutjhpwtoigj2rtg92tjhrwoipj[tigh9ughoghjergouehnpoutehgepogiujtr[ogihewupognetpoiuhqetoighqe[ou\epfouheq-g9uerhfhgprugqetughqe[ougjetiughnqetpoughnqet[ogujqreg[uijt

6 0
2 years ago
Explain the correct ways of using keyboard. .​
Naily [24]

Answer:

https://www.digitalunite.com/technology-guides/computer-basics/using-computer/how-use-computer-keyboard

Explanation:

the link at the top should explain it all! :)

7 0
2 years ago
Identify and discuss the seven layers of the Open System Interconnection (OSI) model and their importance on TCP/IP operation.
a_sh-v [17]

Answer:

following are the OSI Layers

1.physical layer

2.datalink layer

3.network layer

4.transport layer

5.session layer

6.presentation layer

7.application layer

Explanation:

physical layer is used to transmit media,signal and binary information

datalink layer is used for physical addressing MAC and LLC

network layer is used for path determination and ip

transport layer is for end to end communication and reliability

session layer is for interhost communication

presentation layer is for data representation and encryption

application layer is network process to application

4 0
3 years ago
Complete the statement below with the correct term.
Lilit [14]

Answer:

<em>Every </em><em>couple</em><em> </em><em>of </em><em>month </em><em>or </em><em>whatever </em><em>you </em><em>give </em><em>it </em><em>to </em><em>someone</em><em> </em><em>else</em>

8 0
2 years ago
Other questions:
  • Jameis is researching at his local library when he finds a perfect source to use in his paper. When he goes to check the book ou
    12·2 answers
  • To change the background color of a page, which tab would you use?
    15·2 answers
  • Plz help! 3 questions! 1.The ideal light to use is.... A.front light B.a combination of side and back light C.a combination of f
    10·1 answer
  • For security reasons a network administrator needs to ensure that local computers cannot ping each other. which settings can acc
    5·1 answer
  • Need help with just #8
    12·1 answer
  • When you print a worksheet or use the Page Setup dialog box, Excel inserts __ breaks that show the boundaries of what will print
    7·1 answer
  • What pointer appears when pointing to a hyperlink?
    9·1 answer
  • What is the turns ratio of the transformer T10261
    5·1 answer
  • 10. List three adaptations of wind-pollinated plants to promote pollination.<br>​
    12·1 answer
  • Define a function below, filter_out_strs, which takes a single argument of type list. Complete the function so that it returns a
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!