Cybersecurity and Computer Crimes: Difference between revisions

From Technologies and Politics of Control
Jump to navigation Jump to search
(Created page with "{{ClassCalendar}} '''March 31''' Last week we looked at hacking as a form of social protest. This week, we take a closer look at the more sinister side of hacking, and the v...")
 
Line 9: Line 9:
== Readings ==
== Readings ==


; Cybersecurity


* [http://krebsonsecurity.com/wp-content/uploads/2012/10/HackedPC2012.png Brian Krebs, "The Scrap Value of a Hacked PC (infographic)," Oct 2012]
* [http://www.forbes.com/sites/moneybuilder/2015/01/13/the-big-data-breaches-of-2014/ Bill Hardekopf, "The Big Data Breaches of 2014, Forbes, January 13, 2015]
* [http://www.reuters.com/article/2011/04/26/us-sony-stoldendata-idUSTRE73P6WB20110426 Liana Baker and Jim Finkle, "Sony Playstation suffers massive data breach," Reuters, April 26, 2011]
* [http://arstechnica.com/security/2014/12/hackers-promise-christmas-present-sony-pictures-wont-like/ Sean Gallagher, "Hackers Promise 'Christmas Present' Sony Pictures Won't Like," Ars Technica, December 15, 2015]
* [http://arstechnica.com/security/2014/12/us-government-fingers-north-korea-as-the-sony-hackers/ Peter Bright, "US Government Fingers North Korea as the Sony Hackers," Ars Technica, December 17 2014]


; Computer Crimes
; Computer Crimes

Revision as of 14:47, 24 January 2015

March 31

Last week we looked at hacking as a form of social protest. This week, we take a closer look at the more sinister side of hacking, and the various responses to it. Hacking at its heart involves modifying or intruding upon another’s system. But not all intrusion is socially harmful, and writing laws against hacking have a troubling (and at times, tragic) history of being misused. How big a threat is hacking, really? How should systems respond to hacking? What, if anything, should be the role of government? In what ways can we govern those who don’t consider code to be a governing influence?


Readings

Cybersecurity
Computer Crimes
Case studies

Optional Readings



Videos Watched in Class

Links

Class Discussion

Please remember to sign your postings by adding four tildes (~~~~) to the end of your contribution. This will automatically add your username and the date/time of your post, like so: Andy 10:28, 17 December 2013 (EST)