Internet Security: Hacking, Counterhacking, and Society
The frequency of digital attacks and intrusions has steadily increased over the years as the number of people with the appropriate motivation and technical ability continues to grow. Internet Security: Hacking, Counterhacking, and Society is a modern survey of the recent ethical policy issues arising in connection with Internet and network security. This exciting collection of papers, articles, and monographs discusses a number of important ethical questions arising in many distinct areas of Internet and network security, including: Are hacker attacks and hacktivism morally justified? Is hacking justified as self-defense? How should professionals respond to security issues? Is publishing malicious code protected by moral rights to free speech? Internet Security: Hacking, Counterhacking, and Society is a valuable addition to the library of anyone concerned with the growing number of Internet security issues and intrusions facing society today.
What people are saying - Write a review
We haven't found any reviews in the usual places.
Herman Tavani The Conceptual and Moral Landscape
Hacking Hacktivism and Active Defense
Kenneth Einar Himma Hacking as Politically Motivated Digital
Dorothy Denning A View of Cyberterrorism 5 Years Later
Ethical Issues in Professionalism and Design
Batya Friedman Daniel Howe and Edward Felten Informed
Richard Epstein The Impact of Computer Security Concerns
Other Security Issues
Kai Kimppa Andy Bissett and N Ben Fairweather Security in
acts of civil acts of hacktivism aggressive argue argument Available break-ins browser buffer overflow claim communication computer crime computer security computer systems cookie cookie management cookie watcher Core Wars cyber cyberattacks cyberspace cyberterrorism damage database defense principle digital attack digital intrusions disclosure discussion disk electronic civil disobedience encryption evaluation example hacker ethic hackers hacking hacktivism hacktivists harm Himma impact individuals informed consent infrastructures innocent intellectual property intermediate responses Internet development involving justified legitimate machines moral motivated Mozilla necessity principle on-line games password person political potential problems professional protect punishment puter relevant requires result risk secure software server significant social software development software development process Software Engineering software process software project goals someone Spafford steganalysis steganography Tavani terrorists third parties threat tion unauthorized user stories users vendors victim virus viruses vulnerability worm