HACKERS: HEROES OF THE COMPUTER REVOLUTION 25 TH ANNIVERSARY By: Brett Delaney Living in a Networked World: The Good, the Bad, and the Ugly CS 408 Section.

Slides:



Advertisements
Similar presentations
Good or Bad?.  One of the closest contests in US history  Florida was the pivotal state  Neither Democrat Al Gore nor Republican George W. Bush had.
Advertisements

May Ranch Science Fair 2014.
The development of Internet A cow was lost in Jan 14th If you know where it is, please contact with me. My QQ number is QQ is one of the.
Computers and Crime Breaking and Entering Eavesdropping Harassment Vandalism Destruction of Private Property Possession of Stolen Goods Theft.
Cyber Crime Game Players By Marharyta Abreu & Iwona Sornat.
Hectic Ethics Computer Applications Mrs. Wohleb. Objectives Students will be able to: Describe ethical considerations resulting from technological advances.
Unit 1 By Oscar Ramsden. Contents This power point will be about the social impact of ICT on society, this power point will be on the subjects below on.
Hacker Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st semester By :wejad.n.mansour.
1 CHAPTER 1 POLITICS. 2 Definitions Of The Word Hacker Hacker – someone who has achieved some level of expertise with a computer Hacker – someone who.
Computers in Society Week 8: Computer Security and Hacking.
Written By KEVIN J. O’BRIEN Published: December 28, 2009 By The New York Times A Report by Michael Abdullah.
Ethics in Photojournalism. What is Photojournalism? the profession in which journalists make news-editorial images for print and screen (television and.
Computer Ethics in Information Technology
Writing Articles. Articles take a considered view of events, including opinions and sometimes refer to related issues. Reports are more immediate and.
Five Minds for the Future by Howard Gardner
Lecture 18 Page 1 CS 111 Online Design Principles for Secure Systems Economy Complete mediation Open design Separation of privileges Least privilege Least.
Ashley Chambliss ED 505 Fall 2. “Digital Citizenship is a way for teachers to prepare you for a world full of technology.” (Ribble, ) “A means.
CS300 Computers in Society Web- based course Rekha Gupta.
SX1009 & SX1509 Rights in the Digital Society Wendy Moncur / Phil Marston Dept. of Computing Science.
Industrialization vs. Agrarianism Kevin Young, Sterling Simpson, Ron Pileggi, and Dylan Smith.
Notes – The Enlightenment was an 18 th century philosophical movement built off the achievements of the Scientific Revolution. The Enlightenment.
By Ramneek Hundal.. 5 types of Virus.. I LOVE YOUI LOVE YOU. WormsWorms.TROJEN HORES.MELISSA.HAPPY 99 What is a virus. A computer virus is a computer.
Computer crime University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot March 2011 March 2011 ITSS 4201 Internet Insurance and.
SAT ESSAY. It looks like this Think carefully about the issue presented in the following excerpt and the assignment below. Some people ruin their chances.
Objectives Examine the role of the mass media in providing the public with political information. Explain how the mass media influence politics. Understand.
The Technology of Journalism. Satellites What are Satellites? According to dictionary.com satellites are objects that are launched to orbit Earth or.
Journalism Ethics and College Newspapers Ethics in Communication Final Amanda Murphy.
English Language II (2). English Language I (2) Warm-up.
Online Journalism: Theory and Practice Week 2 Lecture 2 Summer 2011 G. F Khan, PhD Dept. of Media & Communication, YeungNam University, South Korea.
“New Media, Digital ethics, Citizen Journalism”. New Media New media, as far as I know, is an interactive, updated and innovative form of media compared.
COMP1321 Networks in Organisations Richard Henson March 2014.
v=anwy2MPT5RE By Levi Nichols.
Racial Profiling Aubrey Clark Sociology 2630-Race and Ethnicity.
By: Clive Thompson Published: Divided into nine chapters that focused on the positives and negatives technology has on our lives Used examples,
Introduction to the ERWC (Expository Reading and Writing Course)
{ Final Project Julie Silk. { By Nick Bilton, 2010 I live in the future and here’s how it works: why your world, work & brain are being creatively disrupted.
Proposal Report Proposals will either be accepted or rejected. Obviously, you want your proposal to be accepted. To help make this possible, follow the.
MIS 2000 Ethical and Legal Aspects of Information Systems Updated: June 2015.
Computer security By Isabelle Cooper.
Being a Lawyer By: Pauline Harrington.. What role does education play in this career? Education plays a major role in being a lawyer. First of all, with.
CS 4001Mary Jean Harrold1 Class 25 ŸComputer crime ŸAssign ŸTerm paper—due 11/20.
Cosc 4765 Computer Security Thinking beyond today.
Introduction to the ERWC (Expository Reading and Writing Course)
Digital Citizen Project By: Frances Murphey Technology and Education.
Aristotle. History and Background - Born in 384 B.C.E. in the city of Stagira in Greece. - At the age of 17, he moved to Athens to study at Plato’s Academy.
What Is Pop Culture? Why Study It?. Quickwrite #1: What is “Pop Culture?” Choose a favorite or familiar piece of pop culture (a band, a musician, a film,
2.1.2.G1 Money in Your Life Advanced Level. © Take Charge Today –August2013 – Money in Your Life – Slide 2 Funded by a grant from Take Charge America,
 Samy (also known as JS.Spacehero)  XSS worm that was designed to propagate across the MySpace social-networking site. At the time of release, it.
Alexis McGillivray All gifs from giphy.com. How Might Your Digital Footprint Effect Your Future Opportunities? You have ticked the Box that says “seen.
DISSECTING A RESEARCH PAPER. WHAT IS A PERIODICAL? Period: amount of time –Magazines (every week or month) –Newspapers (every day) –Journals (every month.
Privacy Lost: How Technology is Endangering Your Privacy CS Final Paper Presentation By: Christina Sulfaro.
Smart City Hacked??? Technology & Society. American cities vulnerable to large-scale cyber attack
CHILDREN’S BOOK CRITIQUE Bayley Savage. INTASC STANDARD PAGE Standard #5: Application of Content The teacher understands how to connect concepts and use.
MIS5001: Information Technology Management Ethics and Continuity Management Larry Brandolph
Over the past 40 years, IT has influenced and really changed the way we live out lives. It’s fair to say that we love our gadgets; with most of us owning.
Legislation 32 Legislation 32. Legislation 32 Our last topic is a BIG fave in the exam! It has often been the subject of the final question that’s worth.
By: Ahmad Al-Ghanim & Yousef Al-Matooq.  Have you ever wondered why the modern world today is so advanced in every field?  I just imagine that in a.
WSI DIGITAL WEB SOLUTIONS - Contact No : Gillett Drive, Ajax, Ontario, L1Z 0C1 -
Technology Safety By: Stefanie Weston. Netiquette Dos and Don’ts for Children  Do  Respect the topic that is being discussed.  Be polite and make friends.
G1 Money in Your Life “Take Charge of Your Finances” Advanced Level.
Responsible digital citizenship By: Aiden. What is responsible digital citizenship? Responsible digital citizenship is many things. The topics I am covering.
Cyber crimes is the most popular news we come across daily In good olden days there were no development in the usage of computers as we have now As.
By: Antonio Vazquez.  As far as this year goes, there were a lot of struggles that I had this year, I can’t really explain why, they just occurred. 
The Art of Deception: Controlling the Human Element of Security
CS Presentation Michael Retrum.
Hackers and Crackers iJacsn.
Chapter 11 crime and security in the networked economy
Cyber Security Experts
A Gift of Fire Third edition Sara Baase
Presentation transcript:

HACKERS: HEROES OF THE COMPUTER REVOLUTION 25 TH ANNIVERSARY By: Brett Delaney Living in a Networked World: The Good, the Bad, and the Ugly CS 408 Section 2

ABOUT THE AUTHOR Steven Levy Born 1951 in Philadelphia, Pennsylvania Born 1951 in Philadelphia, Pennsylvania American Journalist American Journalist Written several books on technology, computers, the Internet & privacy Written several books on technology, computers, the Internet & privacy Published articles in Time Magazine, New York Times, & Rolling Stone Published articles in Time Magazine, New York Times, & Rolling Stone Currently lives in New York City Currently lives in New York City

ABOUT THE BOOK 25 th Anniversary Edition 25 th Anniversary Edition Originally published in 1984, revised and republished 2010 Originally published in 1984, revised and republished 2010 Publisher: O’Reilly Media Publisher: O’Reilly Media Descriptive and uses tacky vocabulary Descriptive and uses tacky vocabulary Wasn’t always a fun read but was full of technological information Wasn’t always a fun read but was full of technological information

WHAT THE BOOK IS ABOUT Talks about the digital revolution from the early 1950’s to the 1980’s Talks about the digital revolution from the early 1950’s to the 1980’s Focuses on specific computer systems and rise of the use of computers by people outside of the big businesses and governments Focuses on specific computer systems and rise of the use of computers by people outside of the big businesses and governments Contains information about big name computer enthusiasts like Contains information about big name computer enthusiasts like Richard Stallman Bill Gates Steve Jobs Larry Ellison

WHAT THE BOOK IS ABOUT PT.2 Goes into great depth about the “Hacker Ethic” Goes into great depth about the “Hacker Ethic” -“the belief that information-sharing is a powerful positive good, and that it is an ethical duty of hackers to share their expertise by writing open- source code and facilitating access to information and to computing resources wherever possible” -Levy discusses and views hacking from a beneficial viewpoint, as if it points out a hole in security for the company, especially if no monetary gain or theft is involved in the hack.

THE BENEFITS OF HACKERS & WHAT THEY DO Levy views hacking as a positive contribution to our society because he believes hacking can help show breaches in security for corporations or even normal citizens. Levy views hacking as a positive contribution to our society because he believes hacking can help show breaches in security for corporations or even normal citizens. Levy also says that hacking can help do great things for technology and the Internet as long as the hackers are not fixated on breaking into your computer and stealing your data. Levy also says that hacking can help do great things for technology and the Internet as long as the hackers are not fixated on breaking into your computer and stealing your data. Levy goes into depth in the book explaining it might be worth remembering that the word hacker doesn’t mean criminal – at least not all the time. Levy goes into depth in the book explaining it might be worth remembering that the word hacker doesn’t mean criminal – at least not all the time.

THE NEGATIVES OF HACKING Levy doesn’t really focus on the negative side of hacking but critics would argue hacking contributes to Levy doesn’t really focus on the negative side of hacking but critics would argue hacking contributes to - Financial Losses -Loss of Information -Exposure of Privacy -Damage Reputation for major corporations In the early years of technology, people never thought second about hacking, but becoming vulnerable of an attack has increased drastically, especially with all these new inventions and gadgets. In the early years of technology, people never thought second about hacking, but becoming vulnerable of an attack has increased drastically, especially with all these new inventions and gadgets.

HOW DOES THIS BOOK RELATE TO THE COURSE Hacking plays an important role in the networked world and was a topic the classed discussed not to long ago. Hacking plays an important role in the networked world and was a topic the classed discussed not to long ago. In class we discussed three phases of hacking In class we discussed three phases of hacking 1.The joy of programming- Early 60’s-70’s, hackers first introduced ’s to mid 1990’s- Viewed as negative, started to look deeper and analyze hackers for security purposes 3.The Growth of Web and Mobile Devices- Includes the problems we face today, spread of viruses and “hacktivism”.

WHY I CHOSE THIS BOOK Hacking has always been an interest of mine and I never really knew how it all began Hacking has always been an interest of mine and I never really knew how it all began I never really knew what effects or contributions it could do for society I never really knew what effects or contributions it could do for society I always thought the term “hacker” or “hacking” was automatically negative I always thought the term “hacker” or “hacking” was automatically negative Never realized it had been an issue since the late 50’s and early 60’s. Never realized it had been an issue since the late 50’s and early 60’s. With new inventions and gadgets coming out, hacking needs to be analyzed and be taken seriously. With new inventions and gadgets coming out, hacking needs to be analyzed and be taken seriously.

FOR ENJOYMENT OR INFORMATION Typically I wouldn’t read a non-fiction book that contains a lot of factual information, but the book is enjoyable if you are interested in learning the history of hacking Typically I wouldn’t read a non-fiction book that contains a lot of factual information, but the book is enjoyable if you are interested in learning the history of hacking Isn’t always entertaining to read but doesn’t jump around or throw you off topic Isn’t always entertaining to read but doesn’t jump around or throw you off topic I would recommend to a reader who is interested in computer science and learning about the ethical approach of hacking. I would recommend to a reader who is interested in computer science and learning about the ethical approach of hacking.