TITLE

Unmasking Anonymous

AUTHOR(S)
Walker, John
PUB. DATE
June 2012
SOURCE
ITNOW;Summer2012, Vol. 54 Issue 2, p28
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
We have observed groups arrive on the hacking scene and one very notable representation is the now infamous Anonymous. John Walker FBCS CITP asks: who are they, what is there objective and what are the implications for the future?
ACCESSION #
75698451

 

Related Articles

  • A Right to Cybercounter Strikes: The Risks of Legalizing Hack Backs. Kallberg, Jan // IT Professional;Jan2015, Vol. 17 Issue 1, p30 

    The idea to legalize hacking back has gained traction in the last few years and has received several influential corporate and political proponents in the US and Europe. The growing frustration with repeated cyberattacks and a lack of effective law enforcement pushes for alternative ways to...

  • Global Cyber Security Outlook.  // Sudan Defence & Security Report;Q1 2011, Issue 1, p27 

    The article presents an outlook on global cyber security from 2010-2015. It provides political risk analysis of cyber warfare that claims to affect global political and economic stability. It mentions that cyber attacks to financial institutions would become precedence for terrorist attacks....

  • The Passionate Time of Chinese Hackers. Min Dahong // Chinascope;May2005, p14 

    Deals with the attacks initiated by Chinese computer hackers between 1998 and 2001. Motivation for the attacks on Indonesian Internet in August 1998; Impact of the attacks on U.S. Internet in May 1999; Internet war between Chinese and Taiwanese hackers in August 1999.

  • Curses! Hacked Again.  // Consumer Reports;Nov2014, Vol. 79 Issue 11, p16 

    The article discusses data security breaches in August 2014, including a Russian hacking group that stole 1.2 billion names and passwords and the theft of 4.5 million hospital patient records. Consumer advice is presented on how to maintain security, such as by using different passwords for...

  • Is retaliation an answer to cyber attacks? Messmer, Ellen // Network World;1/24/2011, Vol. 28 Issue 2, p1 

    The article discusses the effectiveness of counterinsurgency to slow the threat of cyber attacks. According to Laurent Oudot, founder of TEHTRI-Security, if an attacker has taken control of a corporate machine, it is logical to counterstrike to determine the desire of the attacker and to find a...

  • Hack Tivism. Davis, Adrian // ITNOW;Summer2012, Vol. 54 Issue 2, p30 

    Over the last two or so years, organisations have had to meet a new and highly specific online threat. That threat is hacktivism and Adrian Davis, Principal Research Analyst at the Information Security Forum, takes a look at the threat from an information security perspective, based on research...

  • CRIMINOLOGICAL CHARACTERISTICS OF COMPUTER CRIME. DOGARU, Olguta // Journal of Criminal Investigation;2012, Vol. 5 Issue 1, p92 

    This article presents some important aspects related to computer crime, the psychology of the offender, his behavior which is highly generated by the society. There are presented some typologies of offenders like hackers and crackers, motives for their actions and the impact on the structures of...

  • Dark side of the Internet of Things. Thornton, John // Public Finance;Jul/Aug2015, Issue 7/8, p43 

    The article provides information on issues concerning the adoption of the Internet of Things in Great Britain's public finance sector. It discusses the proposed spending on Internet of Things research in the country as well as issues concerning smart gadgets, which are harvesting data on users'...

  • STAY ANONYMOUS ON THE WEB.  // Computer Active;Oct2014, Vol. 9 Issue 10, p50 

    The article provides free and easy-to-use tools that allow internet users browse in safety in several web browsers including Google Chrome, Firefox, and Internet Explorer. It discusses several critical factors in relation to serious violation of one's privacy. Other information such as adverts...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics