Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

1. A hacker group hacked into the Bay Area Rapid Transit (BART) system to protes

ID: 3600755 • Letter: 1

Question

1. A hacker group hacked into the Bay Area Rapid Transit (BART) system to protest BART’s shut down of wireless communication in some BART stations. Was this a form of hacktivism? Was it ethical? Give reasons.

2. Describe a (hypothetical) hacking attack by a foreign government that you would consider an act of war. Indicate what characteristics of the attack lead to that conclusion.

3. we gave an analogy between merchants accepting some amount of shoplifting,on the one hand, and merchants and credit card companies accepting some amount of credit card fraud, on the other hand. Identify a strength and a weakness of this analogy.

4. Identify several issues raised by this scenario:

Someone in California posts on amazon.com a very critical review of a new book written by a British author. The review says the writer is an incompentent fool without a single good idea; he can’t even express the bad ideas clearly and probably did not graduate from grade school; he should be washing dishes instead of wasting paper and the reader’s time.The author sues the reviewer and Amazon for libel.

5. Suppose a 16-year old release automatic-dialing software that will flood the emergency 911 telephone system with calls, knocking out service. He claims he was experimenting with the software and released it by accident. What penalty do you think is appropriate?

6. I have a message M=32 that I want to encrypt. Given the two prime numbers, p=5 and q=11, find the public key and private key. Then encrypt the message. Hint: When using brute force search to determine the keys, just pick the first one (lowest number) that works

Explanation / Answer

Question 1

A hacker group hacked into the Bay Area Rapid Transit (BART) system to protest BART’s shut down of wireless communication in some BART stations.This type of attacks are done mostly to stand for some situation which caused previously.This is a form a hackivisim.It was not ethical as it disrupted the system for some time.But this is also form of protest which is being done some group of peoples.

Question 2

Some hacking attack by a foreign governmetn can be considered a war.one report was being issued in the Wall Street Journal Stating that the US military has decalred a statement that "If you shut down our power grid, maybe we will put a missile down one of your smokestacks," as per a military official.

If this type attack happens then the repurcesion or the result leads to the war

Question 3

we gave an analogy between merchants accepting some amount of shoplifting,on the one hand, and merchants and credit card companies accepting some amount of credit card fraud, on the other hand.

THe streght so called can be pointd out as the money is rolling in the market and the business keeps on going.

The weakness can be described as the loss which is being incurred by the company.

Question 4

The issue which is raised here mainly is the disrespecting the author and making statement which is judgemental in terms,So here the author sues the company and journalist for this.