HSM 438 WEEK 1 DISCUSSION
HSM 438 week 1 DQ 1& 2
. Hacker Theory
Describe which theory from Chapter Three of Digital Crime and Digital Terrorism best explains the origin and development of the hacker subculture in digital environments. Identify one strength and one weakness of this theory in describing hacker behavior.
Your initial post should be at least 250 words in length. Support your claims with examples from required material(s), and properly cite any references.
Introduction
Information attack is becoming very common in the digital world. There are viruses among other means used by the attackers to get the information they want from wherever they are. This
No comments:
Post a Comment
Note: only a member of this blog may post a comment.