Briefly describe hactivists from an information security point of view.

What will be an ideal response?

Hactivists are motivated by ideology. Unlike cyberterrorists, who launch attacks against nations, hactivists (a combination of the words hack and activism) direct their attacks at specific Web sites. Generally these attacks are intended to promote a political agenda and are in retaliation for a prior event. For example, hactivists might attempt to disable a bank's Web site because that bank stopped accepting online payments that were deposited into accounts belonging to the hactivists.

Computer Science & Information Technology

You might also like to view...

Match the audio formats with the descriptions

I. Audio Interchange File Format A. A format with small file size and high quality sound II. Audio B. A format supported by Windows computers III. MPEG Audio Layer-3 C. One of the oldest audio formats and is typically used on Unix IV. RealAudio D. An Apple format that is not cross-platform compatible V. Waveform E. Used for streaming audio What will be an ideal response?

Computer Science & Information Technology

A neural network relies on massively parallel processing to enable a computer to simulate the function of a human brain.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology