Final Exam Assignment

Read Complete Research Material



Final Exam Assignment

Q#1(a)

In America, activism has a wide, vibrant and rich history of American activist, which have resulted in the much needed industrial, social and government changes in the past. The same word though is not used for the wikileaks, Lulzsec and other whistleblower rather they are tagged to a word of “hacktivist” (Ludlow, 2010). However, the main difference is of the visible leadership between wikileaks and Lulzsec.

Wikileaks has been involved in many big incidents of the world by breaching the particular document makes them available for the public in a wake of “free information for all”. The serious leak cables of United States Army over the war in Iraq and Afghanistan put serious questions in front of Pentagon and the White House. In addition to serious breach into the system of government agencies, Wikileaks continuously spies on the corporate websites of big MNCs. According to the concept of Julain Assange they are working for the free information for all, along with the benefits of large masses irrespective of color, race, nationality. The main difference between the traditional hacker and these kinds of internet activists is of the intention and use of information in the most beneficial way for the masses, i.e. country, and even for the benefit of whole world so that the political thrust should make the appropriate policies which are in favor of the public. While the traditional hacker breaches the particular system and use the information for the intention of earning the profits by selling the particular confidential information or document to the particular entity or individual. Moreover the traditional hacker does not seek the benefits of the public hence it's not he whistleblower but the Wikileaks is. In addition to this the traditional hacker might use the information for the individual benefit but the hacktivist will use the information for the collective benefits. However, there is still a huge discussion going on the Wikileaks and the internet activists, which is the reason the new “IP Act” bill is proposed and adopted in the United States of America (Bellia, 2012).

Q#1(b)

There are various techniques being adopted by various companies private or public, however all these systems of intrusion detection based on four assumptions to protect the designed system. These assumptions are:

All authorized and unauthorized activities of users must be monitored by the system

The capability of the system to identify the possible indication of attack on the system

Intrusion system must provide the information which can be utilized to improve the overall security of the system (Denning, 1987)

The last but not least assumption for the intrusion detection system is the ability of the system to make a real time analysis of an attack. However, it is most difficult task to be achieved through the intrusion detection technologies. There are currently various approaches being used to achieve the desirable system in terms of elements of intrusion detection system. These two approaches are misuse detection and anomaly detection which are currently incorporated in various systems. However there are other approaches as ...
Related Ads
  • Final Exam
    www.researchomatic.com...

    Final Exam Final Exam Question - 1. The United State ...

  • Final Exam
    www.researchomatic.com...

    Final Exam Final Exam Answer 1. It is undoubtedly tr ...

  • Final Examination Essay
    www.researchomatic.com...

    FINAL EXAMINATION ESSAY Final Examination Essay ... ...

  • First Exam
    www.researchomatic.com...

    First Exam First Exam 1. There are a lot of people w ...

  • Final Exam For Life Of Ch...
    www.researchomatic.com...

    Final Exam for Life of Christ: Summary The fa ...