Differences
This shows you the differences between two versions of the page.
Both sides previous revision Previous revision | |||
hacker_culture [2024/03/31 16:23] ntnsndr [10. Security culture] updating links |
hacker_culture [2024/04/11 18:59] (current) ntnsndr [Objective 3: Master] typo fix |
||
---|---|---|---|
Line 113: | Line 113: | ||
*25 points* | *25 points* | ||
- | Become a goon. The final project for this course is to write an illustrated, 1,800-to-2,000-word report on a real-world hack that for a relevant establishmentarian organization. Pick a hack that particularly fascinates you. | + | Become a goon. The final project for this course is to write an illustrated, 1,800-to-2,000-word report on a real-world hack for a relevant establishmentarian organization. Pick a hack that particularly fascinates you. |
If the hack in question is of questionable legality, write as an FBI agent, perhaps. If the hack is just a brilliant piece of technology, write as a stiff for a big computer company trying to figure out how to capitalize on it. In any case, with clear language and documented research, explain the nature of the hack, its significance, and a recommendation for what your organization should do about it. | If the hack in question is of questionable legality, write as an FBI agent, perhaps. If the hack is just a brilliant piece of technology, write as a stiff for a big computer company trying to figure out how to capitalize on it. In any case, with clear language and documented research, explain the nature of the hack, its significance, and a recommendation for what your organization should do about it. |