Question one
Hacker subculture is a collection of programmers with exclusive technological expertise and knowledge on online activities, which is a development of the hacking expertise that only relied on devices. The hackers in the subculture possess unique online expertise that assists them in accessing other persons’ or organizations’ computers, and systems to gain control and deny the owner access (Taylor & Fritsch, 2011).The people are unique on how they drive their activities.
One of the major elements that drive the hackers is that they are obsessed of online activities. They believe that they should spend most of their time on the internet as they try to maneuver various tricks. They are extremely brilliant an element that makes it hard for them to connect with other people. They can spend the best part of their day on the computer as they try to find ways through which they could come up with a new trick to trap the sites for various companies and individuals (Taylor & Fritsch, 2011).
A hacker is an individual with exclusive computer or technological skills that he or she uses to identify and exploit a weakness in a computer network or system. The motivation for the hackers may be the profit they would like to gain or challenging the developer of a network of the computer system (Taylor & Fritsch, 2011).
The hacker value system would not be a reliable solution to the behaviors of the hackers. First, it is good to understand that the hackers are mainly driven by passion. They have adequate infatuation to take control of the networks and systems developed by others. Therefore, shunning the passion would be extremely hard and hence impossible to control them (Taylor & Fritsch, 2011).For example, hackers will always find joy in inventing something new in an already existing software or program.
Question two
Denial of service (DoS)attack is a computing term that defines the attempt to make a machine or network resource inaccessible to the intended users. Another person who may not necessarily understand how the system works may take the rights of control by the user. Cyber criminals may execute their cyber crimes through a technique (Dennis, 2014).
Cyber terrorists find the DoS technique as a reliable method to execute their activities. They possess exclusive knowledge on how they can control major sites of the countries that they would wish to attack. In most cases, they may attack and take control of the security sites for the country. Through the site, they may control all the security activities of the country with the intention of executing their attacks (Dennis, 2014).
On the other hand, the DoS may be significant in executing proper cyber warfare campaign. With the technological expertise that a country may possess, it is easy to access the terrorism sites. The government may use its programming experts to execute necessary challenge to the existing terrorism site or system (Dennis, 2014).
The DoS attack has been common in some nations in various instances. For example, Russia has been at risk for some time. Two of its neighbors; Estonia, and Georgia having the websites of their governments targeted by unknown people during the conflict in the region. The evidence is a clear message that the DoS may be used I executing nation-states warfare. The attackers may take advantage of the situation such as the one in Russia to execute their ill motives (Dennis, 2014). In most cases, terrorists will take advantage of such situations.
References
Dennis, M. (2014). denial of service attack (DoS attack) (computer science).Encyclopedia Britannica Online. Retrieved October 15, 2014, from http://www.britannica.com/EBchecked/topic/1055468/denial-of-service-attack-DoS- attack
Taylor, R., & Fritsch, E. (2011). Digital crime and digital terrorism (2nd ed.). Boston: Prentice Hall.