ترجمه مقاله نقش ضروری ارتباطات 6G با چشم انداز صنعت 4.0
- مبلغ: ۸۶,۰۰۰ تومان
ترجمه مقاله پایداری توسعه شهری، تعدیل ساختار صنعتی و کارایی کاربری زمین
- مبلغ: ۹۱,۰۰۰ تومان
Abstract
The recent FBI v. Apple case has the potential to turn a 227-year-old statute law into a tool for government agencies to gain access to personal and corporate information. Recent events such as ‘Petraeus-gate,’ hacked nude celebrity photos in the cloud, and the use of a search and seizure warrant in the United States seeking customer email contents on an extraterritorial server raise important issues for the supposedly safe storage of data on the World Wide Web. Not only may there be nowhere to hide in cyberspace but nothing in cyberspace may be private. This article explores the legal and technical issues raised by these matters, with emphasis on the court decision In the Matter of a Warrant to Search a Certain E-Mail Account Controlled and Maintained by Microsoft Corporation and the subsequent upholding of that decision.
4. Discussion
Even with good asset protection things can go wrong. Not so long ago at Florida International University (FIU) in their new research and teaching laboratories on cybersecurity, including the Advanced Wireless and Security Lab (ADWISE) and the Cyber-Physical Systems Security Lab (CSL), something unexpected went wrong. For his class project, Andrew De La Rosa–—a student in an ethical hacking class–—decided to attack Bluetooth, a technology standard used to exchange data over short distances. He wanted to show that weaknesses in Bluetooth could allow him to download someone’s private contacts. He picked a device at random on the FIU campus and hacked into it. ‘‘When I ran the serial number, I saw it was registered to campus police,’’ De La Rosa said. He rushed to the police substation at the FIU Engineering Center to explain. ‘‘You’re lucky you told me,’’ the officer told him. ‘‘Even if you’re doing this for a class, I could have arrested you.’’ Florida punishes unauthorized access to a computer system as a felony (Gretch, 2015).