The impact of these online protests , combined with the growing presence of groups such as “ Anonymous ” and the popularity of Julian Assange and Wikilieakshas ledhacktivism
real world events(passive) can be caused byhacktivism
the organisation 's attempts to pull a promotional video featuring Scientologist Tom Cruise from YouTube(passive) prompted byhacktivism
The vast lack of understanding of the technology used to do everyday things but alsoleadshacktivism
to rise in the wake of Julian Assange ’s WikiLeaks , as politically - motivated attacks grow in number and organize themselves through social networks(passive) is also setHacktivism
disruptive social groups like Anonymous(passive) created byhacktivism
AWS Console(passive) automatically created byhttps://gist.github.com/apun/8f8c0c0cbea38d7e0bdc
the Cult of the Dead Cow ( cDc ) , an opinion leader in the computer underground(passive) was invented byHacktivism
for North America(passive) was createdhacktivism
to take advantage of the new features these programs provide(passive) is designedAgencyofRecord.com
naturally(passive) was ... designedSavasi
cause for compromised data in 2011PR Newswire : 2011was leadingcause for compromised data in 2011PR Newswire : 2011
cause for compromised data in 2011Dave Neal / Inquirerwas leadingcause for compromised data in 2011Dave Neal / Inquirer
cybersecurity reform ” ( PDFcan ... should influencecybersecurity reform ” ( PDF
cause for compromised data in 2011Nathan Eddywas leadingcause for compromised data in 2011Nathan Eddy
Other noticeable events(passive) triggered byOther noticeable events
reputation damage and unwanted publicitycausingreputation damage and unwanted publicity
collateral damage whose guild is paid by the innocentcausescollateral damage whose guild is paid by the innocent
from China due to events that are politically sensitiveoriginatesfrom China due to events that are politically sensitive
the next big security breach with intent of malicious damage as opposed to just exposing cybersecurity flawscausingthe next big security breach with intent of malicious damage as opposed to just exposing cybersecurity flaws
global policy in the hacktivisminfluencingglobal policy in the hacktivism
above employee grade new threats within — one of the most New , hacktivist threats within existcreatesabove employee grade new threats within — one of the most New , hacktivist threats within exist
protests Hackers in this documentary are n’t the kind who steal from your online bank accountsparksprotests Hackers in this documentary are n’t the kind who steal from your online bank account
as a concept in the late 90 'soriginatedas a concept in the late 90 's
the path for people to do somethingcreatesthe path for people to do something
hysteria when the Wikileaks group posted classified US military files in a similar wayhas causedhysteria when the Wikileaks group posted classified US military files in a similar way
cyber security reformcan ... should influencecyber security reform
an ethical dilemmahas causedan ethical dilemma
to conduct sabotage or demonstrate intentions motivated by social or political concernsis designedto conduct sabotage or demonstrate intentions motivated by social or political concerns
some private groups to infiltrate oil and gas companies on supposedly altruistic groundshas ledsome private groups to infiltrate oil and gas companies on supposedly altruistic grounds
a high level of embarrassment that goes beyond corporate press releases about data breaches , or identity theftcreatesa high level of embarrassment that goes beyond corporate press releases about data breaches , or identity theft
to increase in 2016setto increase in 2016
probablycontributedprobably
to the report 's finding that 98 percent of all attacks were committed by outsidersprobably contributedto the report 's finding that 98 percent of all attacks were committed by outsiders
to a massive change in societyCan ... leadto a massive change in society
on secure networksoriginatingon secure networks
quite a stircan causequite a stir
to the peak in malware numberscontributingto the peak in malware numbers
some real problems for the private and public sectorcan causesome real problems for the private and public sector
to pose greater risksetto pose greater risk
to crash websitesdesignedto crash websites
direct harm to reputationcausesdirect harm to reputation
great stress upon many innocent people as its overall a negative contribution to societycan causegreat stress upon many innocent people as its overall a negative contribution to society