Sample Worksheet -
Unauthorized Access


[PART I: ``Unauthorized Access'' article]
Q1. What do we mean by the term "Unauthorized Access"?
Response:

Q2. Does unauthorized access include reading other person's data without his/her permission?
Response:

Q3. Give an example of unauthorized access with malicious intent.
Response:

Q4. What do you think was the motive of Julio Ardita while he was breaking into sensitive computer systems
Response:

Q5. Is it easy or difficult to keep unauthorized access hidden?
Response:

Q6. What advice would you give to your best friend found breaking into other people's machines?
Response:

Q7. Do you know anyone who has intruded into other people's computers? What was the motive?
Response:
 

Q8. What do you understand from the terms "Info-Jacking" and "Cyber-Sleuths"
Response:

Q9. Do you think FBI was right in scanning emails to detect Ardita's intrusion?
Response:

Q10. What alternate would be better than the action taken by FBI?
Response:
 
 


Page maintained by: kwb@csee.usf.edu