Q2. Does unauthorized access include reading other person's data
without his/her permission?
Response:
Q3. Give an example of unauthorized access with malicious intent.
Response:
Q4. What do you think was the motive of Julio Ardita while he was
breaking into sensitive computer systems
Response:
Q5. Is it easy or difficult to keep unauthorized access hidden?
Response:
Q6. What advice would you give to your best friend found breaking
into other people's machines?
Response:
Q7. Do you know anyone who has intruded into other people's computers?
What was the motive?
Response:
Q8. What do you understand from the terms "Info-Jacking" and "Cyber-Sleuths"
Response:
Q9. Do you think FBI was right in scanning emails to detect Ardita's
intrusion?
Response:
Q10. What alternate would be better than the action taken by FBI?
Response: