SlideShare une entreprise Scribd logo
1  sur  20
Victoriya Poplavskaya
PHI 3270
Professor: Sophia Bishop
December 23,2013
December 23,2013
December 23,2013
December 23,2013
December 23,2013
Introduction
Living in digital world can cause positive and negative
affects on our life. On one hand it is much more
convenient to keep in touch with relatives all around
the world, and share files with people without meeting
them in person. And what about the online shopping?
Good things are always good, however there is
something called Cyber Crime.

So what is Cyber Crimes and what types of cyber
crimes do we face everyday.
Cyber Crime
“Cyber crime encompasses any criminal act
dealing with computers and networks
(called hacking). Additionally, cyber crime also
includes traditional crimes conducted through
the Internet.”[1]
Types of Cyber crimes
•

Hacking

•

Theft

•

Cyber Stalking

•

Identity Theft

•

Malicious Software

•

Child soliciting and Abuse
In this presentation I will discuss and try to
distinguish two very similar and commonly used
terms:
• Hacking

• Cracking
Hacking
“In the computer security context, a hacker is someone who seeks and exploits
weaknesses in a computer system or computer network. Hackers may be
motivated by a multitude of reasons, such as profit, protest, or challenge.The
subculture that has evolved around hackers is often referred to as the computer
underground and is now a known community.”[2]
Cracking on the other hand is hacking with criminal intent. A
cracker is the common term used to describe a malicious hacker.[3]

There are two main types of
cracking
•Password
•Software

cracking

cracking
Password cracking
In cryptanalysis and computer security password cracking is the
process of recovering passwords from data that have been stored in
or transmitted by a computer system. A common approach is to
repeatedly try guesses for the password.[4]
Software cracking
“Software cracking is the modification of software to remove or disable
features which are considered undesirable by the person cracking the software,
usually related to protection methods: ( copy protection, protection against the
manipulation of software), trial/demo version, serial number, hardware key, date
checks, CD check or software annoyances like and screens and adware.” [5]
How can Hackers be
distinguished from
Crackers?
“The word "hacker" gets used in a pejorative sense by journalists an awful lot. Some people think
this is perfectly reasonable; others find it offensive, and recommend an alternative term for that
meaning.” (Techrepublic) [6]
The use of the word in press and in public creates a confusion for people who are less involved in
the computer world.
Hacking is usually done by a person who knows the computer systems and is incredibly curious to
learn more about the product. Hackers do it for satisfaction and inspiration. Usually hacking can be
good , or bad. Where on the other hand Crackers can harm not only the machine that is affected
but also the personal information that is stored on the machine. As a result of that many people can
be affected because of the stolen data bases and damaged computers.
Hacking: Positive side
•

Hacking can be used to prevent a loss of information
by companies and individuals before the actually
attacked. So called cyber security ( group of hackers)
will try to attack you system to find the weakness.

•

Hackers do not actually damage or ruin the system or
machine it self.
Is hacking ethical?
•

If we will look at hacking from a Utilitarian [7] point of view, hacking
does maximizes our happiness by protecting the systems from Cracking.

•

Moreover, It stimulates the computer Geeks to create new products and
systems that are different from each other, which is an overall happiness
again, because progress is always good.

•

Hacking can be also compared to burglary. It is trespassing to the
personal space of other person. However, there is no way to clarify the
amounts of personal space online.
In 2002 on Twenty First Century Conference, a senior security
analyst for Microsoft, Steven Lipner admitted that hackers help
to develop and improve new product.
“We work very cooperatively with a lot of them (hackers) and
we will work with anybody who reports information to us that
we need to know to protect our customers. We do ask them
(hackers) when they report to keep those vulnerabilities private
until we can fix the problem, assuming there is one”.[8]
What is-an ethical hacker?
Negative side of Hacking :
Cracking
•

This is where the issue of distinguishing the hacking and
cracking really occurs. As long as the actions are done for good,
and the intent of this action was curiosity and improvement it is
hacking. But as soon as it becomes to getting profits, gathering
the information, or modifying the system, it becomes Cracking.

•

The law has no clear separation between those two types of cyber
crimes. Which in some perspective makes thing very
complicated.
Conclusion
•

It is very hard to legally or ethically distinguish
hacking from cracking. The only way to do so is to
find an intent and interest of the hacker. As well as to
analyze the results of the action. The law should be
separated for hacking and cracking.
Works Cited:
[1]
“Cyber Crime." Webopedia. N.p., n.d. Web. 23 Dec. 2013.
< http://www.webopedia.com/TERM/C/cyber_crime.html >
[2]
"Hacker (computer Security)." Wikipedia. Wikimedia Foundation, 22 Dec. 2013. Web. 23
Dec. 2013.
< http://en.wikipedia.org/wiki/Hacker_%28computer_security%29 >.
[3]
"What Is the Difference between Hacking and Cracking?" WikiAnswers. Answers, n.d.
Web. 23 Dec. 2013.
< http://wiki.answers.com/Q/What_is_the_difference_between_hacking_and_cracking >.
[4]
"Password Cracking." Wikipedia. Wikimedia Foundation, 18 Dec. 2013. Web. 23 Dec.
2013.
<http://en.wikipedia.org/wiki/Password_cracking>.
[5]
"Software Cracking." Wikipedia. Wikimedia Foundation, 20 Dec. 2013. Web. 23 Dec.
2013.
< http://en.wikipedia.org/wiki/Software_cracking >.
[6]
"Hacker vs. Cracker." TechRepublic. N.p., n.d. Web. 23 Dec. 2013. <
http://www.techrepublic.com/blog/it-security/hacker-vs-cracker/ >.
[7]
"Utilitarianism." Wikipedia. Wikimedia Foundation, 22 Dec. 2013. Web. 23 Dec. 2013.
< http://en.wikipedia.org/wiki/Utilitarianism >.
[8]
PBS. PBS, n.d. Web. 23 Dec. 2013.
<http://www.pbs.org/wgbh/pages/frontline/shows/hackers/whoare/outlaws.html>

Contenu connexe

Tendances

Digital citizenship number 6
Digital citizenship number 6Digital citizenship number 6
Digital citizenship number 6Siegmeyer
 
Artificial Intelligence (AI) – Two Paths to ISO Compliance
Artificial Intelligence (AI) – Two Paths to ISO ComplianceArtificial Intelligence (AI) – Two Paths to ISO Compliance
Artificial Intelligence (AI) – Two Paths to ISO CompliancePECB
 
ISACA UAE - Importance of Human-Centric Approaches to Cyber Security
ISACA UAE - Importance of Human-Centric Approaches to Cyber SecurityISACA UAE - Importance of Human-Centric Approaches to Cyber Security
ISACA UAE - Importance of Human-Centric Approaches to Cyber SecurityDr. Lydia Kostopoulos
 
Global CISO Forum 2017: Privacy Partnership
Global CISO Forum 2017: Privacy PartnershipGlobal CISO Forum 2017: Privacy Partnership
Global CISO Forum 2017: Privacy PartnershipEC-Council
 
Introduction of Cyber Security
Introduction of Cyber SecurityIntroduction of Cyber Security
Introduction of Cyber Securitypenetration Tester
 
Symantec_2-4-5 nov 2010
Symantec_2-4-5 nov 2010Symantec_2-4-5 nov 2010
Symantec_2-4-5 nov 2010Agora Group
 
How fluently do you speak data
How fluently do you speak dataHow fluently do you speak data
How fluently do you speak dataMary Aviles
 
When Dragons Attack - Tibetan hacking
When Dragons Attack - Tibetan hackingWhen Dragons Attack - Tibetan hacking
When Dragons Attack - Tibetan hackingIron Cove
 
Hackers and Hacking a brief overview 5-26-2016
Hackers and Hacking a brief overview 5-26-2016Hackers and Hacking a brief overview 5-26-2016
Hackers and Hacking a brief overview 5-26-2016Gohsuke Takama
 
Lofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and EncryptionLofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and EncryptionSean Whalen
 
War Against Terrorism - CIO's Role
War Against Terrorism - CIO's RoleWar Against Terrorism - CIO's Role
War Against Terrorism - CIO's RoleAyodeji Rotibi
 
2020 12 nyu-workshop_cog_sec
2020 12 nyu-workshop_cog_sec2020 12 nyu-workshop_cog_sec
2020 12 nyu-workshop_cog_secSara-Jayne Terp
 

Tendances (20)

Digital citizenship number 6
Digital citizenship number 6Digital citizenship number 6
Digital citizenship number 6
 
Do it Best Corp. Techapalooza 2013 Presentation
Do it Best Corp. Techapalooza 2013 PresentationDo it Best Corp. Techapalooza 2013 Presentation
Do it Best Corp. Techapalooza 2013 Presentation
 
Artificial Intelligence (AI) – Two Paths to ISO Compliance
Artificial Intelligence (AI) – Two Paths to ISO ComplianceArtificial Intelligence (AI) – Two Paths to ISO Compliance
Artificial Intelligence (AI) – Two Paths to ISO Compliance
 
ISACA UAE - Importance of Human-Centric Approaches to Cyber Security
ISACA UAE - Importance of Human-Centric Approaches to Cyber SecurityISACA UAE - Importance of Human-Centric Approaches to Cyber Security
ISACA UAE - Importance of Human-Centric Approaches to Cyber Security
 
Global CISO Forum 2017: Privacy Partnership
Global CISO Forum 2017: Privacy PartnershipGlobal CISO Forum 2017: Privacy Partnership
Global CISO Forum 2017: Privacy Partnership
 
Intro
IntroIntro
Intro
 
Introduction of Cyber Security
Introduction of Cyber SecurityIntroduction of Cyber Security
Introduction of Cyber Security
 
Ransomware ly
Ransomware lyRansomware ly
Ransomware ly
 
Symantec_2-4-5 nov 2010
Symantec_2-4-5 nov 2010Symantec_2-4-5 nov 2010
Symantec_2-4-5 nov 2010
 
Hacking blockchain
Hacking blockchainHacking blockchain
Hacking blockchain
 
How fluently do you speak data
How fluently do you speak dataHow fluently do you speak data
How fluently do you speak data
 
When Dragons Attack - Tibetan hacking
When Dragons Attack - Tibetan hackingWhen Dragons Attack - Tibetan hacking
When Dragons Attack - Tibetan hacking
 
Sneaksend
SneaksendSneaksend
Sneaksend
 
Privacy
PrivacyPrivacy
Privacy
 
Hackers and Hacking a brief overview 5-26-2016
Hackers and Hacking a brief overview 5-26-2016Hackers and Hacking a brief overview 5-26-2016
Hackers and Hacking a brief overview 5-26-2016
 
Hacking (1)
Hacking (1)Hacking (1)
Hacking (1)
 
Lofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and EncryptionLofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and Encryption
 
War Against Terrorism - CIO's Role
War Against Terrorism - CIO's RoleWar Against Terrorism - CIO's Role
War Against Terrorism - CIO's Role
 
2020 12 nyu-workshop_cog_sec
2020 12 nyu-workshop_cog_sec2020 12 nyu-workshop_cog_sec
2020 12 nyu-workshop_cog_sec
 
NTXISSACSC3 - Sharing is Real! by Christy Coffey
NTXISSACSC3 - Sharing is Real! by Christy CoffeyNTXISSACSC3 - Sharing is Real! by Christy Coffey
NTXISSACSC3 - Sharing is Real! by Christy Coffey
 

En vedette

En vedette (7)

Directing
Directing Directing
Directing
 
Communication
CommunicationCommunication
Communication
 
Informatica tics
Informatica ticsInformatica tics
Informatica tics
 
Viii.g.7
Viii.g.7Viii.g.7
Viii.g.7
 
Motivation
Motivation Motivation
Motivation
 
Dampak kebijakan makro ekonomi
Dampak kebijakan makro ekonomiDampak kebijakan makro ekonomi
Dampak kebijakan makro ekonomi
 
Child labour
Child labourChild labour
Child labour
 

Similaire à ethics final project

Selected advanced themes in ethical hacking and penetration testing
Selected advanced themes in ethical hacking and penetration testingSelected advanced themes in ethical hacking and penetration testing
Selected advanced themes in ethical hacking and penetration testingCSITiaesprime
 
Cybersecurity
CybersecurityCybersecurity
CybersecurityDiegoMtzS
 
Computer application lecture note-Chapter-5.pptx
Computer application lecture note-Chapter-5.pptxComputer application lecture note-Chapter-5.pptx
Computer application lecture note-Chapter-5.pptxgadisaAdamu
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber SecurityPriyanshu Ratnakar
 
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...PavanKumarSurala
 
Hackingppt 160730081605
Hackingppt 160730081605Hackingppt 160730081605
Hackingppt 160730081605RAKESH SHARMA
 
cybersecurity notes important points.pptx
cybersecurity notes important points.pptxcybersecurity notes important points.pptx
cybersecurity notes important points.pptxdhumaletiku
 
Security and ethical hacking initiative first session
Security and ethical hacking initiative   first sessionSecurity and ethical hacking initiative   first session
Security and ethical hacking initiative first sessionSithira Pathirana
 
GETTING STARTED WITH THE ETHICAL HACKING.pptx
GETTING STARTED WITH THE ETHICAL HACKING.pptxGETTING STARTED WITH THE ETHICAL HACKING.pptx
GETTING STARTED WITH THE ETHICAL HACKING.pptxBishalRay8
 

Similaire à ethics final project (20)

Selected advanced themes in ethical hacking and penetration testing
Selected advanced themes in ethical hacking and penetration testingSelected advanced themes in ethical hacking and penetration testing
Selected advanced themes in ethical hacking and penetration testing
 
THESIS-2(2)
THESIS-2(2)THESIS-2(2)
THESIS-2(2)
 
Ethical Hacking Essay
Ethical Hacking EssayEthical Hacking Essay
Ethical Hacking Essay
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Computer application lecture note-Chapter-5.pptx
Computer application lecture note-Chapter-5.pptxComputer application lecture note-Chapter-5.pptx
Computer application lecture note-Chapter-5.pptx
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Hackingppt 160730081605
Hackingppt 160730081605Hackingppt 160730081605
Hackingppt 160730081605
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
cybersecurity notes important points.pptx
cybersecurity notes important points.pptxcybersecurity notes important points.pptx
cybersecurity notes important points.pptx
 
Hacking
HackingHacking
Hacking
 
Hackers
HackersHackers
Hackers
 
Cyber crime &amp; law
Cyber crime &amp; lawCyber crime &amp; law
Cyber crime &amp; law
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Security and ethical hacking initiative first session
Security and ethical hacking initiative   first sessionSecurity and ethical hacking initiative   first session
Security and ethical hacking initiative first session
 
GETTING STARTED WITH THE ETHICAL HACKING.pptx
GETTING STARTED WITH THE ETHICAL HACKING.pptxGETTING STARTED WITH THE ETHICAL HACKING.pptx
GETTING STARTED WITH THE ETHICAL HACKING.pptx
 

Dernier

Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfChris Hunter
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docxPoojaSen20
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.MateoGardella
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 

Dernier (20)

Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 

ethics final project

  • 1. Victoriya Poplavskaya PHI 3270 Professor: Sophia Bishop December 23,2013 December 23,2013 December 23,2013 December 23,2013 December 23,2013
  • 2. Introduction Living in digital world can cause positive and negative affects on our life. On one hand it is much more convenient to keep in touch with relatives all around the world, and share files with people without meeting them in person. And what about the online shopping? Good things are always good, however there is something called Cyber Crime. So what is Cyber Crimes and what types of cyber crimes do we face everyday.
  • 3. Cyber Crime “Cyber crime encompasses any criminal act dealing with computers and networks (called hacking). Additionally, cyber crime also includes traditional crimes conducted through the Internet.”[1]
  • 4. Types of Cyber crimes • Hacking • Theft • Cyber Stalking • Identity Theft • Malicious Software • Child soliciting and Abuse
  • 5. In this presentation I will discuss and try to distinguish two very similar and commonly used terms: • Hacking • Cracking
  • 6.
  • 7. Hacking “In the computer security context, a hacker is someone who seeks and exploits weaknesses in a computer system or computer network. Hackers may be motivated by a multitude of reasons, such as profit, protest, or challenge.The subculture that has evolved around hackers is often referred to as the computer underground and is now a known community.”[2]
  • 8. Cracking on the other hand is hacking with criminal intent. A cracker is the common term used to describe a malicious hacker.[3] There are two main types of cracking •Password •Software cracking cracking
  • 9. Password cracking In cryptanalysis and computer security password cracking is the process of recovering passwords from data that have been stored in or transmitted by a computer system. A common approach is to repeatedly try guesses for the password.[4]
  • 10. Software cracking “Software cracking is the modification of software to remove or disable features which are considered undesirable by the person cracking the software, usually related to protection methods: ( copy protection, protection against the manipulation of software), trial/demo version, serial number, hardware key, date checks, CD check or software annoyances like and screens and adware.” [5]
  • 11. How can Hackers be distinguished from Crackers?
  • 12. “The word "hacker" gets used in a pejorative sense by journalists an awful lot. Some people think this is perfectly reasonable; others find it offensive, and recommend an alternative term for that meaning.” (Techrepublic) [6] The use of the word in press and in public creates a confusion for people who are less involved in the computer world. Hacking is usually done by a person who knows the computer systems and is incredibly curious to learn more about the product. Hackers do it for satisfaction and inspiration. Usually hacking can be good , or bad. Where on the other hand Crackers can harm not only the machine that is affected but also the personal information that is stored on the machine. As a result of that many people can be affected because of the stolen data bases and damaged computers.
  • 13. Hacking: Positive side • Hacking can be used to prevent a loss of information by companies and individuals before the actually attacked. So called cyber security ( group of hackers) will try to attack you system to find the weakness. • Hackers do not actually damage or ruin the system or machine it self.
  • 14. Is hacking ethical? • If we will look at hacking from a Utilitarian [7] point of view, hacking does maximizes our happiness by protecting the systems from Cracking. • Moreover, It stimulates the computer Geeks to create new products and systems that are different from each other, which is an overall happiness again, because progress is always good. • Hacking can be also compared to burglary. It is trespassing to the personal space of other person. However, there is no way to clarify the amounts of personal space online.
  • 15. In 2002 on Twenty First Century Conference, a senior security analyst for Microsoft, Steven Lipner admitted that hackers help to develop and improve new product. “We work very cooperatively with a lot of them (hackers) and we will work with anybody who reports information to us that we need to know to protect our customers. We do ask them (hackers) when they report to keep those vulnerabilities private until we can fix the problem, assuming there is one”.[8]
  • 17. Negative side of Hacking : Cracking • This is where the issue of distinguishing the hacking and cracking really occurs. As long as the actions are done for good, and the intent of this action was curiosity and improvement it is hacking. But as soon as it becomes to getting profits, gathering the information, or modifying the system, it becomes Cracking. • The law has no clear separation between those two types of cyber crimes. Which in some perspective makes thing very complicated.
  • 18. Conclusion • It is very hard to legally or ethically distinguish hacking from cracking. The only way to do so is to find an intent and interest of the hacker. As well as to analyze the results of the action. The law should be separated for hacking and cracking.
  • 19. Works Cited: [1] “Cyber Crime." Webopedia. N.p., n.d. Web. 23 Dec. 2013. < http://www.webopedia.com/TERM/C/cyber_crime.html > [2] "Hacker (computer Security)." Wikipedia. Wikimedia Foundation, 22 Dec. 2013. Web. 23 Dec. 2013. < http://en.wikipedia.org/wiki/Hacker_%28computer_security%29 >. [3] "What Is the Difference between Hacking and Cracking?" WikiAnswers. Answers, n.d. Web. 23 Dec. 2013. < http://wiki.answers.com/Q/What_is_the_difference_between_hacking_and_cracking >. [4] "Password Cracking." Wikipedia. Wikimedia Foundation, 18 Dec. 2013. Web. 23 Dec. 2013. <http://en.wikipedia.org/wiki/Password_cracking>.
  • 20. [5] "Software Cracking." Wikipedia. Wikimedia Foundation, 20 Dec. 2013. Web. 23 Dec. 2013. < http://en.wikipedia.org/wiki/Software_cracking >. [6] "Hacker vs. Cracker." TechRepublic. N.p., n.d. Web. 23 Dec. 2013. < http://www.techrepublic.com/blog/it-security/hacker-vs-cracker/ >. [7] "Utilitarianism." Wikipedia. Wikimedia Foundation, 22 Dec. 2013. Web. 23 Dec. 2013. < http://en.wikipedia.org/wiki/Utilitarianism >. [8] PBS. PBS, n.d. Web. 23 Dec. 2013. <http://www.pbs.org/wgbh/pages/frontline/shows/hackers/whoare/outlaws.html>