Does Computer Ethics Exist?


Download Does Computer Ethics Exist?


Preview text

Presented by: Carl Arrington and Christopher Queen

What is a Hacker?
 A Hacker is a person who enjoys learning the details of computer systems and how to stretch their capabilities—as opposed to most users of computers, who prefer to learn only the minimum amount necessary.
 One who programs enthusiastically or who enjoys programming rather than just theorizing about programming

What is a Hacker?
 Recently, hacker has taken on a new meaning:
 Someone who maliciously breaks into systems for personal gain. Technically, these criminals are crackers (criminal hackers).
 Crackers break into (crack) systems with malicious intent. They are out for personal gain: fame, profit, and even revenge.
 They modify, delete, and steal critical information, often making other people miserable.

What is a Hacker?
 Most people give hacker a negative connotation.  Many malicious hackers claim that they don’t
cause damage but instead are altruistically helping others.  Many malicious hackers are electronic thieves.  Hackers go for almost any system they think they can compromise.  Some prefer prestigious, well‐protected systems, but hacking into anyone’s system increases their status in hacker circles

What is Ethical Hacking?
 Ethical hacking also known as penetration testing or white‐hat hacking involves the same tools, tricks, and techniques that hackers use, but with one major difference: Ethical hacking is legal.
 Ethical hacking is performed with the target’s permission.
 The intent of ethical hacking is to discover vulnerabilities from a hacker’s viewpoint so systems can be better secured.

What is Ethical Hacking?
 It’s part of an overall information risk management program that allows for ongoing security improvements.
 Ethical hacking can also ensure that vendors’ claims about the security of their products are legitimate.

Ethical Hacking
Commandments
 Working ethically
 Everything done as an ethical hacker must be aboveboard and must support the company’s goals. No hidden agendas are allowed
 Respecting privacy
 All information obtained during testing from Web‐application log files to clear‐text passwords must be kept private.
 Don’t use this information to snoop into confidential corporate information or private lives.
 If there’s a problem, consider sharing that information with the appropriate manager.
 Involve others in the process
 This is a “watch the watcher” system that can build trust and support your ethical hacking projects.

Can Hacking Be Ethical?
 Technology is a continually growing presence in our lives
 With this growing influence, it is beginning to affect emotions such as trust
 Who Makes the Rules?

Questions?

Sources
 Kevin Beaver ‐ Ethical Hacking for Dummies: Introduction to Ethical Hacking http://media.wiley.com/product_data/excerpt/4 X/07645578/076455784X.pdf
 Allen Bernard ‐ The Pros and Cons of Ethical Hacking http://www.cioupdate.com/trends/article.php/33 03001/The‐Pros‐and‐Cons‐of‐Ethical‐ Hacking.htm
 Marcia Wilson – Is Hacking Ethical? http://www.computerworld.com/securitytopics/s ecurity/story/0,10801,91549,00.html

Preparing to load PDF file. please wait...

0 of 0
100%
Does Computer Ethics Exist?