SlideShare una empresa de Scribd logo
1 de 20
Victoriya Poplavskaya
PHI 3270
Professor: Sophia Bishop
December 23,2013
December 23,2013
December 23,2013
December 23,2013
December 23,2013
Introduction
Living in digital world can cause positive and negative
affects on our life. On one hand it is much more
convenient to keep in touch with relatives all around
the world, and share files with people without meeting
them in person. And what about the online shopping?
Good things are always good, however there is
something called Cyber Crime.

So what is Cyber Crimes and what types of cyber
crimes do we face everyday.
Cyber Crime
“Cyber crime encompasses any criminal act
dealing with computers and networks
(called hacking). Additionally, cyber crime also
includes traditional crimes conducted through
the Internet.”[1]
Types of Cyber crimes
•

Hacking

•

Theft

•

Cyber Stalking

•

Identity Theft

•

Malicious Software

•

Child soliciting and Abuse
In this presentation I will discuss and try to
distinguish two very similar and commonly used
terms:
• Hacking

• Cracking
Hacking
“In the computer security context, a hacker is someone who seeks and exploits
weaknesses in a computer system or computer network. Hackers may be
motivated by a multitude of reasons, such as profit, protest, or challenge.The
subculture that has evolved around hackers is often referred to as the computer
underground and is now a known community.”[2]
Cracking on the other hand is hacking with criminal intent. A
cracker is the common term used to describe a malicious hacker.[3]

There are two main types of
cracking
•Password
•Software

cracking

cracking
Password cracking
In cryptanalysis and computer security password cracking is the
process of recovering passwords from data that have been stored in
or transmitted by a computer system. A common approach is to
repeatedly try guesses for the password.[4]
Software cracking
“Software cracking is the modification of software to remove or disable
features which are considered undesirable by the person cracking the software,
usually related to protection methods: ( copy protection, protection against the
manipulation of software), trial/demo version, serial number, hardware key, date
checks, CD check or software annoyances like and screens and adware.” [5]
How can Hackers be
distinguished from
Crackers?
“The word "hacker" gets used in a pejorative sense by journalists an awful lot. Some people think
this is perfectly reasonable; others find it offensive, and recommend an alternative term for that
meaning.” (Techrepublic) [6]
The use of the word in press and in public creates a confusion for people who are less involved in
the computer world.
Hacking is usually done by a person who knows the computer systems and is incredibly curious to
learn more about the product. Hackers do it for satisfaction and inspiration. Usually hacking can be
good , or bad. Where on the other hand Crackers can harm not only the machine that is affected
but also the personal information that is stored on the machine. As a result of that many people can
be affected because of the stolen data bases and damaged computers.
Hacking: Positive side
•

Hacking can be used to prevent a loss of information
by companies and individuals before the actually
attacked. So called cyber security ( group of hackers)
will try to attack you system to find the weakness.

•

Hackers do not actually damage or ruin the system or
machine it self.
Is hacking ethical?
•

If we will look at hacking from a Utilitarian [7] point of view, hacking
does maximizes our happiness by protecting the systems from Cracking.

•

Moreover, It stimulates the computer Geeks to create new products and
systems that are different from each other, which is an overall happiness
again, because progress is always good.

•

Hacking can be also compared to burglary. It is trespassing to the
personal space of other person. However, there is no way to clarify the
amounts of personal space online.
In 2002 on Twenty First Century Conference, a senior security
analyst for Microsoft, Steven Lipner admitted that hackers help
to develop and improve new product.
“We work very cooperatively with a lot of them (hackers) and
we will work with anybody who reports information to us that
we need to know to protect our customers. We do ask them
(hackers) when they report to keep those vulnerabilities private
until we can fix the problem, assuming there is one”.[8]
What is-an ethical hacker?
Negative side of Hacking :
Cracking
•

This is where the issue of distinguishing the hacking and
cracking really occurs. As long as the actions are done for good,
and the intent of this action was curiosity and improvement it is
hacking. But as soon as it becomes to getting profits, gathering
the information, or modifying the system, it becomes Cracking.

•

The law has no clear separation between those two types of cyber
crimes. Which in some perspective makes thing very
complicated.
Conclusion
•

It is very hard to legally or ethically distinguish
hacking from cracking. The only way to do so is to
find an intent and interest of the hacker. As well as to
analyze the results of the action. The law should be
separated for hacking and cracking.
Works Cited:
[1]
“Cyber Crime." Webopedia. N.p., n.d. Web. 23 Dec. 2013.
< http://www.webopedia.com/TERM/C/cyber_crime.html >
[2]
"Hacker (computer Security)." Wikipedia. Wikimedia Foundation, 22 Dec. 2013. Web. 23
Dec. 2013.
< http://en.wikipedia.org/wiki/Hacker_%28computer_security%29 >.
[3]
"What Is the Difference between Hacking and Cracking?" WikiAnswers. Answers, n.d.
Web. 23 Dec. 2013.
< http://wiki.answers.com/Q/What_is_the_difference_between_hacking_and_cracking >.
[4]
"Password Cracking." Wikipedia. Wikimedia Foundation, 18 Dec. 2013. Web. 23 Dec.
2013.
<http://en.wikipedia.org/wiki/Password_cracking>.
[5]
"Software Cracking." Wikipedia. Wikimedia Foundation, 20 Dec. 2013. Web. 23 Dec.
2013.
< http://en.wikipedia.org/wiki/Software_cracking >.
[6]
"Hacker vs. Cracker." TechRepublic. N.p., n.d. Web. 23 Dec. 2013. <
http://www.techrepublic.com/blog/it-security/hacker-vs-cracker/ >.
[7]
"Utilitarianism." Wikipedia. Wikimedia Foundation, 22 Dec. 2013. Web. 23 Dec. 2013.
< http://en.wikipedia.org/wiki/Utilitarianism >.
[8]
PBS. PBS, n.d. Web. 23 Dec. 2013.
<http://www.pbs.org/wgbh/pages/frontline/shows/hackers/whoare/outlaws.html>

Más contenido relacionado

La actualidad más candente

Digital citizenship number 6
Digital citizenship number 6Digital citizenship number 6
Digital citizenship number 6Siegmeyer
 
Artificial Intelligence (AI) – Two Paths to ISO Compliance
Artificial Intelligence (AI) – Two Paths to ISO ComplianceArtificial Intelligence (AI) – Two Paths to ISO Compliance
Artificial Intelligence (AI) – Two Paths to ISO CompliancePECB
 
ISACA UAE - Importance of Human-Centric Approaches to Cyber Security
ISACA UAE - Importance of Human-Centric Approaches to Cyber SecurityISACA UAE - Importance of Human-Centric Approaches to Cyber Security
ISACA UAE - Importance of Human-Centric Approaches to Cyber SecurityDr. Lydia Kostopoulos
 
Global CISO Forum 2017: Privacy Partnership
Global CISO Forum 2017: Privacy PartnershipGlobal CISO Forum 2017: Privacy Partnership
Global CISO Forum 2017: Privacy PartnershipEC-Council
 
Introduction of Cyber Security
Introduction of Cyber SecurityIntroduction of Cyber Security
Introduction of Cyber Securitypenetration Tester
 
Symantec_2-4-5 nov 2010
Symantec_2-4-5 nov 2010Symantec_2-4-5 nov 2010
Symantec_2-4-5 nov 2010Agora Group
 
How fluently do you speak data
How fluently do you speak dataHow fluently do you speak data
How fluently do you speak dataMary Aviles
 
When Dragons Attack - Tibetan hacking
When Dragons Attack - Tibetan hackingWhen Dragons Attack - Tibetan hacking
When Dragons Attack - Tibetan hackingIron Cove
 
Hackers and Hacking a brief overview 5-26-2016
Hackers and Hacking a brief overview 5-26-2016Hackers and Hacking a brief overview 5-26-2016
Hackers and Hacking a brief overview 5-26-2016Gohsuke Takama
 
Lofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and EncryptionLofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and EncryptionSean Whalen
 
War Against Terrorism - CIO's Role
War Against Terrorism - CIO's RoleWar Against Terrorism - CIO's Role
War Against Terrorism - CIO's RoleAyodeji Rotibi
 
2020 12 nyu-workshop_cog_sec
2020 12 nyu-workshop_cog_sec2020 12 nyu-workshop_cog_sec
2020 12 nyu-workshop_cog_secSara-Jayne Terp
 

La actualidad más candente (20)

Digital citizenship number 6
Digital citizenship number 6Digital citizenship number 6
Digital citizenship number 6
 
Do it Best Corp. Techapalooza 2013 Presentation
Do it Best Corp. Techapalooza 2013 PresentationDo it Best Corp. Techapalooza 2013 Presentation
Do it Best Corp. Techapalooza 2013 Presentation
 
Artificial Intelligence (AI) – Two Paths to ISO Compliance
Artificial Intelligence (AI) – Two Paths to ISO ComplianceArtificial Intelligence (AI) – Two Paths to ISO Compliance
Artificial Intelligence (AI) – Two Paths to ISO Compliance
 
ISACA UAE - Importance of Human-Centric Approaches to Cyber Security
ISACA UAE - Importance of Human-Centric Approaches to Cyber SecurityISACA UAE - Importance of Human-Centric Approaches to Cyber Security
ISACA UAE - Importance of Human-Centric Approaches to Cyber Security
 
Global CISO Forum 2017: Privacy Partnership
Global CISO Forum 2017: Privacy PartnershipGlobal CISO Forum 2017: Privacy Partnership
Global CISO Forum 2017: Privacy Partnership
 
Intro
IntroIntro
Intro
 
Introduction of Cyber Security
Introduction of Cyber SecurityIntroduction of Cyber Security
Introduction of Cyber Security
 
Ransomware ly
Ransomware lyRansomware ly
Ransomware ly
 
Symantec_2-4-5 nov 2010
Symantec_2-4-5 nov 2010Symantec_2-4-5 nov 2010
Symantec_2-4-5 nov 2010
 
Hacking blockchain
Hacking blockchainHacking blockchain
Hacking blockchain
 
How fluently do you speak data
How fluently do you speak dataHow fluently do you speak data
How fluently do you speak data
 
When Dragons Attack - Tibetan hacking
When Dragons Attack - Tibetan hackingWhen Dragons Attack - Tibetan hacking
When Dragons Attack - Tibetan hacking
 
Sneaksend
SneaksendSneaksend
Sneaksend
 
Privacy
PrivacyPrivacy
Privacy
 
Hackers and Hacking a brief overview 5-26-2016
Hackers and Hacking a brief overview 5-26-2016Hackers and Hacking a brief overview 5-26-2016
Hackers and Hacking a brief overview 5-26-2016
 
Hacking (1)
Hacking (1)Hacking (1)
Hacking (1)
 
Lofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and EncryptionLofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and Encryption
 
War Against Terrorism - CIO's Role
War Against Terrorism - CIO's RoleWar Against Terrorism - CIO's Role
War Against Terrorism - CIO's Role
 
2020 12 nyu-workshop_cog_sec
2020 12 nyu-workshop_cog_sec2020 12 nyu-workshop_cog_sec
2020 12 nyu-workshop_cog_sec
 
NTXISSACSC3 - Sharing is Real! by Christy Coffey
NTXISSACSC3 - Sharing is Real! by Christy CoffeyNTXISSACSC3 - Sharing is Real! by Christy Coffey
NTXISSACSC3 - Sharing is Real! by Christy Coffey
 

Destacado (7)

Directing
Directing Directing
Directing
 
Communication
CommunicationCommunication
Communication
 
Informatica tics
Informatica ticsInformatica tics
Informatica tics
 
Viii.g.7
Viii.g.7Viii.g.7
Viii.g.7
 
Motivation
Motivation Motivation
Motivation
 
Dampak kebijakan makro ekonomi
Dampak kebijakan makro ekonomiDampak kebijakan makro ekonomi
Dampak kebijakan makro ekonomi
 
Child labour
Child labourChild labour
Child labour
 

Similar a ethics final project

Selected advanced themes in ethical hacking and penetration testing
Selected advanced themes in ethical hacking and penetration testingSelected advanced themes in ethical hacking and penetration testing
Selected advanced themes in ethical hacking and penetration testingCSITiaesprime
 
Cybersecurity
CybersecurityCybersecurity
CybersecurityDiegoMtzS
 
Computer application lecture note-Chapter-5.pptx
Computer application lecture note-Chapter-5.pptxComputer application lecture note-Chapter-5.pptx
Computer application lecture note-Chapter-5.pptxgadisaAdamu
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber SecurityPriyanshu Ratnakar
 
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...PavanKumarSurala
 
Hackingppt 160730081605
Hackingppt 160730081605Hackingppt 160730081605
Hackingppt 160730081605RAKESH SHARMA
 
cybersecurity notes important points.pptx
cybersecurity notes important points.pptxcybersecurity notes important points.pptx
cybersecurity notes important points.pptxdhumaletiku
 
Security and ethical hacking initiative first session
Security and ethical hacking initiative   first sessionSecurity and ethical hacking initiative   first session
Security and ethical hacking initiative first sessionSithira Pathirana
 
GETTING STARTED WITH THE ETHICAL HACKING.pptx
GETTING STARTED WITH THE ETHICAL HACKING.pptxGETTING STARTED WITH THE ETHICAL HACKING.pptx
GETTING STARTED WITH THE ETHICAL HACKING.pptxBishalRay8
 

Similar a ethics final project (20)

Selected advanced themes in ethical hacking and penetration testing
Selected advanced themes in ethical hacking and penetration testingSelected advanced themes in ethical hacking and penetration testing
Selected advanced themes in ethical hacking and penetration testing
 
THESIS-2(2)
THESIS-2(2)THESIS-2(2)
THESIS-2(2)
 
Ethical Hacking Essay
Ethical Hacking EssayEthical Hacking Essay
Ethical Hacking Essay
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Computer application lecture note-Chapter-5.pptx
Computer application lecture note-Chapter-5.pptxComputer application lecture note-Chapter-5.pptx
Computer application lecture note-Chapter-5.pptx
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Hackingppt 160730081605
Hackingppt 160730081605Hackingppt 160730081605
Hackingppt 160730081605
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
cybersecurity notes important points.pptx
cybersecurity notes important points.pptxcybersecurity notes important points.pptx
cybersecurity notes important points.pptx
 
Hacking
HackingHacking
Hacking
 
Hackers
HackersHackers
Hackers
 
Cyber crime &amp; law
Cyber crime &amp; lawCyber crime &amp; law
Cyber crime &amp; law
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Security and ethical hacking initiative first session
Security and ethical hacking initiative   first sessionSecurity and ethical hacking initiative   first session
Security and ethical hacking initiative first session
 
GETTING STARTED WITH THE ETHICAL HACKING.pptx
GETTING STARTED WITH THE ETHICAL HACKING.pptxGETTING STARTED WITH THE ETHICAL HACKING.pptx
GETTING STARTED WITH THE ETHICAL HACKING.pptx
 

Último

Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...Amil baba
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxUmeshTimilsina1
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxPooja Bhuva
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Pooja Bhuva
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 

Último (20)

Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 

ethics final project

  • 1. Victoriya Poplavskaya PHI 3270 Professor: Sophia Bishop December 23,2013 December 23,2013 December 23,2013 December 23,2013 December 23,2013
  • 2. Introduction Living in digital world can cause positive and negative affects on our life. On one hand it is much more convenient to keep in touch with relatives all around the world, and share files with people without meeting them in person. And what about the online shopping? Good things are always good, however there is something called Cyber Crime. So what is Cyber Crimes and what types of cyber crimes do we face everyday.
  • 3. Cyber Crime “Cyber crime encompasses any criminal act dealing with computers and networks (called hacking). Additionally, cyber crime also includes traditional crimes conducted through the Internet.”[1]
  • 4. Types of Cyber crimes • Hacking • Theft • Cyber Stalking • Identity Theft • Malicious Software • Child soliciting and Abuse
  • 5. In this presentation I will discuss and try to distinguish two very similar and commonly used terms: • Hacking • Cracking
  • 6.
  • 7. Hacking “In the computer security context, a hacker is someone who seeks and exploits weaknesses in a computer system or computer network. Hackers may be motivated by a multitude of reasons, such as profit, protest, or challenge.The subculture that has evolved around hackers is often referred to as the computer underground and is now a known community.”[2]
  • 8. Cracking on the other hand is hacking with criminal intent. A cracker is the common term used to describe a malicious hacker.[3] There are two main types of cracking •Password •Software cracking cracking
  • 9. Password cracking In cryptanalysis and computer security password cracking is the process of recovering passwords from data that have been stored in or transmitted by a computer system. A common approach is to repeatedly try guesses for the password.[4]
  • 10. Software cracking “Software cracking is the modification of software to remove or disable features which are considered undesirable by the person cracking the software, usually related to protection methods: ( copy protection, protection against the manipulation of software), trial/demo version, serial number, hardware key, date checks, CD check or software annoyances like and screens and adware.” [5]
  • 11. How can Hackers be distinguished from Crackers?
  • 12. “The word "hacker" gets used in a pejorative sense by journalists an awful lot. Some people think this is perfectly reasonable; others find it offensive, and recommend an alternative term for that meaning.” (Techrepublic) [6] The use of the word in press and in public creates a confusion for people who are less involved in the computer world. Hacking is usually done by a person who knows the computer systems and is incredibly curious to learn more about the product. Hackers do it for satisfaction and inspiration. Usually hacking can be good , or bad. Where on the other hand Crackers can harm not only the machine that is affected but also the personal information that is stored on the machine. As a result of that many people can be affected because of the stolen data bases and damaged computers.
  • 13. Hacking: Positive side • Hacking can be used to prevent a loss of information by companies and individuals before the actually attacked. So called cyber security ( group of hackers) will try to attack you system to find the weakness. • Hackers do not actually damage or ruin the system or machine it self.
  • 14. Is hacking ethical? • If we will look at hacking from a Utilitarian [7] point of view, hacking does maximizes our happiness by protecting the systems from Cracking. • Moreover, It stimulates the computer Geeks to create new products and systems that are different from each other, which is an overall happiness again, because progress is always good. • Hacking can be also compared to burglary. It is trespassing to the personal space of other person. However, there is no way to clarify the amounts of personal space online.
  • 15. In 2002 on Twenty First Century Conference, a senior security analyst for Microsoft, Steven Lipner admitted that hackers help to develop and improve new product. “We work very cooperatively with a lot of them (hackers) and we will work with anybody who reports information to us that we need to know to protect our customers. We do ask them (hackers) when they report to keep those vulnerabilities private until we can fix the problem, assuming there is one”.[8]
  • 17. Negative side of Hacking : Cracking • This is where the issue of distinguishing the hacking and cracking really occurs. As long as the actions are done for good, and the intent of this action was curiosity and improvement it is hacking. But as soon as it becomes to getting profits, gathering the information, or modifying the system, it becomes Cracking. • The law has no clear separation between those two types of cyber crimes. Which in some perspective makes thing very complicated.
  • 18. Conclusion • It is very hard to legally or ethically distinguish hacking from cracking. The only way to do so is to find an intent and interest of the hacker. As well as to analyze the results of the action. The law should be separated for hacking and cracking.
  • 19. Works Cited: [1] “Cyber Crime." Webopedia. N.p., n.d. Web. 23 Dec. 2013. < http://www.webopedia.com/TERM/C/cyber_crime.html > [2] "Hacker (computer Security)." Wikipedia. Wikimedia Foundation, 22 Dec. 2013. Web. 23 Dec. 2013. < http://en.wikipedia.org/wiki/Hacker_%28computer_security%29 >. [3] "What Is the Difference between Hacking and Cracking?" WikiAnswers. Answers, n.d. Web. 23 Dec. 2013. < http://wiki.answers.com/Q/What_is_the_difference_between_hacking_and_cracking >. [4] "Password Cracking." Wikipedia. Wikimedia Foundation, 18 Dec. 2013. Web. 23 Dec. 2013. <http://en.wikipedia.org/wiki/Password_cracking>.
  • 20. [5] "Software Cracking." Wikipedia. Wikimedia Foundation, 20 Dec. 2013. Web. 23 Dec. 2013. < http://en.wikipedia.org/wiki/Software_cracking >. [6] "Hacker vs. Cracker." TechRepublic. N.p., n.d. Web. 23 Dec. 2013. < http://www.techrepublic.com/blog/it-security/hacker-vs-cracker/ >. [7] "Utilitarianism." Wikipedia. Wikimedia Foundation, 22 Dec. 2013. Web. 23 Dec. 2013. < http://en.wikipedia.org/wiki/Utilitarianism >. [8] PBS. PBS, n.d. Web. 23 Dec. 2013. <http://www.pbs.org/wgbh/pages/frontline/shows/hackers/whoare/outlaws.html>