Hacker Ethics Kim Bissett Sabrina Short. Hacker Ethic: In General  Freedom of Information The web is not physical; it couldn’t be interpreted as property,

Slides:



Advertisements
Similar presentations
By Andy Scott, Michael Murray and Adam Kanopa
Advertisements

Implications and Security Issues of the Internet By Neelesh Patel.
 Someone who exercises playful ingenuity  Misusers of the internet who try to obtain or corrupt information; people who try to prevent it.
Crimes Against Property 1.Grab an iPad 2. Tap on the Big L app 3. Log into the blog (log-ins) 4. Answer the Crimes Against Property Questions.
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Crime and Security in the Networked Economy Part 4.
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS
Computer Threats I can understand computer threats and how to protect myself from these threats.
Computers and Crime Breaking and Entering Eavesdropping Harassment Vandalism Destruction of Private Property Possession of Stolen Goods Theft.
Hectic Ethics Computer Applications Mrs. Wohleb. Objectives Students will be able to: Describe ethical considerations resulting from technological advances.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Computer Crime and Digital Forensics.
1 CHAPTER 1 POLITICS. 2 Definitions Of The Word Hacker Hacker – someone who has achieved some level of expertise with a computer Hacker – someone who.
Security, Privacy, and Ethics Online Computer Crimes.
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
Ethics in a Computing Culture
5.1 © 2006 by Prentice Hall Ethical and Social Issues in the Digital Firm.
Copyright © 2002 Pearson Education, Inc. Slide 5-1 PERTEMUAN 8.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Ethics and Privacy. Utilitarian approach: an ethical action is the one that provides the most good or does the least harm. Rights approach: ethical action.
Acceptable Use Policy (AUP) What does it actually say? Why is it necessary?
Trust, Safety, & Reliability Part 2 MALICE. Malware Malware: short for “malicious software” Hackers: people who write and deploy malware Worm: program.
L o g o Types of Computer Crime Zhuravlev Alexander 326 MSLU.
The Legal Framework Can you work out which slide each bullet point should go on?!
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Issues Raised by ICT.
Are you safe? Alyssa Caputo & Niki Labella Itech 1101 Dr. Nagel.
Chapter 11 Security and Privacy: Computers and the Internet.
Possible WebQuest type links  
EthicsEthics, Rules, and LawsRulesLaws Using the computer appropriat ely.
Copyright © 2008 by West Legal Studies in Business A Division of Thomson Learning Chapter 11 Cyberlaw Twomey Jennings Anderson’s Business Law and the Legal.
Cyber Crimes.
Viruses.
Digital Citizenship By: Miranda Scorver.
Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-1 ACS 1803 Lecture Outline 15 ETHICS AND COMPUTER CRIME.
Chapter 10.  Two groups of crimes against property.  Crimes in which property is destroyed Arson, vandalism  Crimes in which property is taken against.
Cyber crime & Security Prepared by : Rughani Zarana.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
Computer crime University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot March 2011 March 2011 ITSS 4201 Internet Insurance and.
Unethical use of Computers and Networks
Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time.
The way to avoid being trap into cyber crime. What is cyber crime? The Department of Justice categorizes computer crime in three ways: 1. The computer.
The Computer Misuse Act of1990 The Copyright, Designs & Patents Act of
 Internet crime is, Any crime or illegal activity committed online or through the internet.
Lecture 8 ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS (continued) © Prentice Hall
Ethics and Privacy. 3.1 Ethical Issues 3.2 Privacy.
Computer crimes.
CONTROLLING INFORMATION SYSTEMS
Acceptable Use Policy (AUP) What does it actually say? Why is it necessary?
Chapter 11 CYBERLAW. 2 Cyberlaw is not a new body of laws. Cyberlaw is not a new body of laws. Cyberlaw is the application of existing laws and legal.
Comprehensive Volume, 18 th Edition Chapter 11: Cyberlaw.
Security Debate Why cracking should be criminalized.
ICT and the Law Mr Conti. Did you see anything wrong with that? Most people wouldn’t want that sort of information posted in a public place. Why? Because.
Computer Laws Data Protection Act 1998 Computer Misuse Act 1990.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Whats it all about?.  C omputer crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Communication Technology and Society STS 322 Lecture 5 Cyberactivisim Huriye Aygören.
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
Cyber crimes is the most popular news we come across daily In good olden days there were no development in the usage of computers as we have now As.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Moral, Ethical, legal and cultural issues How technical innovation leads to moral, ethical, legal and cultural issues How our own moral and ethical beliefs.
Chapter 11 crime and security in the networked economy
Five Unethical Uses of Computers
A Gift of Fire Third edition Sara Baase
HOW DO I KEEP MY COMPUTER SAFE?
Computer Misuse Act 1990 GCSE ICT.
Communication Technology in a Changing World
Presentation transcript:

Hacker Ethics Kim Bissett Sabrina Short

Hacker Ethic: In General  Freedom of Information The web is not physical; it couldn’t be interpreted as property, so it can be accessed by the public The web is not physical; it couldn’t be interpreted as property, so it can be accessed by the public  Security/Privacy Hackers do not want a real-life Big Brother society (from Orwell’s 1984). During the 80s, they discovered a major flaw in a credit firm, where the general public did not know that the firm was collecting their information Hackers do not want a real-life Big Brother society (from Orwell’s 1984). During the 80s, they discovered a major flaw in a credit firm, where the general public did not know that the firm was collecting their information

Hackers do have ethics!  Hackers maintain a trust system; the subculture operates in a tight network  Hackers are not entirely good, nor are they just as bad.  Intentions are based on utilitarianism (Mills)

Boundaries in the Hacker Ethic  They can target government and corporate systems, but not those of an individual or a nonprofit organization. The cause of the organization is key.  The hackers should share information with others within the group. They cannot brag, expose their knowledge to the outside world, spy on users, or trash systems.

Kevin Mitnick  Hacked into the NORAD system in the 1980s  Convicted and sent into prison on two occasions (1988 and 1995)  On the second time, Mitnick broke into an system (not known if he was spying on it, which would violate the hacker ethics.)  If he was caught the first time, Mitnick should have kept a lower profile.  Hackers get exposed to the mainstream, mostly by the government, when they disregard the secrecy set forth by the hacker ethic.

Cyberactivism and Hacktivism  Cyberactivism is a form of protest that alerts society of social problems, such as poverty, through listservs, virtual sit-ins, and creating websites to attract the attention of the public.  The computer is proving to be a new medium for the 21 st century.

Cyberactivism and Hacktivism 2  Hacktivism is the intentional vandalism of websites that do not support or alert the attention of social problems.  Such political clash can cause jeopardy in national identity.  This is an extreme form of cyberactivism, therefore it is not practiced as much.  New protest techniques used in the WTO Protests,Battle in Seattle, in 1999.

Kant’s Philosophy German philosopher Immanuel Kant ( ) –determined by the action rather than the intent or outcome. –moral ideal that action out weighs consequence. –All actions should be guided by moral laws, and these laws are universal.

Duty is what counts! what we want is of no importance; duty is what counts. –Hacking into systems to gain knowledge of the software or to point out flaws is wrong, even if no damage is done to the system. Breaking and Entering- if you break into someone’s house, but don’t take anything or break anything you are still committing a crime. –Taking away a person’s sense of security.

information IS property According to United Kingdom, with the Criminal Damage Act of –Offender in the UK was convicted of property damage even though the property was not tangible and the damage could only be determined by the machine. The Computer Misuse Act of 1990 –“unauthorized access” –“data modification” – makes crimes easier to prosecute.

Public Information Some information on the internet is made accessible to the public. –but should not be destroyed or edited without authorization. Other information that is not purposefully made accessible – Account numbers and personal information should not be sought after regardless of one’s intentions.

International Legislation International groups like the United Nations and the Council of Europe are writing legislation that applies internationally. Three types of Cybercrime as using a computer as a: –target- spreading viruses –tool- using a computer to commit traditional crimes such as credit card fraud –accessory- to store illegal or stolen information.

Freedom of Speech Hacktivism violates people’s first amendment rights of Freedom of Speech. –instead create you own website or blog rather than editing the site of a political group. According to Kant: no ones rights should be taken at the expense of another’s because all of mankind is equal.

Hidden Subculture Hackers design this subculture and trust system so they don’t get caught. –keep a low profile –don’t brag about what you are doing to people outside of the network –don’t narc on a fellow hacker if you are caught Why? –hackers know what they are doing is wrong and they develop a system of “cultural norms” to avoid prosecution.

what do YOU think?  Hacking into government systems to point out security flaws without harm to the system?  Ethical?  Not Ethical?  Hacking into a home computer to point out security flaws?  Ethical?  Not Ethical?

what do YOU think?  A graduate student specializing in computer security creates a website similar to Northwest Airlines to demonstrate that terrorists can make fake boarding passes.  Ethical?  Not ethical?

what do YOU think?  A data collecting company claims to keep certain information private, such as SSN and account numbers. A hacker discovers that the company did not keep its promise. The private information is actually published on the report. The hacker makes his findings public in a news outlet.  Ethical?  Not ethical?

what do YOU think?  Hacking into the website of a political candidate and editing information because you disagree with his position?  Ethical?  Not Ethical?