SlideShare uma empresa Scribd logo
1 de 5
Baixar para ler offline
How to Become a Professional Ethical
              Hacker

Cyber Trend

It has made information access easy. It is very fast. It has crossed so
many boundaries. It has created a new world, a new space and a new
culture.

A network of network – an Internet had changed a world’s information
access and communication. Search engine has played wide role in
mining data and information from Internet. Portals like Yahoo and MSN
played key roles in getting large awareness in public. They made
communication easier. Chat room – is becoming new friendship and
chitchat mechanism. No one sitting on Internet believes in restrictions
of religion, caste and countries. It has mixed up so many cultures on
new platform. It is in other terms "Cyber Culture".

Cyber Culture

Cyber culture is the culture that emerges from the use of computers
for communication and entertainment and business.

Cyber culture comprehends the human-machine social levels involved
in what was previously defined as cyberspace. Cyber culture engages
into political, philosophical and psychological issues engendered by
humans in the network.

Cyber culture Luxembourg: It is defined as "a collection of cultures and
cultural products that exist on and/or are made possible by the
Internet, along with the stories told about these cultures and cultural
products."

Cyber culture" refers specifically to new technologies in two areas:
artificial intelligence (particularly   computer   and    information
technologies) and biotechnology.... They embody the realization that
we increasingly live and make ourselves in techno-bicultural
environments structured by novel forms of science and technology.
Cyber culture is in direct relation of cyber space similar as
every culture is within boundary of a specific country.

Concept of Cyber Space

The concept of cyberspace thus evolves out of a coincidence of
developments including:

1. Philosophy that has led us to question our role and agency in
creating and understanding the world;

2. Media technologies that link that with changes in perceptions of
space, time and location in the world;

3. Art and architecture that familiarizes us with picturing and desiring
imaginary spaces, designed "to order";

4. Mathematics that creates the ability to graphically represent and
read space, time and place differently.

Culture Components

Chat Rooms: Internet Gardens

Chat rooms are rooms where people of common interests, or not
common at all, can meet up with each other, and talk over the
computer. Talking over the Internet by use of chat rooms and instant
messages can be very positive. Chat rooms give people a chance to
talk without making a first impression by eye. In other words, in chat
rooms you can’t see who you are talking to, but in face to face talking,
the person is right in front of you

Digital Libraries

Internet includes millions of web pages that provide you text in
context of information and data. One can go about conducting
research on the Internet by looking up search engines online. Some
search engines include Lycos, Yahoo, Alta Vista, and many more. To
look up information via search engines is very simple, type in the
information and then click on search. Even people with the slightest
computer knowledge can find information with almost no hassle
whatsoever.

Cyber Robbers
Privacy is not guaranteed any where on the Internet. To provide credit
card numbers, phone numbers, and other private personal information
is not safe. Email intrusion, important business information breaks up
or theft and credit card numbers intrusions are normal types of
hacking techniques used by cyber robbers. Internet is not safe
medium only because of such culture violators.

Cyber Laws

To fight against hackers and unethical behavior cyber laws are drafted.
However it depends on countries’ acceptance and rules. Yet most of
countries have shown their keen interest in following standard cyber
laws.

Cyber bullied – Victim of Unethical behavior on Internet

Internet is the perfect tool for reaching others anonymously - anytime, anyplace. There
are several ways that young people bully others online. They send e-mails or instant
messages containing insults or threats directly to a person. They may also spread hateful
comments about a person through e-mail, instant messaging or postings on Web sites and
online diaries. Cyber bulling is taken seriously in Cyber laws stating it is a crime to
communicate repeatedly with someone if your communication causes them to fear for
their own safety or the safety of others.

Cyber addiction

Psychologists are buzzing with discussion about a new type of
addiction - Internet addiction. People are seems to be on Internet for
hours without any specific purpose. "Addictions" can be healthy,
unhealthy, or a mixture of both. If you are fascinated by a hobby, feel
devoted to it, and would like to spend as much time as possible
pursuing it - this could be an outlet for learning, creativity, and self-
expression. Even in some unhealthy addictions you can find these
positive features embedded within the problem. It is also claimed by
many people regarding internet as nothing pornography and cypresses
. Cyberspace is maliciously eating your life, and when it is nourishing
it.

No body can change human mind or behavior at all. Technology is any
way tool for them. If good brain knows how best he can use
technology, evil mind understands it too. But one thing is sure for all
in cyber culture public is only human being. Behavior and success in
cyber culture depends on us only.

In other words.

"Some would argue, perhaps, that such advanced technologies may
not, after all, be of interest or indeed necessity to certain sections of
society or regions of the world. . . Such arguments, however, only
underline a tendency not only to create and perpetuate under classes
but also to assume a liberal right to speak for such constituencies.
Clearly, for billions of people around the world, cyberspace and
connectivity are not a priority. . . but surely, a technology as versatile
and increasingly domineering as that of cyber communication holds
inevitable possibilities, and consequences, for not just the minority
that presently accesses and controls it, but for many others, too" -
Oguibe

However considering Cyber culture as Robotics theory, it can be
concluded: -

"The Three Laws of Robotics (Isaac Asimov (1941))
1. A robot may not injure a human being or through inaction allow a
human being to come to harm;
2. A robot must obey the orders given it by human beings except
when such orders would conflict with the First Law;
3. A robot must protect its own existence as long as such protection
does not conflict with the First or Second Law."

Mais conteúdo relacionado

Destaque

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
ThinkNow
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 

Destaque (20)

Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 

Cyberculture

  • 1. How to Become a Professional Ethical Hacker Cyber Trend It has made information access easy. It is very fast. It has crossed so many boundaries. It has created a new world, a new space and a new culture. A network of network – an Internet had changed a world’s information access and communication. Search engine has played wide role in mining data and information from Internet. Portals like Yahoo and MSN played key roles in getting large awareness in public. They made communication easier. Chat room – is becoming new friendship and chitchat mechanism. No one sitting on Internet believes in restrictions of religion, caste and countries. It has mixed up so many cultures on new platform. It is in other terms "Cyber Culture". Cyber Culture Cyber culture is the culture that emerges from the use of computers for communication and entertainment and business. Cyber culture comprehends the human-machine social levels involved in what was previously defined as cyberspace. Cyber culture engages into political, philosophical and psychological issues engendered by humans in the network. Cyber culture Luxembourg: It is defined as "a collection of cultures and cultural products that exist on and/or are made possible by the Internet, along with the stories told about these cultures and cultural products." Cyber culture" refers specifically to new technologies in two areas: artificial intelligence (particularly computer and information technologies) and biotechnology.... They embody the realization that we increasingly live and make ourselves in techno-bicultural environments structured by novel forms of science and technology.
  • 2. Cyber culture is in direct relation of cyber space similar as every culture is within boundary of a specific country. Concept of Cyber Space The concept of cyberspace thus evolves out of a coincidence of developments including: 1. Philosophy that has led us to question our role and agency in creating and understanding the world; 2. Media technologies that link that with changes in perceptions of space, time and location in the world; 3. Art and architecture that familiarizes us with picturing and desiring imaginary spaces, designed "to order"; 4. Mathematics that creates the ability to graphically represent and read space, time and place differently. Culture Components Chat Rooms: Internet Gardens Chat rooms are rooms where people of common interests, or not common at all, can meet up with each other, and talk over the computer. Talking over the Internet by use of chat rooms and instant messages can be very positive. Chat rooms give people a chance to talk without making a first impression by eye. In other words, in chat rooms you can’t see who you are talking to, but in face to face talking, the person is right in front of you Digital Libraries Internet includes millions of web pages that provide you text in context of information and data. One can go about conducting research on the Internet by looking up search engines online. Some search engines include Lycos, Yahoo, Alta Vista, and many more. To look up information via search engines is very simple, type in the information and then click on search. Even people with the slightest computer knowledge can find information with almost no hassle whatsoever. Cyber Robbers
  • 3. Privacy is not guaranteed any where on the Internet. To provide credit card numbers, phone numbers, and other private personal information is not safe. Email intrusion, important business information breaks up or theft and credit card numbers intrusions are normal types of hacking techniques used by cyber robbers. Internet is not safe medium only because of such culture violators. Cyber Laws To fight against hackers and unethical behavior cyber laws are drafted. However it depends on countries’ acceptance and rules. Yet most of countries have shown their keen interest in following standard cyber laws. Cyber bullied – Victim of Unethical behavior on Internet Internet is the perfect tool for reaching others anonymously - anytime, anyplace. There are several ways that young people bully others online. They send e-mails or instant messages containing insults or threats directly to a person. They may also spread hateful comments about a person through e-mail, instant messaging or postings on Web sites and online diaries. Cyber bulling is taken seriously in Cyber laws stating it is a crime to
  • 4. communicate repeatedly with someone if your communication causes them to fear for their own safety or the safety of others. Cyber addiction Psychologists are buzzing with discussion about a new type of addiction - Internet addiction. People are seems to be on Internet for hours without any specific purpose. "Addictions" can be healthy, unhealthy, or a mixture of both. If you are fascinated by a hobby, feel devoted to it, and would like to spend as much time as possible pursuing it - this could be an outlet for learning, creativity, and self- expression. Even in some unhealthy addictions you can find these positive features embedded within the problem. It is also claimed by many people regarding internet as nothing pornography and cypresses . Cyberspace is maliciously eating your life, and when it is nourishing it. No body can change human mind or behavior at all. Technology is any way tool for them. If good brain knows how best he can use technology, evil mind understands it too. But one thing is sure for all in cyber culture public is only human being. Behavior and success in cyber culture depends on us only. In other words. "Some would argue, perhaps, that such advanced technologies may not, after all, be of interest or indeed necessity to certain sections of society or regions of the world. . . Such arguments, however, only underline a tendency not only to create and perpetuate under classes but also to assume a liberal right to speak for such constituencies. Clearly, for billions of people around the world, cyberspace and connectivity are not a priority. . . but surely, a technology as versatile and increasingly domineering as that of cyber communication holds inevitable possibilities, and consequences, for not just the minority that presently accesses and controls it, but for many others, too" - Oguibe However considering Cyber culture as Robotics theory, it can be concluded: - "The Three Laws of Robotics (Isaac Asimov (1941)) 1. A robot may not injure a human being or through inaction allow a human being to come to harm;
  • 5. 2. A robot must obey the orders given it by human beings except when such orders would conflict with the First Law; 3. A robot must protect its own existence as long as such protection does not conflict with the First or Second Law."