SlideShare uma empresa Scribd logo
1 de 20
Baixar para ler offline
Victoriya Poplavskaya
PHI 3270
Professor: Sophia Bishop
December 23,2013
December 23,2013
December 23,2013
December 23,2013
December 23,2013
Introduction
Living in digital world can cause positive and negative
affects on our life. On one hand it is much more
convenient to keep in touch with relatives all around
the world, and share files with people without meeting
them in person. And what about the online shopping?
Good things are always good, however there is
something called Cyber Crime.

So what is Cyber Crimes and what types of cyber
crimes do we face everyday.
Cyber Crime
“Cyber crime encompasses any criminal act
dealing with computers and networks
(called hacking). Additionally, cyber crime also
includes traditional crimes conducted through
the Internet.”[1]
Types of Cyber crimes
•

Hacking

•

Theft

•

Cyber Stalking

•

Identity Theft

•

Malicious Software

•

Child soliciting and Abuse
In this presentation I will discuss and try to
distinguish two very similar and commonly used
terms:
• Hacking

• Cracking
ethics final project
Hacking
“In the computer security context, a hacker is someone who seeks and exploits
weaknesses in a computer system or computer network. Hackers may be
motivated by a multitude of reasons, such as profit, protest, or challenge.The
subculture that has evolved around hackers is often referred to as the computer
underground and is now a known community.”[2]
Cracking on the other hand is hacking with criminal intent. A
cracker is the common term used to describe a malicious hacker.[3]

There are two main types of
cracking
•Password
•Software

cracking

cracking
Password cracking
In cryptanalysis and computer security password cracking is the
process of recovering passwords from data that have been stored in
or transmitted by a computer system. A common approach is to
repeatedly try guesses for the password.[4]
Software cracking
“Software cracking is the modification of software to remove or disable
features which are considered undesirable by the person cracking the software,
usually related to protection methods: ( copy protection, protection against the
manipulation of software), trial/demo version, serial number, hardware key, date
checks, CD check or software annoyances like and screens and adware.” [5]
How can Hackers be
distinguished from
Crackers?
“The word "hacker" gets used in a pejorative sense by journalists an awful lot. Some people think
this is perfectly reasonable; others find it offensive, and recommend an alternative term for that
meaning.” (Techrepublic) [6]
The use of the word in press and in public creates a confusion for people who are less involved in
the computer world.
Hacking is usually done by a person who knows the computer systems and is incredibly curious to
learn more about the product. Hackers do it for satisfaction and inspiration. Usually hacking can be
good , or bad. Where on the other hand Crackers can harm not only the machine that is affected
but also the personal information that is stored on the machine. As a result of that many people can
be affected because of the stolen data bases and damaged computers.
Hacking: Positive side
•

Hacking can be used to prevent a loss of information
by companies and individuals before the actually
attacked. So called cyber security ( group of hackers)
will try to attack you system to find the weakness.

•

Hackers do not actually damage or ruin the system or
machine it self.
Is hacking ethical?
•

If we will look at hacking from a Utilitarian [7] point of view, hacking
does maximizes our happiness by protecting the systems from Cracking.

•

Moreover, It stimulates the computer Geeks to create new products and
systems that are different from each other, which is an overall happiness
again, because progress is always good.

•

Hacking can be also compared to burglary. It is trespassing to the
personal space of other person. However, there is no way to clarify the
amounts of personal space online.
In 2002 on Twenty First Century Conference, a senior security
analyst for Microsoft, Steven Lipner admitted that hackers help
to develop and improve new product.
“We work very cooperatively with a lot of them (hackers) and
we will work with anybody who reports information to us that
we need to know to protect our customers. We do ask them
(hackers) when they report to keep those vulnerabilities private
until we can fix the problem, assuming there is one”.[8]
What is-an ethical hacker?
Negative side of Hacking :
Cracking
•

This is where the issue of distinguishing the hacking and
cracking really occurs. As long as the actions are done for good,
and the intent of this action was curiosity and improvement it is
hacking. But as soon as it becomes to getting profits, gathering
the information, or modifying the system, it becomes Cracking.

•

The law has no clear separation between those two types of cyber
crimes. Which in some perspective makes thing very
complicated.
Conclusion
•

It is very hard to legally or ethically distinguish
hacking from cracking. The only way to do so is to
find an intent and interest of the hacker. As well as to
analyze the results of the action. The law should be
separated for hacking and cracking.
Works Cited:
[1]
“Cyber Crime." Webopedia. N.p., n.d. Web. 23 Dec. 2013.
< http://www.webopedia.com/TERM/C/cyber_crime.html >
[2]
"Hacker (computer Security)." Wikipedia. Wikimedia Foundation, 22 Dec. 2013. Web. 23
Dec. 2013.
< http://en.wikipedia.org/wiki/Hacker_%28computer_security%29 >.
[3]
"What Is the Difference between Hacking and Cracking?" WikiAnswers. Answers, n.d.
Web. 23 Dec. 2013.
< http://wiki.answers.com/Q/What_is_the_difference_between_hacking_and_cracking >.
[4]
"Password Cracking." Wikipedia. Wikimedia Foundation, 18 Dec. 2013. Web. 23 Dec.
2013.
<http://en.wikipedia.org/wiki/Password_cracking>.
[5]
"Software Cracking." Wikipedia. Wikimedia Foundation, 20 Dec. 2013. Web. 23 Dec.
2013.
< http://en.wikipedia.org/wiki/Software_cracking >.
[6]
"Hacker vs. Cracker." TechRepublic. N.p., n.d. Web. 23 Dec. 2013. <
http://www.techrepublic.com/blog/it-security/hacker-vs-cracker/ >.
[7]
"Utilitarianism." Wikipedia. Wikimedia Foundation, 22 Dec. 2013. Web. 23 Dec. 2013.
< http://en.wikipedia.org/wiki/Utilitarianism >.
[8]
PBS. PBS, n.d. Web. 23 Dec. 2013.
<http://www.pbs.org/wgbh/pages/frontline/shows/hackers/whoare/outlaws.html>

Mais conteúdo relacionado

Mais procurados

Digital citizenship number 6
Digital citizenship number 6Digital citizenship number 6
Digital citizenship number 6Siegmeyer
 
Artificial Intelligence (AI) – Two Paths to ISO Compliance
Artificial Intelligence (AI) – Two Paths to ISO ComplianceArtificial Intelligence (AI) – Two Paths to ISO Compliance
Artificial Intelligence (AI) – Two Paths to ISO CompliancePECB
 
ISACA UAE - Importance of Human-Centric Approaches to Cyber Security
ISACA UAE - Importance of Human-Centric Approaches to Cyber SecurityISACA UAE - Importance of Human-Centric Approaches to Cyber Security
ISACA UAE - Importance of Human-Centric Approaches to Cyber SecurityDr. Lydia Kostopoulos
 
Global CISO Forum 2017: Privacy Partnership
Global CISO Forum 2017: Privacy PartnershipGlobal CISO Forum 2017: Privacy Partnership
Global CISO Forum 2017: Privacy PartnershipEC-Council
 
Introduction of Cyber Security
Introduction of Cyber SecurityIntroduction of Cyber Security
Introduction of Cyber Securitypenetration Tester
 
Symantec_2-4-5 nov 2010
Symantec_2-4-5 nov 2010Symantec_2-4-5 nov 2010
Symantec_2-4-5 nov 2010Agora Group
 
How fluently do you speak data
How fluently do you speak dataHow fluently do you speak data
How fluently do you speak dataMary Aviles
 
When Dragons Attack - Tibetan hacking
When Dragons Attack - Tibetan hackingWhen Dragons Attack - Tibetan hacking
When Dragons Attack - Tibetan hackingIron Cove
 
Hackers and Hacking a brief overview 5-26-2016
Hackers and Hacking a brief overview 5-26-2016Hackers and Hacking a brief overview 5-26-2016
Hackers and Hacking a brief overview 5-26-2016Gohsuke Takama
 
Lofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and EncryptionLofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and EncryptionSean Whalen
 
War Against Terrorism - CIO's Role
War Against Terrorism - CIO's RoleWar Against Terrorism - CIO's Role
War Against Terrorism - CIO's RoleAyodeji Rotibi
 
2020 12 nyu-workshop_cog_sec
2020 12 nyu-workshop_cog_sec2020 12 nyu-workshop_cog_sec
2020 12 nyu-workshop_cog_secSara-Jayne Terp
 

Mais procurados (20)

Digital citizenship number 6
Digital citizenship number 6Digital citizenship number 6
Digital citizenship number 6
 
Do it Best Corp. Techapalooza 2013 Presentation
Do it Best Corp. Techapalooza 2013 PresentationDo it Best Corp. Techapalooza 2013 Presentation
Do it Best Corp. Techapalooza 2013 Presentation
 
Artificial Intelligence (AI) – Two Paths to ISO Compliance
Artificial Intelligence (AI) – Two Paths to ISO ComplianceArtificial Intelligence (AI) – Two Paths to ISO Compliance
Artificial Intelligence (AI) – Two Paths to ISO Compliance
 
ISACA UAE - Importance of Human-Centric Approaches to Cyber Security
ISACA UAE - Importance of Human-Centric Approaches to Cyber SecurityISACA UAE - Importance of Human-Centric Approaches to Cyber Security
ISACA UAE - Importance of Human-Centric Approaches to Cyber Security
 
Global CISO Forum 2017: Privacy Partnership
Global CISO Forum 2017: Privacy PartnershipGlobal CISO Forum 2017: Privacy Partnership
Global CISO Forum 2017: Privacy Partnership
 
Intro
IntroIntro
Intro
 
Introduction of Cyber Security
Introduction of Cyber SecurityIntroduction of Cyber Security
Introduction of Cyber Security
 
Ransomware ly
Ransomware lyRansomware ly
Ransomware ly
 
Symantec_2-4-5 nov 2010
Symantec_2-4-5 nov 2010Symantec_2-4-5 nov 2010
Symantec_2-4-5 nov 2010
 
Hacking blockchain
Hacking blockchainHacking blockchain
Hacking blockchain
 
How fluently do you speak data
How fluently do you speak dataHow fluently do you speak data
How fluently do you speak data
 
When Dragons Attack - Tibetan hacking
When Dragons Attack - Tibetan hackingWhen Dragons Attack - Tibetan hacking
When Dragons Attack - Tibetan hacking
 
Sneaksend
SneaksendSneaksend
Sneaksend
 
Privacy
PrivacyPrivacy
Privacy
 
Hackers and Hacking a brief overview 5-26-2016
Hackers and Hacking a brief overview 5-26-2016Hackers and Hacking a brief overview 5-26-2016
Hackers and Hacking a brief overview 5-26-2016
 
Hacking (1)
Hacking (1)Hacking (1)
Hacking (1)
 
Lofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and EncryptionLofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and Encryption
 
War Against Terrorism - CIO's Role
War Against Terrorism - CIO's RoleWar Against Terrorism - CIO's Role
War Against Terrorism - CIO's Role
 
2020 12 nyu-workshop_cog_sec
2020 12 nyu-workshop_cog_sec2020 12 nyu-workshop_cog_sec
2020 12 nyu-workshop_cog_sec
 
NTXISSACSC3 - Sharing is Real! by Christy Coffey
NTXISSACSC3 - Sharing is Real! by Christy CoffeyNTXISSACSC3 - Sharing is Real! by Christy Coffey
NTXISSACSC3 - Sharing is Real! by Christy Coffey
 

Destaque (7)

Directing
Directing Directing
Directing
 
Communication
CommunicationCommunication
Communication
 
Informatica tics
Informatica ticsInformatica tics
Informatica tics
 
Viii.g.7
Viii.g.7Viii.g.7
Viii.g.7
 
Motivation
Motivation Motivation
Motivation
 
Dampak kebijakan makro ekonomi
Dampak kebijakan makro ekonomiDampak kebijakan makro ekonomi
Dampak kebijakan makro ekonomi
 
Child labour
Child labourChild labour
Child labour
 

Semelhante a ethics final project

Semelhante a ethics final project (20)

Selected advanced themes in ethical hacking and penetration testing
Selected advanced themes in ethical hacking and penetration testingSelected advanced themes in ethical hacking and penetration testing
Selected advanced themes in ethical hacking and penetration testing
 
Employee Genocide
Employee GenocideEmployee Genocide
Employee Genocide
 
THESIS-2(2)
THESIS-2(2)THESIS-2(2)
THESIS-2(2)
 
Ethical Hacking Essay
Ethical Hacking EssayEthical Hacking Essay
Ethical Hacking Essay
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Computer application lecture note-Chapter-5.pptx
Computer application lecture note-Chapter-5.pptxComputer application lecture note-Chapter-5.pptx
Computer application lecture note-Chapter-5.pptx
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Hackingppt 160730081605
Hackingppt 160730081605Hackingppt 160730081605
Hackingppt 160730081605
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Hacking
HackingHacking
Hacking
 
Hackers
HackersHackers
Hackers
 
Cyber crime &amp; law
Cyber crime &amp; lawCyber crime &amp; law
Cyber crime &amp; law
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Security and ethical hacking initiative first session
Security and ethical hacking initiative   first sessionSecurity and ethical hacking initiative   first session
Security and ethical hacking initiative first session
 

Último

Prescribed medication order and communication skills.pptx
Prescribed medication order and communication skills.pptxPrescribed medication order and communication skills.pptx
Prescribed medication order and communication skills.pptxraviapr7
 
How to Add Existing Field in One2Many Tree View in Odoo 17
How to Add Existing Field in One2Many Tree View in Odoo 17How to Add Existing Field in One2Many Tree View in Odoo 17
How to Add Existing Field in One2Many Tree View in Odoo 17Celine George
 
Quality Assurance_GOOD LABORATORY PRACTICE
Quality Assurance_GOOD LABORATORY PRACTICEQuality Assurance_GOOD LABORATORY PRACTICE
Quality Assurance_GOOD LABORATORY PRACTICESayali Powar
 
2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx
2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx
2024.03.23 What do successful readers do - Sandy Millin for PARK.pptxSandy Millin
 
General views of Histopathology and step
General views of Histopathology and stepGeneral views of Histopathology and step
General views of Histopathology and stepobaje godwin sunday
 
3.19.24 Urban Uprisings and the Chicago Freedom Movement.pptx
3.19.24 Urban Uprisings and the Chicago Freedom Movement.pptx3.19.24 Urban Uprisings and the Chicago Freedom Movement.pptx
3.19.24 Urban Uprisings and the Chicago Freedom Movement.pptxmary850239
 
Benefits & Challenges of Inclusive Education
Benefits & Challenges of Inclusive EducationBenefits & Challenges of Inclusive Education
Benefits & Challenges of Inclusive EducationMJDuyan
 
How to Use api.constrains ( ) in Odoo 17
How to Use api.constrains ( ) in Odoo 17How to Use api.constrains ( ) in Odoo 17
How to Use api.constrains ( ) in Odoo 17Celine George
 
Education and training program in the hospital APR.pptx
Education and training program in the hospital APR.pptxEducation and training program in the hospital APR.pptx
Education and training program in the hospital APR.pptxraviapr7
 
Patient Counselling. Definition of patient counseling; steps involved in pati...
Patient Counselling. Definition of patient counseling; steps involved in pati...Patient Counselling. Definition of patient counseling; steps involved in pati...
Patient Counselling. Definition of patient counseling; steps involved in pati...raviapr7
 
3.21.24 The Origins of Black Power.pptx
3.21.24  The Origins of Black Power.pptx3.21.24  The Origins of Black Power.pptx
3.21.24 The Origins of Black Power.pptxmary850239
 
How to Add a many2many Relational Field in Odoo 17
How to Add a many2many Relational Field in Odoo 17How to Add a many2many Relational Field in Odoo 17
How to Add a many2many Relational Field in Odoo 17Celine George
 
Practical Research 1 Lesson 9 Scope and delimitation.pptx
Practical Research 1 Lesson 9 Scope and delimitation.pptxPractical Research 1 Lesson 9 Scope and delimitation.pptx
Practical Research 1 Lesson 9 Scope and delimitation.pptxKatherine Villaluna
 
The Singapore Teaching Practice document
The Singapore Teaching Practice documentThe Singapore Teaching Practice document
The Singapore Teaching Practice documentXsasf Sfdfasd
 
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdfMaximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdfTechSoup
 
PISA-VET launch_El Iza Mohamedou_19 March 2024.pptx
PISA-VET launch_El Iza Mohamedou_19 March 2024.pptxPISA-VET launch_El Iza Mohamedou_19 March 2024.pptx
PISA-VET launch_El Iza Mohamedou_19 March 2024.pptxEduSkills OECD
 
Patterns of Written Texts Across Disciplines.pptx
Patterns of Written Texts Across Disciplines.pptxPatterns of Written Texts Across Disciplines.pptx
Patterns of Written Texts Across Disciplines.pptxMYDA ANGELICA SUAN
 
How to Add a New Field in Existing Kanban View in Odoo 17
How to Add a New Field in Existing Kanban View in Odoo 17How to Add a New Field in Existing Kanban View in Odoo 17
How to Add a New Field in Existing Kanban View in Odoo 17Celine George
 

Último (20)

Prescribed medication order and communication skills.pptx
Prescribed medication order and communication skills.pptxPrescribed medication order and communication skills.pptx
Prescribed medication order and communication skills.pptx
 
How to Add Existing Field in One2Many Tree View in Odoo 17
How to Add Existing Field in One2Many Tree View in Odoo 17How to Add Existing Field in One2Many Tree View in Odoo 17
How to Add Existing Field in One2Many Tree View in Odoo 17
 
Quality Assurance_GOOD LABORATORY PRACTICE
Quality Assurance_GOOD LABORATORY PRACTICEQuality Assurance_GOOD LABORATORY PRACTICE
Quality Assurance_GOOD LABORATORY PRACTICE
 
Personal Resilience in Project Management 2 - TV Edit 1a.pdf
Personal Resilience in Project Management 2 - TV Edit 1a.pdfPersonal Resilience in Project Management 2 - TV Edit 1a.pdf
Personal Resilience in Project Management 2 - TV Edit 1a.pdf
 
2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx
2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx
2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx
 
General views of Histopathology and step
General views of Histopathology and stepGeneral views of Histopathology and step
General views of Histopathology and step
 
3.19.24 Urban Uprisings and the Chicago Freedom Movement.pptx
3.19.24 Urban Uprisings and the Chicago Freedom Movement.pptx3.19.24 Urban Uprisings and the Chicago Freedom Movement.pptx
3.19.24 Urban Uprisings and the Chicago Freedom Movement.pptx
 
Benefits & Challenges of Inclusive Education
Benefits & Challenges of Inclusive EducationBenefits & Challenges of Inclusive Education
Benefits & Challenges of Inclusive Education
 
How to Use api.constrains ( ) in Odoo 17
How to Use api.constrains ( ) in Odoo 17How to Use api.constrains ( ) in Odoo 17
How to Use api.constrains ( ) in Odoo 17
 
Education and training program in the hospital APR.pptx
Education and training program in the hospital APR.pptxEducation and training program in the hospital APR.pptx
Education and training program in the hospital APR.pptx
 
Patient Counselling. Definition of patient counseling; steps involved in pati...
Patient Counselling. Definition of patient counseling; steps involved in pati...Patient Counselling. Definition of patient counseling; steps involved in pati...
Patient Counselling. Definition of patient counseling; steps involved in pati...
 
3.21.24 The Origins of Black Power.pptx
3.21.24  The Origins of Black Power.pptx3.21.24  The Origins of Black Power.pptx
3.21.24 The Origins of Black Power.pptx
 
How to Add a many2many Relational Field in Odoo 17
How to Add a many2many Relational Field in Odoo 17How to Add a many2many Relational Field in Odoo 17
How to Add a many2many Relational Field in Odoo 17
 
Practical Research 1 Lesson 9 Scope and delimitation.pptx
Practical Research 1 Lesson 9 Scope and delimitation.pptxPractical Research 1 Lesson 9 Scope and delimitation.pptx
Practical Research 1 Lesson 9 Scope and delimitation.pptx
 
Prelims of Kant get Marx 2.0: a general politics quiz
Prelims of Kant get Marx 2.0: a general politics quizPrelims of Kant get Marx 2.0: a general politics quiz
Prelims of Kant get Marx 2.0: a general politics quiz
 
The Singapore Teaching Practice document
The Singapore Teaching Practice documentThe Singapore Teaching Practice document
The Singapore Teaching Practice document
 
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdfMaximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
 
PISA-VET launch_El Iza Mohamedou_19 March 2024.pptx
PISA-VET launch_El Iza Mohamedou_19 March 2024.pptxPISA-VET launch_El Iza Mohamedou_19 March 2024.pptx
PISA-VET launch_El Iza Mohamedou_19 March 2024.pptx
 
Patterns of Written Texts Across Disciplines.pptx
Patterns of Written Texts Across Disciplines.pptxPatterns of Written Texts Across Disciplines.pptx
Patterns of Written Texts Across Disciplines.pptx
 
How to Add a New Field in Existing Kanban View in Odoo 17
How to Add a New Field in Existing Kanban View in Odoo 17How to Add a New Field in Existing Kanban View in Odoo 17
How to Add a New Field in Existing Kanban View in Odoo 17
 

ethics final project

  • 1. Victoriya Poplavskaya PHI 3270 Professor: Sophia Bishop December 23,2013 December 23,2013 December 23,2013 December 23,2013 December 23,2013
  • 2. Introduction Living in digital world can cause positive and negative affects on our life. On one hand it is much more convenient to keep in touch with relatives all around the world, and share files with people without meeting them in person. And what about the online shopping? Good things are always good, however there is something called Cyber Crime. So what is Cyber Crimes and what types of cyber crimes do we face everyday.
  • 3. Cyber Crime “Cyber crime encompasses any criminal act dealing with computers and networks (called hacking). Additionally, cyber crime also includes traditional crimes conducted through the Internet.”[1]
  • 4. Types of Cyber crimes • Hacking • Theft • Cyber Stalking • Identity Theft • Malicious Software • Child soliciting and Abuse
  • 5. In this presentation I will discuss and try to distinguish two very similar and commonly used terms: • Hacking • Cracking
  • 7. Hacking “In the computer security context, a hacker is someone who seeks and exploits weaknesses in a computer system or computer network. Hackers may be motivated by a multitude of reasons, such as profit, protest, or challenge.The subculture that has evolved around hackers is often referred to as the computer underground and is now a known community.”[2]
  • 8. Cracking on the other hand is hacking with criminal intent. A cracker is the common term used to describe a malicious hacker.[3] There are two main types of cracking •Password •Software cracking cracking
  • 9. Password cracking In cryptanalysis and computer security password cracking is the process of recovering passwords from data that have been stored in or transmitted by a computer system. A common approach is to repeatedly try guesses for the password.[4]
  • 10. Software cracking “Software cracking is the modification of software to remove or disable features which are considered undesirable by the person cracking the software, usually related to protection methods: ( copy protection, protection against the manipulation of software), trial/demo version, serial number, hardware key, date checks, CD check or software annoyances like and screens and adware.” [5]
  • 11. How can Hackers be distinguished from Crackers?
  • 12. “The word "hacker" gets used in a pejorative sense by journalists an awful lot. Some people think this is perfectly reasonable; others find it offensive, and recommend an alternative term for that meaning.” (Techrepublic) [6] The use of the word in press and in public creates a confusion for people who are less involved in the computer world. Hacking is usually done by a person who knows the computer systems and is incredibly curious to learn more about the product. Hackers do it for satisfaction and inspiration. Usually hacking can be good , or bad. Where on the other hand Crackers can harm not only the machine that is affected but also the personal information that is stored on the machine. As a result of that many people can be affected because of the stolen data bases and damaged computers.
  • 13. Hacking: Positive side • Hacking can be used to prevent a loss of information by companies and individuals before the actually attacked. So called cyber security ( group of hackers) will try to attack you system to find the weakness. • Hackers do not actually damage or ruin the system or machine it self.
  • 14. Is hacking ethical? • If we will look at hacking from a Utilitarian [7] point of view, hacking does maximizes our happiness by protecting the systems from Cracking. • Moreover, It stimulates the computer Geeks to create new products and systems that are different from each other, which is an overall happiness again, because progress is always good. • Hacking can be also compared to burglary. It is trespassing to the personal space of other person. However, there is no way to clarify the amounts of personal space online.
  • 15. In 2002 on Twenty First Century Conference, a senior security analyst for Microsoft, Steven Lipner admitted that hackers help to develop and improve new product. “We work very cooperatively with a lot of them (hackers) and we will work with anybody who reports information to us that we need to know to protect our customers. We do ask them (hackers) when they report to keep those vulnerabilities private until we can fix the problem, assuming there is one”.[8]
  • 17. Negative side of Hacking : Cracking • This is where the issue of distinguishing the hacking and cracking really occurs. As long as the actions are done for good, and the intent of this action was curiosity and improvement it is hacking. But as soon as it becomes to getting profits, gathering the information, or modifying the system, it becomes Cracking. • The law has no clear separation between those two types of cyber crimes. Which in some perspective makes thing very complicated.
  • 18. Conclusion • It is very hard to legally or ethically distinguish hacking from cracking. The only way to do so is to find an intent and interest of the hacker. As well as to analyze the results of the action. The law should be separated for hacking and cracking.
  • 19. Works Cited: [1] “Cyber Crime." Webopedia. N.p., n.d. Web. 23 Dec. 2013. < http://www.webopedia.com/TERM/C/cyber_crime.html > [2] "Hacker (computer Security)." Wikipedia. Wikimedia Foundation, 22 Dec. 2013. Web. 23 Dec. 2013. < http://en.wikipedia.org/wiki/Hacker_%28computer_security%29 >. [3] "What Is the Difference between Hacking and Cracking?" WikiAnswers. Answers, n.d. Web. 23 Dec. 2013. < http://wiki.answers.com/Q/What_is_the_difference_between_hacking_and_cracking >. [4] "Password Cracking." Wikipedia. Wikimedia Foundation, 18 Dec. 2013. Web. 23 Dec. 2013. <http://en.wikipedia.org/wiki/Password_cracking>.
  • 20. [5] "Software Cracking." Wikipedia. Wikimedia Foundation, 20 Dec. 2013. Web. 23 Dec. 2013. < http://en.wikipedia.org/wiki/Software_cracking >. [6] "Hacker vs. Cracker." TechRepublic. N.p., n.d. Web. 23 Dec. 2013. < http://www.techrepublic.com/blog/it-security/hacker-vs-cracker/ >. [7] "Utilitarianism." Wikipedia. Wikimedia Foundation, 22 Dec. 2013. Web. 23 Dec. 2013. < http://en.wikipedia.org/wiki/Utilitarianism >. [8] PBS. PBS, n.d. Web. 23 Dec. 2013. <http://www.pbs.org/wgbh/pages/frontline/shows/hackers/whoare/outlaws.html>