| 
  • If you are citizen of an European Union member nation, you may not use this service unless you are at least 16 years old.

  • You already know Dokkio is an AI-powered assistant to organize & manage your digital files & messages. Very soon, Dokkio will support Outlook as well as One Drive. Check it out today!

View
 

Chapter 8: Ethical Issues Involving Computer Security: Hacking, Hacktivism, and

Page history last edited by shelyn 14 years, 1 month ago

Chapter 8:Ethical Issues Involving Computer Security: Hacking, Hacktivism, and Counterhacking

 

Amazon Link: http://www.amazon.com/Handbook-Information-Computer-Ethics/dp/0471799599

 

What I expect to learn?

I expect to learn about Hacking Hacktivism, and Counterhacking

 

Quote:

“hacking” is used, without moral judgment, to refer to acts in which one person gains unauthorized entry to the computers of another person, and “hacker” is used to refer to someone who has committed such acts

Review:

We can identify that “hacking” is used, without moral judgment, to refer to acts in which one person gains unauthorized entry to the computers of another person, and “hacker” is used to refer to someone who has committed such acts. First, by gaining insight into the operations of existing networks, hackers develop knowledge that can be used to improve those networks. Second, the break-ins themselves call attention to security flaws that can be exploited by malicious hackers or, worse, terrorists. Hackers have also defended benign intrusions on the ground that they make use of computing resources that would otherwise go to waste. The claim that there are no morally legitimate restrictions on the free flow of content precludes there being any right to informational privacy that entitles persons to exclude others frominformation inwhich they have a reasonable expectation of privacy. Expressive conduct is subject to more stringent moral limits than those to which pure speech is subject. The justification of hacktivism entails demonstrating that its practitioners are neither “crackers”—those who break into systems for profit or vandalism—nor are they cyberterrorists—those who use computer technology with the intention of causing grave harm such as loss of life, severe economic losses, or destruction of critical infrastructure “hacktivism” can be defined as “the commission of an unauthorized digital intrusion for the purpose of expressing a political or moral position.”The term “active response” is intended to pick out digital intrusions that come in response to a hacker’s intrusion and are intended to counter it; these responses are sometimes called “counterhacking” or “hacking back.” The act of inflicting injury on another person for no other reason than to even the score is “revenge,” and revenge is generally regarded as morally wrong because it is no part of the concept of revenge that harm be inflicted to give a person his just deserts.

 

What I Learned?

  • Hacktivism
  • Counterhacking
  • Hacking 

 

Integrative Question:

  1. What is meaning of hacking?
  2. What is expressive conduct?
  3. What is hacktivism?
  4. What are the hacker ethics?
  5. What is counterhacking?

Discussion:

 

What is meaning of hacking?

“hacking” is used, without moral judgment, to refer to acts in which one person gains unauthorized entry to the computers of another person, and “hacker” is used to refer to someone who has committed such acts.

 

What are the social benefits of benign intrusions?

First, by gaining insight into the operations of existing networks, hackers develop knowledge that can be used to improve those networks. Second, the break-ins themselves call attention to security flaws that can be exploited by malicious hackers or, worse, terrorists.

 

How did hackers defended benign intrusions?

Hackers have also defended benign intrusions on the ground that they make use of

computing resources that would otherwise go to waste.

 

What does right to a free flow wants us to know?

The claim that there are no morally legitimate restrictions on the free flow of content precludes there being any right to informational privacy that entitles persons to exclude others frominformation inwhich they have a reasonable expectation of privacy.

 

what is expressive conduct?

Expressive conduct is subject to more stringent moral limits than those to which pure speech is subject.

 

What is the justification on hacktivism?

The justification of hacktivism entails demonstrating that its practitioners are neither “crackers”—those who break into systems for profit or vandalism—nor are they cyberterrorists—those who use computer technology with the intention of causing grave harm such as loss of life, severe economic losses, or destruction of critical infrastructure.

 

what is hacktivism?

“hacktivism” can be defined as “the commission of an unauthorized digital intrusion for the purpose of expressing a political or moral position.”

 

What are the havker ethics?

(1) Access to computers should be unlimited and total.

(2) All information should be free.

(3) Mistrust authority—promote decentralization.

(4) Hackers should be judged by their hacking, not by bogus criteria such as degrees, age, race, or position.

(5) You create art and beauty on a computer.

(6) Computers can change your life for the better.

 

What is counterhacking?

The term “active response” is intended to pick out digital intrusions that come in response to a hacker’s intrusion and are intended to counter it; these responses are sometimes called “counterhacking” or “hacking back.”

 

What is the deal of active response as revenge?

The act of inflicting injury on another person for no other reason than to even the score is “revenge,” and revenge is generally regarded as morally wrong because it is no part of the concept of revenge that harm be inflicted to give a person his just deserts.

 

Comments (0)

You don't have permission to comment on this page.