Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 9

Hacking and Computer Crime

by Mill Christian C. Gunay


WHAT IS COMPUTER SECURITY AND HOW
DOES IT POSE ETHICAL ISSUES?
• Computer security, also known as cybersecurity or information technology
security, is the safeguarding of computer systems and networks against
information leakage, theft or damage to their hardware, software, or electronic
data, as well as disruption or misdirection of the services they provide.
Hacking and Computer Crime
• Hacking is the use of computer skills to gain unauthorized access to computer
resources.
• Also defined as the gaining of such unauthorized access for malicious purposes:
to steal information and software or to corrupt data or disrupt system
operations.
• Hackers are highly skilled computer users that use their talents to gain such
access, and often form communities or networks with other hackers to share
knowledge and data.
• Self identified hackers, however, make a distinction between non malicious break
ins, which they describe as hack-ing, and malicious and disruptive break-ins,
which they call cracking.
WHY IS IT CONSIDERED UNETHICAL?
NEGATIVE IMPACTS
• Physical/Digital
• Economic
• Psychological
• Reputational
• Social/societal
Principles of Hacker Ethics
• Includes convictions that information should be free
• access to computers should be unlimited and total
• activities in cyberspace cannot do harm in the real world.
Major parts of Cybercrime
• Cybertrespass

- the use of information technology to gain unauthorized access to computer


systems or password-protected websites
• Cybervandalism

- the use of information technology to unleash programs that disrupt the


operations of computer networks or corrupt data.
• Cyberpiracy

- also called software piracy, is the use of information technology to reproduce


copies of proprietary software or information or to distribute such data across a
computer network.
Major parts of Cybercrime
• Computer Fraud

- deception for personal gain in online business transactions by assuming a


false online identity or by altering or misrepresenting data.
REFERENCES
https://www.chubb.com/us-en/individuals-families/resources/6-ways-to-protect-yourself-
from-hackers.html
https://en.wikipedia.org/wiki/Computer_fraud
https://www.quora.com/What-is-cyber-vandalism
https://albertomatus.com/cyber-trespass
https://www.scu.edu/media/ethics-center/technology-ethics/IntroToCybersecurityEthics.pdf
https://
www.cybersecurityintelligence.com/blog/ethical-hackers-and-criminal-hacking-4637.html
https://www.bbc.com/news/uk-england-42733638
https://www.ox.ac.uk/news/2018-10-29-researchers-identify-negative-impacts-cyber-attacks

You might also like