Upload
odeda
View
50
Download
0
Embed Size (px)
DESCRIPTION
Group II. Members: 1. Emile BANGISHAKA ID: 1-2012-0065 2. Sylvie Gwiza ID: 1-2012-0933 3. Jerome NDAGIJIMANA ID: 1-2012-0881 4. Liliane MUKWIYE UWASE ID: 1-2012-0577 - PowerPoint PPT Presentation
Citation preview
Group B 1
Group II
Members: 1. Emile BANGISHAKA ID: 1-2012-0065 2. Sylvie Gwiza ID: 1-2012-0933
3. Jerome NDAGIJIMANA ID: 1-2012-0881 4. Liliane MUKWIYE UWASE ID: 1-2012-0577
5. Aphrodis NZABANDORA ID: 1-2012-0067 6. Joseph MAGONDO ID: 1-2012-0398 7. James MUZIGA ID: 1-2012-1004 8. Adam NDUNGUTSE ID: 1-2012-0831 9. Christian CYUBAHIRO ID: 1-2012-0445
Group B 2
Topic: Hacking
Group B 3
1. What is hacking?• Computer hacking is most common among teenagers and young adults,
• although there are many older hackers as well.
• Many hackers are true technology buffs who enjoy learning more about how computers work and
consider computer hacking an “art” form.
• They often enjoy programming and have expert-level skills in one particular program.
• For these individuals, computer hacking is a real life application of their problem-solving skills.
• It’s a chance to demonstrate their abilities, not an opportunity to harm others.
Group B 4
Hacking con’t• Computer hacking can also lead to other constructive technological developments, since many of the skills
developed from hacking apply to more mainstream chases.
• For example, former hackers Dennis Ritchie and Ken Thompson went on to create the UNIX Operating
System in the 1970s. This system had a huge impact on the development of Linux, a free UNIX-like
operating system. Shawn fanning, the creator of Napster, is another hacker well known for his
accomplishments outside of computer hacking.
• In comparison to those who develop an interest in computer hacking out of simple intellectual curiosity,
some hackers have less noble motives. Hackers who are out to steal personal information, change a
corporation’s financial data, break security codes to gain unauthorized network access, or conduct other
destructive activities are sometimes called “crackers.”
Group B 5
2. Discuss Hacker ethicsThe idea of a "hacker ethic" is perhaps best formulated in Steven Levy's 1984 book,
Hackers: Heroes of the Computer Revolution. Levy came up with six tenets:
1. Access to computers - and anything which might teach you something about the way the world work - should be unlimited and total. Always profit to the Hands-On imperative!
2. All information should be free.
3. Mistrust authority - promote decentralization.
4. Hackers should be judged by their hacking, not bogus criteria such as degrees, age, race, or position.
5. You can create art and beauty on a computer.
6. Computers can change your life for the better.
Group B 6
The goal of ethical hacking is to determine how to break in or create damage with the present programs
running, but only at the request of the company that owns the system and specifically to prevent others
from attacking it.
PHRACK, recognized as the "official" p/hacker newsletter, expanded on this principle with a
justification that can be summarized in three principles ("Doctor Crash," 1986).
1. First, hackers reject the notion that "businesses" are the only groups entitled to access and use of
modern technology.
2. Second, hacking is a major weapon in the fight against encroaching computer technology.
3. Finally, the high cost of equipment is beyond the means of most hackers, which results in the
perception that hacking and phreaking are the only recourse to spreading computer literacy to the
masses:
Hacker ethics con’t
Group B 7
Hacker ethics con’t"Hacking. It is a full time hobby, taking countless hours per week to learn, experiment, and execute
the art of penetrating multi-user computers: Why do hackers spend a good portion of their time
hacking? Some might say it is scientific curiosity, others that it is for mental stimulation. But the true
roots of hacker motives run much deeper than that.”
[http://www.wisegeek.org/what-is-computer-hacking.htm#]
Group B 8
Advantages of Ethical Hacking• The main advantage of ethical hacking is that companies are able to pay computer technicians to
attack their own system to learn where the weak spots are. This prevents identity theft and the
leaking of vital information. When a company learns where security in their system is lacking, it
allows them to implement stronger security measures.
• Ethical hacking also helps families of alive people to access accounts to see what their final viral
transmissions may have been or gain access to some accounts to close them down.
• It is also beneficial to help government entities to protect major computer systems from being
compromised in a way that national security would be an issue.
[http://project.cyberpunk.ru/idb/hacker_ethics.html]
Group B 9
3. Why is hacking unethical practice?
• hacking is itself, automatically called as Unethical or illegal. Normally, hacking can be defined as
unauthorized breach of barriers put for the protection of important data, information and people as well.
• Initially hacking was all about breaking laws and accessing unauthorized information by certain groups
of people, specializing in Information Technology and Computer Programming.
some of the major computer companies such as Apple, IBM and Microsoft comprises of large team of
dedicated, talented and professional hackers.
• These hackers, however are not breaking the laws, so far nobody can tell. For an ethical hacker, their job
includes to test the newly developed program to find gaps in security system of the program.
Group B 10
Con’t
• In simple words, an ethical hacker is a computer expert, who attacks a highly protected security system on
behalf of his owner with care and prevents the exploitation of the program that an unethical hacker might
cause harm.
• In order to test the program, ethical hacker makes use of methods as their less principled counterparts but
unethical hacker utilizes each resources and opportunity available to create malicious attack the security
system. On other hand, an unethical hacker is more of a vigilante, who is basically involve in exploiting
security vulnerabilities for some activists or person who wants to get unauthorized access to the system.
• The technical differences between Ethical and Unethical Hacking is ZERO, but what counts here is Moral
difference, which is substantive. At present, most of the companies have their own hackers. Both the
hackers seems to do well in their business, depends who hires them. It can be well termed as the fight
between Police Force and Criminals. Still, the debate will continue to go on for Ethical and Unethical
Hacking forever. [http://www.techmagnifier.com/opinion/ethical-and-unethical-hacking/]
Group B 11
4. What benefits do hackers get from breaking into websites belonging to governments and business organizations?Computer hacking diffuses global society in the digital age. The act of breaking into a secure computer network
serves many purposes, from corporate espionage to blatant theft and political insubordination. Computer
hacking affects organizations in a variety of ways -- some universal, others specific to the nature of the reason
for hacking and the business in question. The direction of hacking -- whether the organization hacks or gets
hacked -- also has an effect.
Group B 12
Interconnected Costs
According to an article published by the BBC, computer hacking cost companies in the United Kingdom
billions of pounds in 2004. In their paper "The Economics of Computer Hacking," economists Peter Lee
son and Christopher Coyne write that computer viruses created by hackers cost businesses $55 billion in
2003. In 2011, a single instance of hacking on the Play Station cost Sony more than $170 million, while
Google lost $500,000 due to hacking in 2005. According to Richard Power, editorial director of the
Computer Security Institute, single instances of hacking may cost as much as $600,000 to $7m a day for
online businesses in 2011, depending upon the revenue of the operation.
Group B 13
InformationComputer hacking often revolves around information. Organizations steal information such as research,
business strategies, financial reports and more from one another through hacking operations. Digitized
client databases also fall victim to hacking, with hackers stealing names, addresses, emails and even
financial information from organizations. Such a loss of information to a small business may cost a
competitive edge or the complete loss of a client base, effectively corruption the organization. On the
opposite end of the spectrum, a business participating in computer hacking may gain a wealth of
information providing a competitive edge and access to new client bases through the act. Personal or
political information gained through computer hacking can serve as leverage in business or political
dealings.
Group B 14
Organizational StructureThe structure of organizations before hacked, at risk for hacking or with extensive digital networks
requiring protection from hacking often reflects the threat of hacking. Businesses in such a position
employ extensive information technology (IT) teams, which work constantly on creating, updating,
developing and improving computer networks and safety to prevent or prevent hackers from
accessing information. Small businesses with limited budgets may face radical reorganization to
cope with such efforts, while new businesses anticipating such preventative measures must work
them into the initial business plan.
Group B 15
Effects on Technology OrganizationsOrganizations in the computer and technology industry may benefit or lose significantly from
instances of computer hacking. Independent companies specializing in hacking prevention software
or network development stand to benefit extremely as the impact of hacking spreads throughout the
world. Small businesses in particular may expand operations exponentially if successful in obtaining
and retaining a client base. However, a company in this field whose product or efforts fail in the face
of hacking face a ruined reputation and thereby the potential loss of a client base and an inability to
attract additional clients.
[http://smallbusiness.chron.com/effects-computer-hacking-organization-17975.html]