Computer Ethics.hackers and Hecker tayps. Computer Hecker and Hecker tayps. What is White hat. What is black hat Hecker. What is Grey hat. Hacker WHAT IS Elite hacker. What is Hacktivist.

 Computer Ethics










Ethics deals with placing a “value” on acts according to whether they are “good” or 

“bad”. Every society has its rules about whether certain acts are ethical or not. These 

rules have been established as a result of consensus in society and are often written 

into laws.

When computers first began to be used in society at large, the absence of ethical 

standards about their use and related issues caused some problems. However, as their 

use became widespread in every facet of our lives, discussions in computer ethics 

resulted in some kind of a consensus. Today, many of these rules have been formulated 

as laws, either national or international. Computer crimes and computer fraud are now 

common terms. There are laws against them, and everyone is responsible for knowing 

what constitutes computer crime and computer fraud.

The Ten Commandments

The Ten Commandments of computer ethics have been defined by the Computer Ethics 

Institute. 

1) Thou shalt not use a computer to harm other people: 

2) Thou shalt not interfere with other people's computer work: 

3) Thou shalt not snoop around in other people's files: 

4) Thou shalt not use a computer to steal: 

5) Thou shalt not use a computer to bear false witness: 

6) Thou shalt not use or copy software for which you have not paid: 

7) Thou shalt not use other people's computer resources without authorization: 

8) Thou shalt not appropriate other people's intellectual output: 

9) Thou shalt think about the social consequences of the program you write:

10) Thou shalt use a computer in ways that show consideration and respect:

On the flip side of the coin computer hackers have their own set of ethics. Some but not

all of their ethics go directly against the ethics set in place by the Computer Ethics

Institute.

The idea of a "hacker ethic" is perhaps best formulated in Steven Levy's 1984 book,

Hackers: Heroes of the Computer Revolution. Levy came up with six tenets:

1) Access to computers - and anything which might teach you something about the way

the world works - should be unlimited and total. Always yield to the Hands-On

imperative!

2) All information should be free.

3) Mistrust authority - promote decentralization.

4) Hackers should be judged by their hacking, not bogus criteria such as degrees, age,

race, or position.

5) You can create art and beauty on a computer.

6) Computers can change your life for the better.

Hackers

A hacker is a slang term for a computer enthusiast, i.e., a person who enjoys learning

programming languages and computer systems and can often be considered an expert

on the subject(s). Among professional programmers, depending on how it used, the

term can be either complimentary or derogatory, although it is developing an

increasingly derogatory connotation.

The pejorative sense of hacker is becoming more prominent largely because the popular press has

cooped the term to refer to individuals who gain unauthorized access to computer systems for the

purpose of stealing and corrupting data. Hackers, themselves, maintain that the proper term for such

individuals is cracker.

Among hackers there are also different classifications and within these classifications

there are different attitudes and views as to what they do and what a hacker is.

White hat

A white hat hacker breaks security for non-malicious reasons, perhaps to test their own

security system or while working for a security company which makes security software.

The term "white hat" in Internet slang refers to an ethical hacker. This classification also

includes individuals who perform penetration tests and vulnerability assessments within

a contractual agreement. The EC-Council, (Moore) also known as the International

Council of Electronic Commerce Consultants, is one of those organizations that have

developed certifications, course-ware, classes, and online training covering the diverse

arena of Ethical Hacking (Wilhelm).

Black hat

A "black hat" hacker is a hacker who "violates computer security for little reason beyond

maliciousness or for personal gain" (Moore). Black hat hackers form the stereotypical,

illegal hacking groups often portrayed in popular culture, and are "the epitome of all that

the public fears in a computer criminal” (Moore). Black hat hackers break into secure

networks to destroy data or make the network unusable for those who are authorized to

use the network.

Grey hat

A grey hat hacker is a combination of a black hat and a white hat hacker. A grey hat

hacker may surf the internet and hack into a computer system for the sole purpose of

notifying the administrator that their system has a security defect, for example. Then

they may offer to correct the defect for a fee (Moore)

Elite hacker

A social status among hackers, elite is used to describe the most skilled. Newly

discovered exploits will circulate among these hackers. Elite groups such as Masters of

Deception conferred a kind of credibility on their members (Thomas)

Script kiddie

A script kiddie (also known as a skid or skiddie) is a non-expert who breaks into

computer systems by using pre-packaged automated tools written by others, usually

with little understanding of the underlying concept—hence the term script (i.e. a

prearranged plan or set of activities) kiddie (i.e. kid, child—an individual lacking

knowledge and experience, immature) (Andress).

Neophyte

A neophyte, "n00b", or "newbie" is someone who is new to hacking or phreaking and

has almost no knowledge or experience of the workings of technology, and hacking

(Moore).

Hacktivist

A hacktivist is a hacker who utilizes technology to announce a social, ideological,

religious, or political message. In general, most hacktivism involves website defacement

or denial-of-service attacks.

Organized criminal gangs

Groups of hackers that carry out organized criminal activities for profit (Chabrow).


Intellectual             Property

One of the more controversial areas of computer ethics concerns the intellectual

property rights connected with software ownership. Some people, like Richard Stallman

who started the Free Software Foundation, believe that software ownership should not

be allowed at all. He claims that all information should be free, and all programs should

be available for copying, studying and modifying by anyone who wishes to do so

(Stallman). Others argue that software companies or programmers would not invest

weeks and months of work and significant funds in the development of software if they

could not get the investment back in the form of license fees or sales (Johnson). Today's

software industry is a multibillion dollar part of the economy; and software companies

claim to lose billions of dollars per year through illegal copying (“software piracy”). Many

people think that software should be own-able, but “casual copying” of personally

owned programs for one's friends should also be permitted (Nissenbaum). The software

industry claims that millions of dollars in sales are lost because of such copying.

Ownership is a complex matter, since there are several different aspects of software

that can be owned and three different types of ownership: copyrights, trade secrets, and

patents. One can own the following aspects of a program:

1. The “source code” which is written by the programmer(s) in a high-level

computer language like Java or C++.

2. The “object code”, which is a machine-language translation of the source

code.

3. The “algorithm”, which is the sequence of machine commands that the

source code and object code represent.

4. The “look and feel” of a program, which is the way the program appears

on the screen and interfaces with users.

A very controversial issue today is owning a patent on a computer algorithm. A patent

provides an exclusive monopoly on the use of the patented item, so the owner of an

algorithm can deny others use of the mathematical formulas that are part of the

algorithm. Mathematicians and scientists are outraged, claiming that algorithm patents

effectively remove parts of mathematics from the public domain, and thereby threaten to

cripple science. In addition, running a preliminary “patent search” to make sure that your

“new” program does not violate anyone's software patent is a costly and time-

consuming process. As a result, only very large companies with big budgets can afford

to run such a search. This effectively eliminates many small software companies, stifling

competition and decreasing the variety of programs available to the society (The

League for Programming Freedom)



Censorship

Accessibility, censorship and filtering bring up many ethical issues that have several
branches in cyber ethics. Many questions have arisen which continue to challenge our
understanding of privacy, security and our participation in society. Throughout the
centuries mechanisms have been constructed in the name of protection and security.
Today the applications are in the form of software that filters domains and content so
that they may not be easily accessed or obtained without elaborate circumvention or on
a personal and business level through free or content-control software. Internet
censorship and filtering are used to control or suppress the publishing or accessing of
information. The legal issues are similar to off-line censorship and filtering. The same
arguments that apply to offline censorship and filtering apply to online censorship and
filtering; whether people are better off with free access to information or should be
protected from what is considered by a governing body as harmful, indecent or illicit.
The fear of access by minors drives much of the concern and many online advocate
groups have sprung up to raise awareness and of controlling the accessibility of minors
to the internet.
Censorship and filtering occurs on small to large scales, whether it be a company
restricting their employees' access to cyberspace by blocking certain websites which
are deemed as relevant only to personal usage and therefore damaging to productivity
or on a larger scale where a government creates large firewalls which censor and filter
access to certain information available online frequently from outside their country to
their citizens and anyone within their borders. One of the most famous examples of a
country controlling access is the Golden Shield Project, also referred to as the Great
Firewall of China, a censorship and surveillance project set up and operated by the
People's Republic of China. Another instance is the 2000 case of the League Against
Racism and Antisemitism (LICRA), French Union of Jewish Students, vs. Yahoo! Inc
(USA) and Yahoo! France, where the French Court declared that "access by French
Internet users to the auction website containing Nazi objects constituted a contravention
of French law and an offense to the 'collective memory' of the country and that the
simple act of displaying such objects (e.g. exhibition of uniforms, insignia or emblems
resembling those worn or displayed by the Nazis) in France constitutes a violation of the
Article R645-1 of the Penal Code and is therefore considered as a threat to internal
public order.”(Akdeniz) Since the French judicial ruling many websites must abide by the
rules of the countries in which they are accessible.
Countries in other regions also practice certain forms of filtering. In the United States
state-mandated Internet filtering occurs on some computers in libraries and K-12
schools Content related to Nazism or Holocaust denial is blocked in France and
Germany. Child pornography and hate speech are blocked in many countries
throughout the world. In fact, many countries throughout the world, including some
democracies with long traditions of strong support for freedom of expression and
freedom of press, are engaged in some amount of online censorship, often with
substantial public support.
Internet censorship in China among the most stringent in the world. The government
blocks Web sites that discuss the Dalai Lama the 1989 crackdown on Tiananmen
Square protesters, the banned spiritual practice Falun Gong, as well as many general
Internet sites. The government requires Internet search firms and state media to censor
issues deemed officially “sensitive,” and blocks access to foreign websites including
Facebook, Twitter, and YouTube.


Conclusion

There are many views on computer ethics, you have the ethics set forth by the

Association of Computing Machinery and you have “ethics” as seen from hackers.

Even within the hacker groups you have different views. There are the white hats, who

try to stop the black hats from penetrating there computer networks and stealing data.

There are the organized criminal gangs who will do what ever is necessary to make a

buck on the internet.

There is the fight over intellectual property, with some people believing all software

should be free. Mathematicians and scientists don’t think you should be able to patent

an algorithm, they think this takes mathematics from the public domain.

There are also the issues of censorship on the internet. With countries like China and

North Korea censoring parts of the internet so that their citizens can access and view

only the information they see fit to “protect them”. You have companies who limit what

you can do on the internet as to not decrease productivity.

There are many views on computer ethics and it varies form one region of the world to

the other, form one point of view to the other. Is one particular view right or wrong, no I

don’t believe so. I believe you should go with you “gut”, does it feel right? Like many

ethical issues in the world today there is a lot of grey area and I think as the profession

matures some of the grey areas will become clearer.

Next Post Previous Post
No Comment
Add Comment
comment url