1 / 15

Group II

Group II. Members: 1. Emile BANGISHAKA ID: 1-2012-0065 2. Sylvie Gwiza ID: 1-2012-0933 3. Jerome NDAGIJIMANA ID: 1-2012-0881 4. Liliane MUKWIYE UWASE ID: 1-2012-0577

odeda
Télécharger la présentation

Group II

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Group II Members: 1. Emile BANGISHAKA ID: 1-2012-0065 2. Sylvie Gwiza ID: 1-2012-0933 3. Jerome NDAGIJIMANA ID: 1-2012-0881 4. Liliane MUKWIYE UWASE ID: 1-2012-0577 5. Aphrodis NZABANDORA ID: 1-2012-0067 6. Joseph MAGONDO ID: 1-2012-0398 7. James MUZIGA ID: 1-2012-1004 8. Adam NDUNGUTSE ID: 1-2012-0831 9. Christian CYUBAHIRO ID: 1-2012-0445 Group B

  2. Topic: Hacking Group B

  3. 1. What is hacking? • Computer hacking is most common among teenagers and young adults, • although there are many older hackers as well. • Many hackers are true technology buffs who enjoy learning more about how computers work and consider computer hacking an “art” form. • They often enjoy programming and have expert-level skills in one particular program. • For these individuals, computer hacking is a real life application of their problem-solving skills. • It’s a chance to demonstrate their abilities, not an opportunity to harm others. Group B

  4. Hacking con’t • Computer hacking can also lead to other constructive technological developments, since many of the skills developed from hacking apply to more mainstream chases. • For example, former hackers Dennis Ritchie and Ken Thompson went on to create the UNIX Operating System in the 1970s. This system had a huge impact on the development of Linux, a free UNIX-like operating system. Shawn fanning, the creator of Napster, is another hacker well known for his accomplishments outside of computer hacking. • In comparison to those who develop an interest in computer hacking out of simple intellectual curiosity, some hackers have less noble motives. Hackers who are out to steal personal information, change a corporation’s financial data, break security codes to gain unauthorized network access, or conduct other destructive activities are sometimes called “crackers.” Group B

  5. 2. Discuss Hacker ethics The idea of a "hacker ethic" is perhaps best formulated in Steven Levy's 1984 book, Hackers: Heroes of the Computer Revolution. Levy came up with six tenets: • Access to computers - and anything which might teach you something about the way the world work - should be unlimited and total. Always profit to the Hands-On imperative! • All information should be free. • Mistrust authority - promote decentralization. • Hackers should be judged by their hacking, not bogus criteria such as degrees, age, race, or position. • You can create art and beauty on a computer. • Computers can change your life for the better. Group B

  6. Hacker ethics con’t The goal of ethical hacking is to determine how to break in or create damage with the present programs running, but only at the request of the company that owns the system and specifically to prevent others from attacking it. PHRACK, recognized as the "official" p/hacker newsletter, expanded on this principle with a justification that can be summarized in three principles ("Doctor Crash," 1986). First, hackers reject the notion that "businesses" are the only groups entitled to access and use of modern technology. Second, hacking is a major weapon in the fight against encroaching computer technology. Finally, the high cost of equipment is beyond the means of most hackers, which results in the perception that hacking and phreaking are the only recourse to spreading computer literacy to the masses: Group B

  7. Hacker ethics con’t "Hacking. It is a full time hobby, taking countless hours per week to learn, experiment, and execute the art of penetrating multi-user computers: Why do hackers spend a good portion of their time hacking? Some might say it is scientific curiosity, others that it is for mental stimulation. But the true roots of hacker motives run much deeper than that.” [http://www.wisegeek.org/what-is-computer-hacking.htm#] Group B

  8. Advantages of Ethical Hacking • The main advantage of ethical hacking is that companies are able to pay computer technicians to attack their own system to learn where the weak spots are. This prevents identity theft and the leaking of vital information. When a company learns where security in their system is lacking, it allows them to implement stronger security measures. • Ethical hacking also helps families of alive people to access accounts to see what their final viral transmissions may have been or gain access to some accounts to close them down. • It is also beneficial to help government entities to protect major computer systems from being compromised in a way that national security would be an issue. • [http://project.cyberpunk.ru/idb/hacker_ethics.html] Group B

  9. 3. Why is hacking unethical practice? • hacking is itself, automatically called as Unethical or illegal. Normally, hacking can be defined as unauthorized breach of barriers put for the protection of important data, information and people as well. • Initially hacking was all about breaking laws and accessing unauthorized information by certain groups of people, specializing in Information Technology and Computer Programming. • some of the major computer companies such as Apple, IBM and Microsoft comprises of large team of dedicated, talented and professional hackers. • These hackers, however are not breaking the laws, so far nobody can tell. For an ethical hacker, their job includes to test the newly developed program to find gaps in security system of the program. Group B

  10. Con’t • In simple words, an ethical hacker is a computer expert, who attacks a highly protected security system on behalf of his owner with care and prevents the exploitation of the program that an unethical hacker might cause harm. • In order to test the program, ethical hacker makes use of methods as their less principled counterparts but unethical hacker utilizes each resources and opportunity available to create malicious attack the security system. On other hand, an unethical hacker is more of a vigilante, who is basically involve in exploiting security vulnerabilities for some activists or person who wants to get unauthorized access to the system. • The technical differences between Ethical and Unethical Hacking is ZERO, but what counts here is Moral difference, which is substantive. At present, most of the companies have their own hackers. Both the hackers seems to do well in their business, depends who hires them. It can be well termed as the fight between Police Force and Criminals. Still, the debate will continue to go on for Ethical and Unethical Hacking forever. [http://www.techmagnifier.com/opinion/ethical-and-unethical-hacking/] Group B

  11. 4. What benefits do hackers get from breaking into websites belonging to governments and business organizations? Computer hacking diffuses global society in the digital age. The act of breaking into a secure computer network serves many purposes, from corporate espionage to blatant theft and political insubordination. Computer hacking affects organizations in a variety of ways -- some universal, others specific to the nature of the reason for hacking and the business in question. The direction of hacking -- whether the organization hacks or gets hacked -- also has an effect. Group B

  12. Interconnected Costs According to an article published by the BBC, computer hacking cost companies in the United Kingdom billions of pounds in 2004. In their paper "The Economics of Computer Hacking," economists Peter Lee son and Christopher Coyne write that computer viruses created by hackers cost businesses $55 billion in 2003. In 2011, a single instance of hacking on the Play Station cost Sony more than $170 million, while Google lost $500,000 due to hacking in 2005. According to Richard Power, editorial director of the Computer Security Institute, single instances of hacking may cost as much as $600,000 to $7m a day for online businesses in 2011, depending upon the revenue of the operation. Group B

  13. Information Computer hacking often revolves around information. Organizations steal information such as research, business strategies, financial reports and more from one another through hacking operations. Digitized client databases also fall victim to hacking, with hackers stealing names, addresses, emails and even financial information from organizations. Such a loss of information to a small business may cost a competitive edge or the complete loss of a client base, effectively corruption the organization. On the opposite end of the spectrum, a business participating in computer hacking may gain a wealth of information providing a competitive edge and access to new client bases through the act. Personal or political information gained through computer hacking can serve as leverage in business or political dealings. Group B

  14. Organizational Structure The structure of organizations before hacked, at risk for hacking or with extensive digital networks requiring protection from hacking often reflects the threat of hacking. Businesses in such a position employ extensive information technology (IT) teams, which work constantly on creating, updating, developing and improving computer networks and safety to prevent or prevent hackers from accessing information. Small businesses with limited budgets may face radical reorganization to cope with such efforts, while new businesses anticipating such preventative measures must work them into the initial business plan. Group B

  15. Effects on Technology Organizations Organizations in the computer and technology industry may benefit or lose significantly from instances of computer hacking. Independent companies specializing in hacking prevention software or network development stand to benefit extremely as the impact of hacking spreads throughout the world. Small businesses in particular may expand operations exponentially if successful in obtaining and retaining a client base. However, a company in this field whose product or efforts fail in the face of hacking face a ruined reputation and thereby the potential loss of a client base and an inability to attract additional clients. [http://smallbusiness.chron.com/effects-computer-hacking-organization-17975.html] Group B

More Related