Brian Kim - PowerPoint PPT Presentation

1 / 17
About This Presentation
Title:

Brian Kim

Description:

All information should be free. Mistrust Authority Promote Decentralization. Hackers should be judged by their hacking, not bogus criteria such as degrees, ... – PowerPoint PPT presentation

Number of Views:81
Avg rating:3.0/5.0
Slides: 18
Provided by: csU8
Category:
Tags: brian | free | hacking | kim | program

less

Transcript and Presenter's Notes

Title: Brian Kim


1
Brian Kim Carl Erdman
Hacker Ethics
2
Hacker Ethics
Whether it is intentional or not, hackers are
using any means to achieve their ends.
Along with rapid progress of technology, the
existence of hackers and hacking can be
somewhat dangerous to the society in some
situations, but can also be useful in others. Is
hacking ethical based on the justification of
hackers intentions?
3
Brief History of Hacker
  • John Draper (Captain Crunch)
  • The father of hackers
  • Phone Phreaker
  • Built Blue Box
  • Esquire Magazine revealed his secret
  • Secrets of the little blue box

4
Brief History of Hacker
  • Steve Wojinack
  • Co-founder of Apple Computer
  • One of Phone Phreaker
  • Inspired by Draper
  • Contributing greatly to the personal computer
    revolution of the 1970s.

5
Brief History of Hacker
  • Kevin Mitnick
  • Computer hacker
  • 1988, From DEC, He copied the details of top
    secret of software
  • While he was under surveillance by FBI, he
    wiretapped and intercepted FBIs communication
    and ran away
  • You cant catch me
  • Built fake references, such as ID and his past
  • Arrested at NC in 1995

6
Pro-Hacking
In terms of the development and progress of
computer technology, hackers attribute various
and effective functions to the society.
Since hackers' intentions may be good or they can
be useful in finding holes in program or
security systems, their action can be justified,
and, thus, they are ethical.
7
Hacker Ethic (Levy)
  • Access to computers and anything which
    might teach you something about the way the world
    works should be unlimited and total. Always
    yield to the Hands-On Imperative!
  • All information should be free
  • Mistrust Authority Promote Decentralization
  • Hackers should be judged by their hacking, not
    bogus criteria such as degrees, age, race, or
    position.
  • You can create art and beauty on a computer.
  • Computers can change your life for the better.

8
Act Utilitarianism
-Greatest Happiness Principle -Do the positives o
utweigh the negatives? -Since hacking can have mo
re positives than negatives it is ethical.
9
Examples
Hackers, 1995 -group of friends used hacking to c
lear their names and save the worlds
ecosystem Kevin Mitnick -FBIs Most Wanted Com
puter Criminal to a Top Computer Security Expert
-Hacking is a skill that could be used for
criminal purposes or legitimate purposes
DefCon -largest underground hacking convention
in world
10
Examples (Cont.)
Hiring Ethical Hackers -effort to hire ethical ha
ckers to stop criminal hackers

EC-Council -certified ethical hackers
11
Anti-Hacking
From the intentional release of private
information to breaking into a government or
corporation computer, hackers are just criminals
that are breaking the law. Since, their means
cannot be justified regardless of
their good intentions, achievements, or
contribution towards society, hackers are unethi
cal.
12
What if
Someone broke into your room,
Read your diary, Messed up your room, Left messa
ge, And disappeared. I know your dirty LITTL
E secret. You cant catch me. How would you r
eact?
13
How far they can hack?
  • Access to Personal Information
  • Hacking personal accounts
  • Bank account, gaming account (gambling), e-mail,
    Facebook,
  • MySpace, or even your personal computer, etc.
  • TJ MAXX
  • 45.5 million personal
  • information were exposed
  • TJ Maxx News

14
How far they can hack?
  • 2. Access to Corporate information
  • Stealing Customers information
  • New RD industry spy
  • Vladmir Levin
  • Russian Hacker
  • Hacked Citibanks computers
  • Took out 10 million dollars

15
How far they can hack?
  • 3. National level
  • Threatening American Democracy
  • Electrical Voting Machine
  • Markus Hess
  • A West German Hacker
  • Hacked into U.S. Military
  • Collected information for KGB

They can hack more than you can imagine!!!
16
Issues from Term projects
  • DRM
  • DVD? MP3? Come on Whos cracking it?
  • Face Recognition
  • Possibility of switching the personal
    information
  • Government Access to Private data
  • Duh!! Kevin Mitnick created whole new identity
  • Addiction
  • Hackers are mostly addicted to their weapons
    (computer)
  • Workplace E-Monitoring
  • A little bit of amusement for hackers?!
  • Wiretapping
  • And again Duh!! Kevin even intercepted FBIs
    communication
  • Virtual Office
  • Nice plan! I think I should buy your companys
    stock.
  • Online communities
  • Do you think Im your friend? Think Again!

17
Good Luck with Final
Discussion
Any Questions? Comments?
Write a Comment
User Comments (0)
About PowerShow.com