The Ethics of Hacking - PowerPoint PPT Presentation

1 / 24
About This Presentation
Title:

The Ethics of Hacking

Description:

... Hackers Computer geeks who see computer systems as an intellectual challenge and a technological puzzle to solve. Hack for the sake of hacking Other ... – PowerPoint PPT presentation

Number of Views:40
Avg rating:3.0/5.0
Slides: 25
Provided by: Kris282
Category:
Tags: ethics | hack | hacking

less

Transcript and Presenter's Notes

Title: The Ethics of Hacking


1
The Ethics of Hacking
  • Kristine Belknap

2
What is Hacking?
  • What is Hacking?

3
What is Hacking?
  • What is Hacking?
  • The computer equivalent of breaking and entering.

4
What is Hacking?
  • What is Hacking?
  • The computer equivalent of breaking and entering.
  • What are Hackers?

5
What is Hacking?
  • What is Hacking?
  • The computer equivalent of breaking and entering.
  • What are Hackers?
  • True Hackers
  • Other Hackers (Cyber Criminals)

6
What is Hacking?
  • What is Hacking?
  • The computer equivalent of breaking and entering.
  • What are Hackers?
  • True Hackers
  • Computer geeks who see computer systems as an
    intellectual challenge and a technological puzzle
    to solve.
  • Hack for the sake of hacking
  • Other Hackers (Cyber Criminals)
  • The ones that do it solely for the money

7
Hacking Scenario A
  • Most people barely use their computers
    processing powerWould it be wrong to borrow
    their computer systems while they arent using
    them?

8
Hacking Scenario A
  • Most people barely use their computers
    processing powerWould it be wrong to borrow
    their computer systems while they arent using
    them?
  • Working on a problem that requires lots of
    computing power

9
Hacking Scenario A
  • Most people barely use their computers
    processing powerWould it be wrong to borrow
    their computer systems while they arent using
    them?
  • Working on a problem that requires lots of
    computing power(It could even be for a good
    cause)
  • Ex. Analyzing Human DNA to figure out which genes
    are linked to certain diseases

10
Hacking Scenario A
  • Consequentialism
  • Deontological Ethics
  • Virtue Ethics

11
Hacking Scenario A
  • Consequentialism
  • As long as the computers are left exactly as they
    were found
  • Deontological Ethics
  • Virtue Ethics

12
Hacking Scenario A
  • Consequentialism
  • As long as the computers are left exactly as they
    were found
  • Deontological Ethics
  • Breaking and entering is still breaking and
    entering even if you dont touch anything.
  • Virtue Ethics

13
Hacking Scenario A
  • Consequentialism
  • As long as the computers are left exactly as they
    were found
  • Deontological Ethics
  • Breaking and entering is still breaking and
    entering even if you dont touch anything.
  • Virtue Ethics
  • Its still the computer equivalent of breaking
    into someones home

14
Hacking Scenario B
  • What if the systems being hacked belong to the
    bad guys?

15
Hacking Scenario B
  • What if the systems being hacked belong to the
    bad guys?
  • Ex. Using a Denial-of-Service Attack to crash a
    terrorists website.

16
Hacking Scenario B
  • What if the systems being hacked belong to the
    bad guys?
  • Ex. Using a Denial-of-Service Attack to crash a
    terrorists website.
  • Ex. Hacking into a criminals computer to
    retrieve and decrypt files that can be used as
    evidence.

17
Hacking Scenario B
  • What if the systems being hacked belong to the
    bad guys?
  • Ex. Using a Denial-of-Service Attack to crash a
    terrorists website.
  • Ex. Hacking into a criminals computer to
    retrieve and decrypt files that can be used as
    evidence.
  • Ex. Cyber Warfare

18
Hacking Scenario B
  • Consequentialism
  • Deontological Ethics
  • Virtue Ethics

19
Hacking Scenario B
  • Consequentialism
  • Does it count against you if any harmful
    consequences are only to bad people?
  • Deontological Ethics
  • Virtue Ethics

20
Hacking Scenario B
  • Consequentialism
  • Does it count against you if any harmful
    consequences are only to bad people?
  • Deontological Ethics
  • Breaking and entering is still breaking and
    entering and in these scenarios damage is being
    done.
  • Virtue Ethics

21
Hacking Scenario B
  • Consequentialism
  • Does it count against you if any harmful
    consequences are only to bad people?
  • Deontological Ethics
  • Breaking and entering is still breaking and
    entering and in these scenarios damage is being
    done.
  • Virtue Ethics
  • Its still like breaking into someones home.

22
Conclusion
  • Scenario A
  • Scenario B

23
Conclusion
  • Scenario A
  • 1 Yes, contingent on everything being put back
    where it was found.
  • 2 No.
  • Scenario B

24
Conclusion
  • Scenario A
  • 1 Yes, contingent on everything being put back
    where it was found.
  • 2 No.
  • Scenario B
  • 1 Yes, if you count harm to the bad guys as a
    positive.
  • 2 No.
Write a Comment
User Comments (0)
About PowerShow.com