Resource Description


 

BOOK:

51j5r-yaevl-_sx258_bo1204203200_

 Details

Author: Marian Quigley

Publisher: IGI Global

Year: 2008

ISBN: 1591409888 (ebook); ISBN: 9781591409885 (ebook)

DOI: 10.4018/978-1-59140-987-8

Link: http://www.igi-global.com.ezproxy.lib.monash.edu.au/gateway/book/360

Description

This book is a reference source on ethical and security issues and it covers a wide range of topics such as computer crime and others. One of the chapters in this book covers on hackers which will be used in our research on ethical hacking.

One of the definitions of a computer hacker is a computer enthusiast in programming where it is usually applied to individuals who enjoys experimenting system hardware, software and communication systems. In terms of data security, computer hacker refers to an unauthorized user who tries to gain entry into a computer or computer network by defeating the computers access controls. Hackers are a new threat and have been highlighted in many news stories throughout the previous two decades. Some hackers may be malicious while others are simply naïve and do not believe that their activities might be any real harm to the society.

The code of ethics that are constructed based on the perspective that hackers are aiding and helping in the development and improvement of the information society. The method of reasoning for hacking activity can be based on the requirement to obtain information and then utilize that information in a positive way by processing it, giving it away or selling it.


Article:

oywarticle

Details

Author: C. C. Palmer

Year: 2001

Link: http://pdf.textfiles.com/security/palmer.pdf

Description

This article focuses on what is ethical hacking, who are ethical hackers and what do ethical hackers do. Computer security has become a major problem for businesses and governments. Companies are worried about the possibility of being hacked and clients are stressed about protecting their own data. One of the ways to overcome the concern is to have a team of computer security professionals to try to hack into their system and give a feedback on how they should enhance their security system. These computer security professionals practices ethical hacking.

Ethical hackers have very strong programming and computer networking skills and have been in this business for many years. They have a wide knowledge of the software and hardware provided by the computer hardware vendors. It is essential that they have a very good understanding on how the security on different types of systems are maintained. Besides that, ethical hackers should have more willpower and patience than others since their work requires a lot of time and effort. This trait is critical since black hat hackers are extremely patient and usually monitors the systems for days and weeks to look for an opportunity.

Ethical hacking helps any system owner or business owner to discover the weaknesses of a system before an attacker does, in a way that the attacker would hack if they were actually launch an attack. This is why it actually uses the real tools, technologies, methodology and approaches that an attacker would. Thanks to ethical hacking, system owners will understand more on their security needs and will be able to keep their guard up in case of a hacker’s attack.


Article:

legal

Details

Author: John Brodkin

Senior Journalist of network world

Published in:  April 24,2009

Publish date:  Network World

Sources Used:  Many sources in the end.

Description:

The legitimate dangers of moral hacking incorporate claims because of divulgence of individual or secret data. Such revelation can prompt a fight in court including the association and the moral programmer.

It is additionally workable for the moral programmer to submit mistakes to the point that the association’s benefit is contrarily influenced might be because of misconception or absence of correspondence.

To address these lawful issues, it is basic for the moral programmer to dependably play out his employment protectively to minimize bargaining the customer’s framework or system.

Moral hacking might be restricted by the affectability of data required in the customer association. Customers have a tendency to force prerequisites and points of confinement on the exercises of the moral programmer.

For the moral programmer to perform appropriately, access to the whole framework or system may be required. On account of the requirement for demonstrable skill, the moral programmer must not abuse the cutoff points forced by the customer with the goal that expert issues are minimised.



Book:

51cpwnrrql-_sy344_bo1204203200_

 

TITLE – Cybercrime and the Law

SUBTITLE – Challenges, Issues, and Outcomes

AUTHOR – Brenner, Susan W.

PUBLISHER – Northeastern University Press

PRINT PUB DATE – 2012-10-08

LANGUAGE – English

PRINT ISBN – 9781555537982

 

The book gives a top to bottom examination of the genuine digital security chances an industry and the administration faces. It likewise gives talks on how organizations and government offices can secure important data to stay away from disaster.

The book comprises of 8 chapters. Everything from what is malware and hacking and also about different types of cyber crimes are discussed in great detail in this book.



51jduy09c9l-_sy291_bo1204203200_ql40_Details

Author: Marian Quigley

Publisher: IGI Global

Year: 2008

Book : Ethical and Social Issues in the Information Age

Year : 2007

Author : Joseph Migga Kizza

ISBN : 978-1-84628-658-2 (Print) 978-1-84628-659-9 (Online)

Publisher : Springer London

The book discuss mainly about the broad expect of hacking. It provides the types of hacking, way it is done and ethical aspect of hacking. It starts off with basic morality and ethicality, which are the basis of personal and how one behaves publically and solve problem. Society must have be educated on the proper moral values and that there will be consequences on infringements on rights. Law frameworks are used to address such problems like hacking.

Ethical professionalism in professions regards the responsibilities of public servants who utilizes their power to do rightful things and not for harassment and exploitation. Human nature is imperfect and have jealousy, emotivism and egoism which drives them to harm other’s property. ACM code of ethics are discussed and that objectives of ACM is to have disciplinary, advisory, educational, publicity and inspirational instilled into workplaces and society.


capture1

 

Article : An Advanced Model of Hacking

Year : Oct 2007

Author : Rennie, Lara; Shore Malcolm

 

This article discuss about the motive of hacking as to why people perform hacking and the encouragements. It also discuss about psychological aspect of a human being as to such harmful act. Hacking is considered common and such that teenager these days are starting to hack. Types of hacker like penetration tester, black hatters and white hatters; some are to help improve the security of the system. Psychologists conclude that most of the hacking motivation comes from personal gain purposes and can be acts of revenge. Characteristics of psychological like happiness and self-motivation every time a hacker hacks down a system is one of the desire on what drives them to perform such acts. Flow experience characteristics like curiosity (sense to find out more), control (power and sense of control over things), concentration (such that the activity dissolves all current worries and bad thoughts) and intrinsic interest. Applying these characteristics of flow experience as to why people hack allows psychologists analyze emotions and the mind of a hacker.



51act-z9ksl-_sx331_bo1204203200_

Book : Computer Network Security and Cyber Ethics

Year : 2014

Author : Joseph Migga Kizza

ISBN : 978-0-7864-9392-0 (softcover)

             978-1-4766-1560-8 (ebook)

Publisher : McFarland & Company, Inc.

 

 

 

 

The book told about the ethics, morality and value in the cybercrime and computer network security. A lot of problem comes out in the hacking and the book tell the motives of these hackers and how do their works. The book also describe about the systems that is more vulnerable for Linux, Os, and also Windows. The book also describe about the challenges for the authority to track these cybercrimes. A lot of part about the security protocols and privacy was discussed in this books. For instances, security in online social networks, mobile systems and cloud storage

1485-0

Article : Know Your Enemy: The Social Dynamics of Hacking

Year : 28 May 2012

Author : Thomas J. Holt & Max Kilger

Publisher: The Honeynet Project

 

 

 

The article told six different motives for hackers: entertainment, ego, status, entrance to a social group, money, and cause. Entertainment is a motivation that does not change since the first time hacking activities comes to the world. The curiosity about technology makes hackers play around in order to know how those technology works, or to get information from others just for fun. Another motivation for hackers is to get reckoned by others. These people want to get respect and appreciation by depending on their skills to hacks. In some case, their reputation will increase just by stealing others money or even confidential information. By hacking, hackers can be admitted to numerous groups which have at least a connection related to hacking. Hackers with a certain skills or knowledge can entered into these groups for the sake of widen their hacking activities as there are so little that can be done alone. These activities can either be a threat for others or a safe activity. Different with the past, almost all business transaction is done in the cyber world. This motivates modern hackers to acquire money by targeting those merchant and institutions. Hackers can also sell information such as credit card numbers, bank account information, login information, and other related financial service products. These money will later be used to upgrading their hardware and software. Causes vary based on the location of a group in the world and their cultural, ideological, political, and religious orientations. Malicious hackers can often apply their knowledge and skills to engage in attacks on behalf of a particular belief system in order to exert influence over policies or actions made by another group.


518vkt443l-_sx258_bo1204203200_

Title: Principles of Information Security, 4th Edition

Year : 2012

Author : Michael E. Whitman and Herbert J. Mattord

ISBN : 978-1-11113-821-9

Publisher : Cengage Learning

 

 

Hacking is an activity which has long been tied with ethical and legal complications. The term has evolved to have both ethical and unethical connotations, which can be confusing to the uninitiated. Hacker subculture has a myriad of terminology, sometimes with subtle variations, and this chapter identifies the main subcategories of hackers. The methods used by hackers to infiltrate systems will also be briefly examined, along with the motives for the activities. The question of whether or not hacking can

be an ethical activity, and how it should be dealt with by the legal system is considered in this chapter. Consideration is also given to the international legal perspective. The evolving hacker ethic is described and examined, and the justifications provided by hackers are investigated.


9781780171807

Title: Professional Issues In Information Technology

Year : 2014

Author : Frank Bott

ISBN : 978-1-78017-181-4

Publisher : The Chartered Institute

 

 

 

When employers of newly qualified information systems professionals are asked what it is they would most like them to know, the answer is very rarely technical. Much more commonly, the answer is an understanding of the business environment. For this reason, BCS, The Chartered Institute for IT insists that accredited courses contain a significant element of ‘professional issues’ and, in its own examinations, BCS requires candidates to take a compulsory paper entitled Professional Issues in Information Systems Engineering. This book has been written as a guide for students taking that paper and it covers the whole syllabus. It is hoped, however, that the book will also prove useful to others, both students on other courses and those who are already embarked on a career in the information systems industry.

Since the first edition was published, the structure of the IT industry has changed considerably. Although there are still many very small independent companies – under six employees, say – takeovers and mergers have dramatically reduced the number of small to medium-sized independent companies in the sector. Many of the companies referred to in the first edition no longer exist. A new section on takeovers and mergers has been added, along with additional material on outsourcing, and references to specific companies have been comprehensively revised to reflect the current state of the industry.


412jwrloh2l-_sx362_bo1204203200_

Author:

Alfreda Dudley,

James Braman,

Giovanni Vincenti

Published in: University of Turin, Italy

Publisher: University of Turin

Date of Publication: 2012

 

 

 

 

Description:

The main points derived from the book was the hacker motives. Some of the examples given were for profit, revenge, personal interest (entertainment), or external peer pressure. The book pointed out several ethics that stated all hackers should live by. The ethics can be summarised into 4 main points:

  1. Not to damage any violated systems
  2. Not to change or update any data present on the violated computer (except the log file to erase any traces of violation)
  3. Spread information and knowledge obtained from hacking with other people in the underground hacking community
  4. Provide a public service by allowing accesses to services that should be free to all

capture-20png

 

Author: Ramesh Bapu Palepu

Published in: Amrita Sai Institute of Technology

Publisher: Amrita Sai Institute of Technology

Date of Publication: November 2014

 

 

 

Description:

White hat hackers allows the company to identify the effectiveness of their computer security. Ethical hackers will run penetration tests and the data recorded from these tests can further enhance the company’s security.

White hat hacking brings about a variety of benefits which may be essential for any company to ensure security is maximised. One of them include finding weaknesses in the company’s security systems. Ethical hackers, after exploring the system, will present a report to management on the weakness in the system. The information from the report can allow management to implement stronger security measurements which can potentially prevent future attacks from occurring.
Besides that, ethical hacking allows a specific company to understand how exactly black hat hackers attack. This is because white hat hackers use similar techniques to black hat hackers and as such, allows the company to react accordingly and implement effective system security. Further benefits were listed on in the article that explained the necessity of implementing white hat hacking in a company.