Introduction Computer security Computer security, also known as IT security, It is the protection of computer systems from being theft or damage that may happen to hardware, software or the information contained. Computer security protects computer system against any attack that may come from Internet. One of the most dangerous attacks is malware. Malware The word malware comes from the word "malicious software" which is a type of software designed to do unwanted harmful actions to the computer system. A good way to remember it is to know in Spanish, "mal" is a prefix that means "bad" which make the term "bad ware".
INTRODUCTION Ethical hacking and ethical hacker are terms used to describe hacking performed by a company or individual to help identify potential threats on a computer or network. An ethical hacker attempts to bypass system security and search for any weak points that could be exploited by malicious hackers. This information is then used by the organization to improve the system security, in an effort to minimize or eliminate any potential attacks. For hacking to be deemed ethical, the hacker must obey the following rules: • Expressed (often written) permission to probe the network and attempt to identify potential security risks. • You respect the individual 's or company 's privacy.
An effective technique is to utilize software like spyware. A spyware is a utility which, once stored on a computer system, keeps a check on the online activities of the users of that computer, it captures the information such as password or e-mails, and then dispatches the collected information to the investigator. In case of wiretapping the encrypted data is captured, which is very tedious to decrypt. In case of spyware the data prior encryption is captured by the investigators. The main hurdle is to install the spyware prior the data seizing starts.
Privacy concerns and identity theft are two ethical issues that increase with the rapid advancement of computer and cyber technology. Some people lose their moral intuition when using computer technology because they assume that their actions do not have real consequences to others. The lack of physicality on the internet can alter one’s ability to empathize with other, which makes them feel that cybercrime morally acceptable. The moral imperatives in the ACM code of ethics can help people make moral choices with their use of computer
Introduction: 1.1 Definition: Hacking is any technical labor to manipulate the natural behavior of network connections and linked systems. Definition of hacking in historical means to helpful, Intelligent technical work that was not necessarily related to computer systems. In other words that hackers make things that normal they do not do it. But the hacker in our time means that it is destructive and harmful. Hackers can offensive in so many ways, here is some of the most popular ways they can menace the safety of your site, and your business: Injection attacks means that the hackers have allowed to gain unauthorized accesses to private data such as credit card number or other financial data.
“Malware” is a term that can be used for any software that gets installed and activated on our device and performs unwanted actions and tasks. It often does so for the benefit of the third party. Malware programs can range from being simple annoying programs like adwares (pop up advertisements) to cause serious damage or invasion on one’s system. The damage can be unmentionable as it can cause various threats like stealing passwords and data or infecting other machines that network with the infected device. Majority of the malware programs are developed with an intention of data theft.
INTRODUCTION In computer security, a vulnerability is a weakness which allows an attacker to reduce a system information assurance. Vulnerability is the intersection of three elements a system susceptibility or flaw, attacker access to the flaw and attacker capability to exploit the flaw. Web application penetration testing works by using manual or automated penetration tests to identify any vulnerability, security flaws or threats in a web application. The tests involve using any of the known malicious penetration attacks on the application. The penetration tester shows attacks and environment from an attacker’s perspective such as using SQL injection tests.
I believe this is the most important factor of software. I also consider whether the software is operating honestly with the user. It can be very easy to create badware that takes advantage of unsuspecting users of the application, such as collecting their data without their consent, or advertising to them discreetly as an ulterior motive. To help make a decision of which situation outcome is most ethical, I reflect on several values of ethics. I want my decision to reflect my integrity as a software engineer.
This power could be misused, either deliberately or ac-cidentally. Many associations for IT professionals have started to address the ethical side of the employment. However there is no prerequisite for IT staff to bind with the rules that these associa-tions impose. Computer ethics analyses moral obligations of IT experts and computer users and is putting emphasis on the ethical issues in public policy for information technology development and use. The main inquiries are if is wrong for corporations to read employee’s e-mail or if it is morally reasonable for the end users to copy a software.
Therefore, there are two types of hackers: white hat hackers and black hat hackers. The first reason why hacking has positive consequences is that white hats get used to hack to help sites with checking security and to protect them from second ones. In addition, one example of good hacking is an incident between white hat and bad hat hackers, with help of FBI. The story happened in San-Diego, USA, in 1994, when Kevin Mitnick hacked Tsutomu Shimomura’s fancy identities. After that, Tsutomu, surely, wanted revenge and decided to get help from FBI.