
There are two issues regarding hacking. First, hacking is illegal, pure and simple. The simple possession of a password to a computer or network a person doesn't have the permission to use is illegal. Actually entering a computer system without permission is a felony, even if all the hacker does is look around. If damage is done, even inadvertently, the charges become more serious.
Hacking is unethical
10 commandments of computer ethics
Thou shalt not use a computer to harm other people
Thou shalt not interfere with other people’s computer work
Thou shalt not snoop around in other people’s computer files
Thou shalt not user a computer to steal
Thou shalt not use a computer to bear fdalse witness
Thou shalt not copy or use proprietary software for which you have not paid
Thou shalt not use other people’s computer resources without authorization or proper compensation
Thou shalt not appropriate other people’s intellectual output
Thou shalt think about the social consequences of the program you are writing or the system you are designing
Thou shalt always use a computer in ways that insure consideration and respect of your fellow human being
Risks
The risk of a person getting caught hacking are slim. However, penalties are stiff if he or she is caught. Additionally, system administrators generally don't want hackers in their systems, despite generally not having enough layers of security to sufficiently deter them. Even though a small percentage of hackers are actually malicously trying to break the system, even having one hacker in the system is one too many.
Hackers, on the other hand, defend their actions. They state they are merely curious, looking around to simply see what's there. Additionally, they say they may find some serious errors.
The risks of hackers entering the system are extreme. They can cause errors in a system, from minor glitches, all the way to complete system crashes. These can result in a loss of millions of dollars for companies.
Security Concerns
Hacking is unethical
10 commandments of computer ethics
Thou shalt not use a computer to harm other people
Thou shalt not interfere with other people’s computer work
Thou shalt not snoop around in other people’s computer files
Thou shalt not user a computer to steal
Thou shalt not use a computer to bear fdalse witness
Thou shalt not copy or use proprietary software for which you have not paid
Thou shalt not use other people’s computer resources without authorization or proper compensation
Thou shalt not appropriate other people’s intellectual output
Thou shalt think about the social consequences of the program you are writing or the system you are designing
Thou shalt always use a computer in ways that insure consideration and respect of your fellow human being
Risks
The risk of a person getting caught hacking are slim. However, penalties are stiff if he or she is caught. Additionally, system administrators generally don't want hackers in their systems, despite generally not having enough layers of security to sufficiently deter them. Even though a small percentage of hackers are actually malicously trying to break the system, even having one hacker in the system is one too many.
Hackers, on the other hand, defend their actions. They state they are merely curious, looking around to simply see what's there. Additionally, they say they may find some serious errors.
The risks of hackers entering the system are extreme. They can cause errors in a system, from minor glitches, all the way to complete system crashes. These can result in a loss of millions of dollars for companies.
Security Concerns
No comments:
Post a Comment