This website uses cookies to ensure you have the best experience. Learn more

Cyber Ethics: Principles To Combat Hacking

2521 words - 10 pages

Introduction
Issues of ethics and professionalism had been touch frequently in our current society lately. Experts from a particular field usually and logically should behave professionally or show their expertise to the civilian. However, in fact they are working oppositely and crime their expertise with their knowledge. This actually brought troubles to the outsider or victim and causes them to loss their property or reputation.
In information technology field, issue regarding to ethics and professionalism had been given name as cyber ethics. According to ikeepsafe (n.d.), cyber ethics is the discipline of using ethical behaviors and acknowledging moral duties to online environment and digital media. This issue includes hacking, phishing, copyright, downloading, cyber bullying, etc. The issue discussed in this paper, is the most problematic and troublesome - Hack.
According to Wikipedia (2013b), hacker is someone who attack and seek into a computer system or network. They may motivated by different kinds of reason such as profit, to protest, to challenge a system, to grab information, etc. There are 3 types of hacker which can be classified into white hat, black hat, and grey hat. White hat hacker breaks the computer security for non-malicious reasons where they are actually to test their own security system. Black hat hacker violates the computer ethics and hacks system for their personal profit. Grey hacker hacks the computer system with the purpose of notifying the administrative of that system has a weak security system and provide them a better solution with a charge (Wikipedia, 2013b).
Recall back to the incident happened in 3 years ago, our government websites had been hacked after received the message from “Anonymous” group. The targeted websites is the malaysia.gov.my and this issue had been given a name as - Operation Malaysia.
What is this issue about?
The name of Operation Malaysia is the issues regarding to the hacking of Malaysia government websites. A video has been spread via the internet which holding the message below before the issue happened.
Greetings, Malaysia, we have seen the censorship taken by the Malaysian government, blocking sites like The Pirate Bay, and WikiLeaks. Malaysia is one of the world’s strictest governments, even blocking out movies, and television shows. These acts of censorship are inexcusable. You are taking away a basic human right. The internet is here for freedom, without fear of government interference. Do not think that no one else notices. Your structured government has done the talking, and we hear loud and clear. Let this be an announcement to all your people. This is a sign, a warning, and an opportunity to listen to ideas above your own. In a way you are being stubborn. But how will this help anyone or your country. We fear that if you make further decisions to take away human freedom. We are obligated to act fast and have no mercy. For rules were meant to be broken. And corruption was...

Find Another Essay On Cyber Ethics: Principles to Combat Hacking

Development of a code of ethics: IT challenges

1721 words - 7 pages computer resources without prior authorization and using the computer in ways that ignore the consideration of and respect for fellow human beings. ("technical definition of cyber ethics," 2010) These postulates are a good starting point in understanding how to approach ethical issues in the cyber world, but an ongoing progressive stance will be needed to combat emerging ethical cyber world atrocities. Social group behavior is acquiring a global

Is Ethical Hacking the Answer to Ensuring the Safety of Company’s Computer Systems?

1445 words - 6 pages ). Teaching ethical hacking Those who support using ethical hacking to identify weaknesses in computers teach it to others. Ethical hacking is taught to students at the University level as well as being taught to IT professionals by consulting firms. It is debatable if it is wise to teach people to hack. Pashel says it is important to emphasize ethical behaviour when teaching (Pashel 2006). Oxford dictionary defines ethics as “ moral principles that

Cyber-Warfare: The Importance of the New Digital Battlefield

2258 words - 9 pages Attacks." Texas Law Review 88, no. 7: 1533-1569. Academic Search Complete, EBSCOhost (accessed March 21, 2011). Joshua E. Kastenberg, 2009. “Changing the Paradigm of Internet Access from Government Information Systems: A Solution to the Need for the DOD to Take Time-Sensitive Action on the NIPRNET”, 64 A.F. L. REV. 175, 183 Kelsey, Jeffrey T. G. 2008. "Hacking Into International Humanitarian Law: The Principles Of Distinction And

Hacking

1769 words - 7 pages potentially save American force’s lives as well as protecting the homeland from further attacks. Hacking undoubtedly helped the U.S. capture Osama Bin Laden by intercepting cellular traffic. Once captured, Bin Laden’s computer and hard drives will be examined in detail to gain further insight into al Quaeda and its plans. Create a corporate ethics statement for a computer security firm that would allow or even encourage activities like hacking

The Dangers of Cyber-Terrorism

1529 words - 6 pages Wiemann, a researcher on cyber crime, suggests that cyber-terrorism is an attractive option for modern-day terrorists because they can be anonymous, it has the potential to inflict mass harm, and it has a huge psychological impact and media appeal to its intended targets (Wiemann, 2004). Secondly, another problem of cyber terrorism is its easy accessibility. Many computer hacking software are easy to use and available for free on the internet

Cyber Security Controls As a Public Good

2486 words - 10 pages Overview Society today is plagued with crime that is difficult to combat, constantly changing, and has no borders; this type of crime is called cyber-crime. The United States of America is attacked on a daily basis by cyber criminals both foreign and domestic. The crimes committed involve fraud, identity theft, theft of proprietary trade secrets, and even theft of national secrets. The 2009 Internet Crime Report indicates there were 336,655

Cybersecurity-Case Study

950 words - 4 pages . Moreover, it allowed people to communicate with each other in all over the world and to share information, documents and pictures by using mobile phone and social media such as Facebook, Twitter, YouTube, and Instagram. These things made governments, organizations and information security experts in IT thinking seriously about finding right strategies to apply the cybersecurity in order to protect networks, PCs and information from hacking, steal

Cyber Criminals

669 words - 3 pages helps the public and government it also lets criminals more inventive in the crimes they commit. The government has uses DNA technology as well as other technological advances to combat cybercrimes. There are different types of cybercrimes like: high-tech criminals, hackers, and identity thieves. Works Cited FBI. FBI, 17 Mar. 2010. Web. 25 Apr. 2014. "Is Hacking Considered A Cyber Crime?" Cyber Crime: What Is Hacking. N.p., n.d. Web. 27 Apr. 2014.

The Rational Choice Theory: Criminology by Frank Schmalleger

1885 words - 8 pages ). Hacking in its simplest form is cyber-trespassing. The same way that trespassing on the property of an abandoned house was popular with teens of a different era, hacking is the new “coming of age” test of courage. “Casual hacking is almost as established a part of teenage life as downloading music to an iPod” (Richet, 2013, p.56). Teenage hacking can be something as innocuous as hijacking someone’s e-mail, Facebook, or other social media

Cyber Security

1295 words - 5 pages and hacking them. This way security can gain access to their files to help locate their position and arrest them. However the threat of cyber terrorism is still growing. In order to eliminate the threat of cyber terrorism the government needs to hire more people who are trained in cyber security. Cyber Terrorism Cyber terrorism is a major threat that goes unannounced to the American public that must be addressed. Imagine if you were an employee

Living in the Information Age

597 words - 3 pages automated tools by the criminals. What is cybercrime? They are criminal activities that use information technology for illegal access or interceptions. It encompasses telemarketing and internet fraud, identity theft, unauthorized access to information, and hates crimes. This paper argues that cyber-attacks on government institutions are bigger threats than cyber-attacks on individuals by including the America government’s effort to combat this menace

Similar Essays

From Hacking To Cyber Terrorism Essay

4086 words - 16 pages , I considered looking into it from Kierkegaard’s perspective. This gives a totally different impression on hackers. A young person with lack of knowledge in ethics and social responsibility may always end up doing wrong things. This raises an issue in my mind, in that case should we consider casual hacking as a serious cyber crime? This is basically a legal issue and may be I should leave it to the legal people to solve it. But, we can definitely

Actions Taken By The Australian Government To Combat Cyber Crime

1182 words - 5 pages always find other ways to bypass security and continue with their crimes.Cybercrime has evolved from simple viruses decades ago to complex scams, frauds, piracy, hacking and cyber bullying. Hackers are constantly trying to break into private and personal data for personal gain, and attempt to find any exploits that will allow them access to these networks. This could be a single individual or the collaboration of an organized group and includes

Hacking Computers And Ethics What Comes To Mind When You

2553 words - 10 pages Hacking Computers and Ethics What comes to mind when you hear the word ?hacker?? For most it means stealing information through the Internet, gaining illegal access to another person?s PC, or simply - disruptive behavior using a computer. The subject of hacking is no secret to the general public. Many people have been exposed to it by a bad experience or through the news and media. The idea of hacking that is stuck in the minds of people is that

Ethics In Business Ethics And Human Resources Ethics Commonly Refer To The Rules Or Principles That Define Right And Wrong Conduct

1968 words - 8 pages Ethics in BusinessEthics and Human Resources Ethics commonly refer to the rules or principles that define right and wrong conduct. In the United States, many believe we are currently suffering from an ethics crisis (Ricklets, Robbins & Coulter, 1996). Behaviors that were once thought unacceptable -- lying, cheating, misrepresenting, and covering up mistakes -- have become in many people's eyes acceptable or necessary practices. Managers