Please complete the questions​

User Generated

tnzory

Business Finance

Description

In order to complete Assignment #3 you will need to answer the below questions. Please complete the questions

Use examples from the readings, lecture notes and outside research to support your answers. The assignment must be a minimum of 1-full page in length with a minimum of 2 outside sources. Please be sure to follow APA guidelines for citing and referencing sources. APA


  1. Explain why hackers think that the tern “hacker” does not refer to criminals.

  1. Should corporations hire hackers to help implement and/or test security? Please be sure to justify your answer.

Assignment Rubric ( 100 Points)

Synthesis of Concepts

60

Writing Standards - APA format

20

Timeliness

20

Unformatted Attachment Preview

Chapter 4 - Digital Criminals and Hackers 1. This chapter dispels the myth of the electronic bogeymen called “hackers”. While hackers are responsible for considerable expense and damage in the electronic world, most criminals labeled as hackers in the media are not highly skilled. 2. Introduction to Hackers Subculture – The hacker subculture sees itself as electronic explorers who ignore society’s rules rather than break them. The subculture has many similarities with other subcultures constructed by juvenile males. There is an idealized role for the hacker which stresses many of the virtues praised by society: knowledge, determination, focus, exploration, etc. 3. Hacker Typology – Historically, hackers have progressed through three distinct stages which are largely determined by their access to computer and network equipment. a. Old school hackers are the original hackers. b. Bedroom Hackers were spawned when computing left universities and entered the home through the advent of home computers. c. Internet Hackers are the contemporary hackers with virtually unlimited access to computing power and knowledge through the Internet. 4. Hackers Today – Contemporary hackers have been socialized to the hacker culture as much by the media as by hacker mentors. One of the primary debates in contemporary hacker culture is the naming of hackers. White hat, Black hat and Gray hat are labels applied to hackers to describe their respect for the law. 4 Hackers CHAPTER OBJECTIVES After completing this chapter, you should be able to ■Distinguish between computer crime, criminal hacking, and noncriminal hacking. ■Explain why hackers think that the term “hacker” does not refer to criminals. ■Identify hype and exaggeration of hacking incidents found in the media. ■Recognize the role media hype plays in influencing young hackers. ■Classify hackers into broad categories based on activities and expression of ideas in online communication or statements made in person. • • • • • • • • • ■Describe the role of technology that drives the hacker subculture. ■Explain how subcultural status depends on an understanding of technology achieved by the hacker and his or her knowledge of the ethics and values held by hackers. ■Predict hacker actions based on their type. ■Understand how the perceptions of hacking have changed based on shifts in hacker activity over time. INTRODUCTION: WHAT IS A HACKER? At this point in most texts, a reader might expect to see a quick definition of a hacker. In some sense, this entire chapter is the definition of “hacker.” Originally, the word “hacker” referred to an unorthodox problem solver and master programmer; in fact, these original hackers made the machines and the programs that are vital to modern society.1 Recognizing this fact, some media sources have championed terms like “computer cracker” and “black hat” to describe criminal hackers. Some sources even directly equate cybercriminals and hackers. The consensus of computer crime experts is that most cybercriminals are insiders to the victim organization, not hackers seeking to gain entry.2One thing that is clear is that there is no universal agreement as to the meaning of the word “hacker” or “computer (cyber) criminal.” However, there is a popular consensus that hackers are bad people who do bad things.3 This chapter presents a view of hackers that is intended to assist investigators and law enforcement officer in understanding the way hackers think. Many descriptions of motive and interpretation of hacker actions come directly from hackers (particularly juvenile hackers) themselves. At no time should this chapter be read to condone breaking the law. Although sympathetic to a hacker’s sensibilities, it is not sympathetic to harm caused intentionally or through negligence. Hackers have established their own set of values; these values often conflict with the laws and values of the greater society. Rather than simply reaffirm our distaste for the illegal actions of some hackers, this chapter presents the hacker’s understanding of these actions in an attempt to help investigators predict, effectively investigate, and appropriately respond to the intention of the criminal, not media-induced hysteria or uninformed prejudice. Who and What Is a Hacker? Hackers break into government and military systems around the world, from the U.S. Department of Defense to NORAD, the North American Aerospace Defense Command.4Hackers also electronically steal millions of dollars from major banks.5 It must be noted, however, that not all hackers engage in illegal activity. Basic First Amendment activities like communication and association are probably the most frequent online activities of hackers.6Similarly, not all illegal online activities are hacking. Pedophilia and child pornography draw as much disgust from most hackers as they do from law enforcement. Hackers and the law enforcement community come into conflict over activities like system intrusions and subsequent illegal acts. When discussing hackers, it is critical to note this distinction and recognize the fact that hacking can be a legitimate and perfectly legal action. In fact, one of the best definitions for a hacker identifies this issue, and thus considers him or her to be “an individual with a profound interest in computers and technology that has used this knowledge to access computer systems with or without authorization from the system owners.”7Authorization is critical because individuals who hack without it are committing a crime. Those with permission, however, are not technically breaking the law. The hacker population represents individuals with a broad spectrum of personal motivations, skills, and activities.8 For example, one of the more inclusive definitions from outside the hacking world is from the Jargon File. This text document, which defines and translates hacker slang, provides eight different definitions for a hacker, including those who “enjoy exploring the details of programmable systems and how to stretch their capabilities, as opposed to most users, who prefer to learn only the minimum necessary” as well as those who are a “malicious meddler who tries to discover sensitive information by poking around.”9 The emphasis on gaining unauthorized access to computer systems is key to the notion of hackers that has been spread in the popular media over the last decade. However, researchers suggest there is no real consensus as to what constitutes a hacker.10 This may be due in part to the range of activities that hackers engage in, and the legality of their actions depends on authorization from the system owners. For example, some hackers engage in phone phreaking, which involves the manipulation, theft, or use of telephone networks for illegal activities. While some have suggested this behavior constitutes a separate category of computer crime, hackers often break into telephone systems to assist in accomplishing hacks. This was a common practice in the 1980s when telephone systems operated through a variety of switching systems. However, most telephone equipment developed in the last 10 years is now indistinguishable from computer networks. Phreakers now operate within these environments, using hacking techniques and tools. Thus, the practice of phreaking has changed but is still an important interest in the hacker community.15 BOX 4.1 Phone Phreaks Bring Technology and Attitude to Hacking • • • • • • •Telephone technologies (boxes). Phone phreaks created devices that produced effects on the phone system. The blue box (see below) was used to produce a 2,600-Hz tone, gaining access to the toll network for the placement of calls without charge. The red box simulates the noise of a quarter, nickel, or dime being dropped into a pay phone, allowing free pay phone calls. Other boxes exist or may simply be part of phreak lore. Note: These devices no longer work on the North American phone system, but they did during the days of the bedroom hacker. •Counterculture of the 1960s and 1970s.There was an affinity for political subversives and Vietnam War protestors with the phone phreaks. Many phreaks were members of the youth culture movements of this period. In fact, one famous phreak, Cheshire Catalyst, edited the Technical Assistance Program (TAP) newsletter founded by Abbie Hoffman.11 •Phone company lore. Phone phreaks did not restrict themselves to the technology of the Phone Company (there was only one back then12). This interest was the beginning of social engineering (see below). •Paranoia. Years of hiding from Bell System security and listening in on phone conversations taught phreaks that privacy was an illusion on the phone system. “Ma” Bell heard everything. •“ph”onetic spelling. Phone phreaks regularly replace the letter “f” with “ph.” Phonetic spelling may be the basis of “‘leet speek,” discussed later in this chapter. •Blue Boxing. In 1967, at the age of 19, Ralph R. Barclay invented a device that bypassed direct dialing long distance telephone systems—the blue box. The small rectangular device was composed of dial and numbered buttons that produced tones similar to a telephone, but different, enabling the device to connect directly to telephone lines without a billing number. 13The early years of “blue boxing” are gone as the digital age gave way to stronger security systems, and the young counterculture that helped establish “hacking” grew up to be mature adults often employed as executives in the very companies they attacked. Indeed, the case is often made that these “phone phreakers” in the 1960s and ’70s actually helped establish the worldwide communication network that we all enjoy today.14 By the 1990s, the concept of phone phreaking and blue boxing had come to an abrupt end with the inaugural, widespread use of encrypted (T-1) lines that consisted of 24 separate channels using pulse code modulation (PCM) for data and voice transmission. The blossoming of the Internet gave way to a new environment in which to “phreak.” Today’s Hackers The same can be said for software cracking, which involves overcoming copy protection devices in electronic media to copy and distribute them.16 In the 1980s, such materials were called warez or cracks, and the individuals who created the materials were called warez d00dz (pronounced: wârz dōōdz). Initially, warez d00dz actively cracked software and games to quickly and efficiently trade large volumes of what were expensive materials. As computer technology changed, Internet connectivity became extremely common; digital materials like CDs and laser disks developed; and the warez d00dz began to become actively involved in the creation of pirated movies, music, and television. Thus, the contemporary warez scene has expanded to include the following: • •Music, television shows, and movies • •MP3s (volume counts) • •Digitally compressed movies before they are actually released (zero-day release) • •Cable and satellite descrambling • •DVD decoding • •Peer-to-peer (P2P) networking • •Console games (Taylor 69-72) Taylor, Robert W., Eric Fritsch, John Liederbach. Digital Crime and Digital Terrorism, 3rd Edition. Pearson Learning Solutions, 02/2014. VitalBook file.
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Please let me know if there is anything needs to be changed or added. I will be also appreciated that you can let me know if there is any problem or you have not received the workGood luck in your study and if you need any further help in your assignments, please let me knowCan you please confirm if you have received the work? Once again, thanks for allowing me to help youRMESSAGE TO STUDYPOOLNO OUTLINE IS NEEDED

https://www.studypool.com/discu
ss/5486468/please-completethe-questions-1
by Robert F

Submission date: 19-Jan-2018 01:25PM (UT C-0500)
Submission ID: 904440343
File name: Hacking_and_Ethics_1.docx (27.42K)
Word count: 449
Character count: 2535

https://www.studypool.com/discuss/5486468/please-completethe-questions-1
ORIGINALITY REPORT

2

%

SIMILARIT Y INDEX

2%

0%

0%

...


Anonymous
Great! 10/10 would recommend using Studypool to help you study.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags