group ii

15
Group II Group B 1 Members: 1. Emile BANGISHAKA ID: 1-2012-0065 2. Sylvie Gwiza ID: 1-2012-0933 3. Jerome NDAGIJIMANA ID: 1-2012-0881 4. Liliane MUKWIYE UWASE ID: 1-2012-0577 5. Aphrodis NZABANDORA ID: 1-2012-0067 6. Joseph MAGONDO ID: 1-2012- 0398 7. James MUZIGA ID: 1- 2012-1004 8. Adam NDUNGUTSE ID: 1-2012- 0831 9. Christian CYUBAHIRO ID: 1- 2012-0445

Upload: odeda

Post on 04-Jan-2016

50 views

Category:

Documents


0 download

DESCRIPTION

Group II. Members: 1. Emile BANGISHAKA ID: 1-2012-0065 2. Sylvie Gwiza ID: 1-2012-0933 3. Jerome NDAGIJIMANA ID: 1-2012-0881 4. Liliane MUKWIYE UWASE ID: 1-2012-0577 - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Group II

Group B 1

Group II

Members: 1. Emile BANGISHAKA ID: 1-2012-0065 2. Sylvie Gwiza ID: 1-2012-0933

3. Jerome NDAGIJIMANA ID: 1-2012-0881 4. Liliane MUKWIYE UWASE ID: 1-2012-0577

5. Aphrodis NZABANDORA ID: 1-2012-0067 6. Joseph MAGONDO ID: 1-2012-0398 7. James MUZIGA ID: 1-2012-1004 8. Adam NDUNGUTSE ID: 1-2012-0831 9. Christian CYUBAHIRO ID: 1-2012-0445

Page 2: Group II

Group B 2

Topic: Hacking

Page 3: Group II

Group B 3

1. What is hacking?• Computer hacking is most common among teenagers and young adults,

• although there are many older hackers as well.

• Many hackers are true technology buffs who enjoy learning more about how computers work and

consider computer hacking an “art” form.

• They often enjoy programming and have expert-level skills in one particular program.

• For these individuals, computer hacking is a real life application of their problem-solving skills.

• It’s a chance to demonstrate their abilities, not an opportunity to harm others.

Page 4: Group II

Group B 4

Hacking con’t• Computer hacking can also lead to other constructive technological developments, since many of the skills

developed from hacking apply to more mainstream chases.

• For example, former hackers Dennis Ritchie and Ken Thompson went on to create the UNIX Operating

System in the 1970s. This system had a huge impact on the development of Linux, a free UNIX-like

operating system. Shawn fanning, the creator of Napster, is another hacker well known for his

accomplishments outside of computer hacking.

• In comparison to those who develop an interest in computer hacking out of simple intellectual curiosity,

some hackers have less noble motives. Hackers who are out to steal personal information, change a

corporation’s financial data, break security codes to gain unauthorized network access, or conduct other

destructive activities are sometimes called “crackers.”

Page 5: Group II

Group B 5

2. Discuss Hacker ethicsThe idea of a "hacker ethic" is perhaps best formulated in Steven Levy's 1984 book,

Hackers: Heroes of the Computer Revolution. Levy came up with six tenets:

1. Access to computers - and anything which might teach you something about the way the world work - should be unlimited and total. Always profit to the Hands-On imperative!

2. All information should be free.

3. Mistrust authority - promote decentralization.

4. Hackers should be judged by their hacking, not bogus criteria such as degrees, age, race, or position.

5. You can create art and beauty on a computer.

6. Computers can change your life for the better.

Page 6: Group II

Group B 6

The goal of ethical hacking is to determine how to break in or create damage with the present programs

running, but only at the request of the company that owns the system and specifically to prevent others

from attacking it.

PHRACK, recognized as the "official" p/hacker newsletter, expanded on this principle with a

justification that can be summarized in three principles ("Doctor Crash," 1986).

1. First, hackers reject the notion that "businesses" are the only groups entitled to access and use of

modern technology.

2. Second, hacking is a major weapon in the fight against encroaching computer technology.

3. Finally, the high cost of equipment is beyond the means of most hackers, which results in the

perception that hacking and phreaking are the only recourse to spreading computer literacy to the

masses:

Hacker ethics con’t

Page 7: Group II

Group B 7

Hacker ethics con’t"Hacking. It is a full time hobby, taking countless hours per week to learn, experiment, and execute

the art of penetrating multi-user computers: Why do hackers spend a good portion of their time

hacking? Some might say it is scientific curiosity, others that it is for mental stimulation. But the true

roots of hacker motives run much deeper than that.”

[http://www.wisegeek.org/what-is-computer-hacking.htm#]

Page 8: Group II

Group B 8

Advantages of Ethical Hacking• The main advantage of ethical hacking is that companies are able to pay computer technicians to

attack their own system to learn where the weak spots are. This prevents identity theft and the

leaking of vital information. When a company learns where security in their system is lacking, it

allows them to implement stronger security measures.

• Ethical hacking also helps families of alive people to access accounts to see what their final viral

transmissions may have been or gain access to some accounts to close them down.

• It is also beneficial to help government entities to protect major computer systems from being

compromised in a way that national security would be an issue.

[http://project.cyberpunk.ru/idb/hacker_ethics.html]

Page 9: Group II

Group B 9

3. Why is hacking unethical practice?

• hacking is itself, automatically called as Unethical or illegal. Normally, hacking can be defined as

unauthorized breach of barriers put for the protection of important data, information and people as well.

• Initially hacking was all about breaking laws and accessing unauthorized information by certain groups

of people, specializing in Information Technology and Computer Programming.

some of the major computer companies such as Apple, IBM and Microsoft comprises of large team of

dedicated, talented and professional hackers.

• These hackers, however are not breaking the laws, so far nobody can tell. For an ethical hacker, their job

includes to test the newly developed program to find gaps in security system of the program.

Page 10: Group II

Group B 10

Con’t

• In simple words, an ethical hacker is a computer expert, who attacks a highly protected security system on

behalf of his owner with care and prevents the exploitation of the program that an unethical hacker might

cause harm.

• In order to test the program, ethical hacker makes use of methods as their less principled counterparts but

unethical hacker utilizes each resources and opportunity available to create malicious attack the security

system. On other hand, an unethical hacker is more of a vigilante, who is basically involve in exploiting

security vulnerabilities for some activists or person who wants to get unauthorized access to the system.

• The technical differences between Ethical and Unethical Hacking is ZERO, but what counts here is Moral

difference, which is substantive. At present, most of the companies have their own hackers. Both the

hackers seems to do well in their business, depends who hires them. It can be well termed as the fight

between Police Force and Criminals. Still, the debate will continue to go on for Ethical and Unethical

Hacking forever. [http://www.techmagnifier.com/opinion/ethical-and-unethical-hacking/]

Page 11: Group II

Group B 11

4. What benefits do hackers get from breaking into websites belonging to governments and business organizations?Computer hacking diffuses global society in the digital age. The act of breaking into a secure computer network

serves many purposes, from corporate espionage to blatant theft and political insubordination. Computer

hacking affects organizations in a variety of ways -- some universal, others specific to the nature of the reason

for hacking and the business in question. The direction of hacking -- whether the organization hacks or gets

hacked -- also has an effect.

Page 12: Group II

Group B 12

Interconnected Costs

According to an article published by the BBC, computer hacking cost companies in the United Kingdom

billions of pounds in 2004. In their paper "The Economics of Computer Hacking," economists Peter Lee

son and Christopher Coyne write that computer viruses created by hackers cost businesses $55 billion in

2003. In 2011, a single instance of hacking on the Play Station cost Sony more than $170 million, while

Google lost $500,000 due to hacking in 2005. According to Richard Power, editorial director of the

Computer Security Institute, single instances of hacking may cost as much as $600,000 to $7m a day for

online businesses in 2011, depending upon the revenue of the operation.

Page 13: Group II

Group B 13

InformationComputer hacking often revolves around information. Organizations steal information such as research,

business strategies, financial reports and more from one another through hacking operations. Digitized

client databases also fall victim to hacking, with hackers stealing names, addresses, emails and even

financial information from organizations. Such a loss of information to a small business may cost a

competitive edge or the complete loss of a client base, effectively corruption the organization. On the

opposite end of the spectrum, a business participating in computer hacking may gain a wealth of

information providing a competitive edge and access to new client bases through the act. Personal or

political information gained through computer hacking can serve as leverage in business or political

dealings.

Page 14: Group II

Group B 14

Organizational StructureThe structure of organizations before hacked, at risk for hacking or with extensive digital networks

requiring protection from hacking often reflects the threat of hacking. Businesses in such a position

employ extensive information technology (IT) teams, which work constantly on creating, updating,

developing and improving computer networks and safety to prevent or prevent hackers from

accessing information. Small businesses with limited budgets may face radical reorganization to

cope with such efforts, while new businesses anticipating such preventative measures must work

them into the initial business plan.

Page 15: Group II

Group B 15

Effects on Technology OrganizationsOrganizations in the computer and technology industry may benefit or lose significantly from

instances of computer hacking. Independent companies specializing in hacking prevention software

or network development stand to benefit extremely as the impact of hacking spreads throughout the

world. Small businesses in particular may expand operations exponentially if successful in obtaining

and retaining a client base. However, a company in this field whose product or efforts fail in the face

of hacking face a ruined reputation and thereby the potential loss of a client base and an inability to

attract additional clients.

[http://smallbusiness.chron.com/effects-computer-hacking-organization-17975.html]