Home page, Cryptography page, Security Principles page, Web Security page, Training page

Ethics

  • (4) Thou shalt not use a computer to steal.
  • (6) Thou shalt not copy or use proprietary software for which you have not paid (without permission).
  • (1) Thou shalt not use a computer to harm other people.
  • (10) Thou shalt always use a computer in ways that ensure consideration and respect for other humans.
  • Link to Ten commandment:

    https://en.wikipedia.org/wiki/Ten_Commandments_of_Computer_Ethics

    Scenario

    Billy was able to brute force his neighbors Disney plus account and now watches Disney without them knowing a he doesn't have to pay. He continues to use the account, even though he know he's doing the wrong thing. He's stealing from his neighbor with out them knowing. He's using a website he did not pay for. He could possibly be having them charged more monthly, he also seems to have zero respect for his neighbors to do something like this.

    Hackers

    Image description

    A common misconception is that all hackers are bad when really there two types of hackers.

  • White-Hat Hackers
  • Black-Hat Hackers
  • White-Hats can help you by testing your system and telling you where the weaknesses are, so you may better your systems protection. They hack for the better. There are hacker groups like "Trace Labs" who even use their skills to search for missing people.

    Black-Hat are the opposite of White-Hats they hack your system to steal your information not to protect it, But to use it to sell to criminals who could then in return rob you.

    Website Created by Mac Butler, Student at The John Carroll School