Question: Future Sessions AI and Military (UAS) Virtual Worlds Privacy and NSA Free Software Movement.

Slides:



Advertisements
Similar presentations
Hart District Acceptable Use Policy Acceptable Use Policy.
Advertisements

Michael Lacewing Can war be just? Michael Lacewing © Michael Lacewing.
Unethical Behavior. Ethical Being in agreement with the accepted main beliefs of right and wrong that rule the behavior of a profession.
Chapter 15: Making Decisions about Computers, Information, and Society Invitation to Computer Science, Java Version, Third Edition.
Invitation to Computer Science 5th Edition
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
Criminal Law and Procedure
Black, White, Grey Hat Hackers Not all hackers are bad…which one’s which?
Chapter 15 Intentional Torts Intentional Torts - When people deliberately cause harm or loss to another person Intent – the desire to commit an act for.
Computer Crimes and Security Professor Matt Thatcher.
Business Law Tort Law.
 Someone who exercises playful ingenuity  Misusers of the internet who try to obtain or corrupt information; people who try to prevent it.
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
Chapter 3 Tort Law.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
Professional Issues in Computing: Virtual Worlds Morality Kevin Macnish (IDEA CETL)
You must complete ALL of TASK THREE in the homework booklet – your teacher will give you a completion date. Complete pages 96 and 97 of your SPAG BOOKLET.
Computers and Crime Breaking and Entering Eavesdropping Harassment Vandalism Destruction of Private Property Possession of Stolen Goods Theft.
Private Wrongs: Torts Negligence and Strict Liability Chapter 14.
COMPUTER ETHICS What does it mean to be “ethical” on the computer?
Chapter 5 Test Review Test Friday.
Mod H-1 Examples of Computer Crimes. Mod H-2 Stuxnet.
1 CHAPTER 1 POLITICS. 2 Definitions Of The Word Hacker Hacker – someone who has achieved some level of expertise with a computer Hacker – someone who.
Computer Security And Computer Crimes. Problem under consideration A software flaw was found in a national bank's web site that allows anyone who knows.
 Ethical Hacking is testing the resources for a good cause and for the betterment of technology.  Technically Ethical Hacking means penetration.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
“Ethics Online” Shaping social behavior online takes more than new laws and modified edicts. Deborah G. Johnson Communications of the ACM Vol. 40, No.
Kant’s deontological ethics
Michael Lacewing Deception and lies Michael Lacewing
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
1 Ethics of Computing MONT 113G, Spring 2012 Session 37 Digital Order.
BUS1MIS Management Information Systems Semester 1, 2012 Week 7 Lecture 1.
Computer Ethics.
SOCW 671 #3 Research Ethics and Diversity. Class Session Objectives Selecting and informing persons participating in research Preventing and detecting.
Identity Theft By: Chelsea Thompson. What is identity theft? The crime of obtaining the personal or financial information of another person for the purpose.
Your Rights and Responsibilities A picture guide to your rights and responsibilities as a person who receives services from the DMR 6/2008.
Aggression.
 In most countries of the world, the “information revolution” has altered many aspects of life significantly: commerce, employment, medicine, security,
Ethical and Legal Issues v Ethical and legal issues are relevant to any project involving systems development. – privacy – professionalism – ownership.
RISK ASSESSMENT. What is Risk Assessment? It is an examination of what we do, to determine the things that can cause harm to people It allows us to decide.
2007- Jonathan Andrew A Evans LIFEGUARD & THE LAW WHAT HAPPENS AFTER THE RESCUE?
Mrs. Stern Computer Applications II. What is Computer Crime?  Criminals Can Operate Anonymously Over the Computer Networks.  Be careful about talking.
What does secure mean? You have been assigned a task of finding a cloud provider who can provide a secure environment for the launch of a new web application.
“The act of gaining unauthorized access to computer systems (cracking) should not be criminalized assuming that there is no damage.” Dan Garrison Megan.
Copyright © 2012 Pearson Education, Inc. All rights reserved. Ethics: Theory and Practice Jacques P. Thiroux Keith W. Krasemann.
Ethical Hacking Han Li  Ethical Hacking is testing the resources for a good cause and for the betterment of technology.  Technically Ethical Hacking.
 Internet crime is, Any crime or illegal activity committed online or through the internet.
CS 4001Mary Jean Harrold1 Class 25 ŸComputer crime ŸAssign ŸTerm paper—due 11/20.
Defences for Negligence. The best defence is Negligence did not exist, or the defendant didn’t owe the plaintiff a duty of care. The best defence is Negligence.
ICT and the Law Mr Conti. Did you see anything wrong with that? Most people wouldn’t want that sort of information posted in a public place. Why? Because.
Ethical Implications In The Age Of Information
1 Ethical Issues in Computer Science CSCI 328, Fall 2013 Session 5 Analogical Reasoning.
Whats it all about?.  C omputer crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of.
Civil Law An overview of Tort Law – the largest branch of civil law Highlight the differences between tort law and criminal law How torts developed historically.
Professional Ethics and Responsibilities Part-II
TORTS: A CIVIL WRONG Chapter 18. TORTS: A CIVIL WRONG Under criminal law, wrongs committed are called crimes. Under civil law, wrongs committed are called.
 Define hacking  Types of hackers  History  Intentions  Statistics  Facts  How to Protect yourself.
Social Impacts of IT: P6 By André Sammut. Social Impacts IT impacts our life both in good ways and bad ways. Multiplayer Games Social Networks Anti-social.
ETHICS Internet And Online Community Week 10.
HACKING VS PENTESTING NURUL HAFIZAH HAZWNI BINTI HASHIM (MCS151019)
Hacking, Security, and Information War
Online Safety! By: Michelle Deng.
Lecture 01: A Brief Summary
Branches of the Law 10PEF Legal Studies.
Internet And Online Community Week 10
Introduction to computer networks
What is a crime? Write a brief definition.
War and Violence Can war be just?.
Presentation transcript:

Question: Future Sessions AI and Military (UAS) Virtual Worlds Privacy and NSA Free Software Movement

Professional Issues in Computing: Hacking Kevin Macnish (IDEA CETL)

Plan “Hacking” What’s wrong? –Harm –Consent –Lying Hackers’ lines of defence –The significance of intention –Specific lines of defence

What is “Hacking”? Breaking into systems Modifying programs Improvising

What is “Hacking”? Breaking into systems Modifying programs Improvising

Which Hat are You Wearing? White Hat Grey Hat Black Hat

Which Hat are You Wearing? Grey Hat Black Hat

Which Hat are You Wearing? White Hat Grey Hat

Which Hat are You Wearing? White Hat Grey Hat Black Hat Intention Consent

What is Your Purpose? Pen testing Cyber crime (e.g. Interview) State-sponsored –Espionage (e.g. NSA) –Disruption (e.g. Stuxnet, SEA) Lone wolf (McKinnon) Hacktivist (Anonymous, Wikileaks)

Ethical Concerns Interview with a Blackhat Not without ethics –Paedophiles and revenge porn fair game –Felt bad when friend victim Real victims Stealing money Making people vulnerable

What’s Wrong with Hacking - Effects Harm & Damage –Loss of productivity –Financial losses –Damage to equipment Interference & violating autonomy –Preventing equipment from functioning –Stopping people doing what they want to do Violations of Privacy –Theft of phone numbers, bank records, etc.

Exposing Weaknesses

TinKode

What’s Wrong with Hacking - Consent Analogy with trespass –Property rights: may control access to and the use of property. “If you leave the door open, you can’t complain if someone enters.” –Yes, you can. Consent is the key issue –What access to their computer systems has the user been given consent to access? –If you accept the trespass analogy, effectiveness of security is irrelevant.

Use Without Consent You do not have consent to use your neighbour’s property –Entering their house for fun is not permissible –Entering their house to rescue a child is right Violating people’s property rights is always problematic, but it can be outweighed.

What’s Wrong with Hacking – Lying / Deception Presenting yourself as someone else –E.g. at login as a system administrator In virtually every ethical theory there is something wrong about lying and deception –even where it can sometimes be outweighed

Lines of Defence

Intention – “I didn’t mean to harm anyone” Triviality – “we’re just a few meddling kids” Benefit of exposing lax security Educational benefit to the hacker “Hacktivism” as civil disobedience Which (if any) of these do you think is a convincing defence?

Intention Intention is relevant to blame –Connected with belief / knowledge –Adds wrong motives to wrong actions –Murder worse than manslaughter But you can still do the wrong thing even if your motives are innocent –Manslaughter is still wrong!

Triviality – “just kids messing” Trivial wrong is still wrong Proportionality –Lesser wrongs deserve lesser blame/criticism What’s trivial? –The wrong or the perpetrators? This objection has some (limited) force –But only if the wrongs really are trivial –Trivial to whom?

Benefit to the Hacked Claim: the hacker benefits the hacked organisation –Security weaknesses are highlighted –Some advise sys admins how to deal with weaknesses Assumes there are wrongs in hacking –If so, then the “benefit to the hacked” defence fails –Or is it only consequences that matter? Is it acceptable to wrong someone in order to show them that they are in danger of being wronged? –E.g. Rape –Issue of consent again – could be implied? –What if you do this to a complete stranger?

Hacktivism as Civil Disobedience When is civil disobedience justified? –Wider question –Includes context Importance of democracy –In democracies there is a fair decision procedure, so it is not normally justified to reject rules agreed by democratic procedure. –Sometimes it is still justified

Weighing Reasons Against Lying/deception No consent Possible harms Against the law In favour ?

Recap “Hacking” What’s wrong? Hackers’ lines of defence