0% found this document useful (0 votes)
59 views13 pages

Ethics Project Report

The document discusses hacking and software privacy. It provides introductions and types of each topic, examples, real news stories, and social implications. It contains information on ethical and unethical hacking, malware, ego hacking, compromised servers for sale, and the IRS suspending a contract with Equifax after its data breach.

Uploaded by

Heng YiJun
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
59 views13 pages

Ethics Project Report

The document discusses hacking and software privacy. It provides introductions and types of each topic, examples, real news stories, and social implications. It contains information on ethical and unethical hacking, malware, ego hacking, compromised servers for sale, and the IRS suspending a contract with Equifax after its data breach.

Uploaded by

Heng YiJun
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 13

Table of Contents

1. Hacking.....................................................................................................….

1.1. Introduction in Hacking....................................................................…. 1

1.2. Types of Hacking..............................................................................…..2

1.3. Examples for Hacking......................................................................…...3

1.4. Real-life news in Hacking..................................................................….5

1.5. Social and ethical implications........................................................……7

Reference……………………………………………………………………8

2. Software Privacy………………………………………………………….…

2.1. Introduction of Software Privacy…………………………………...…9

2.2. Types of Privacy Software…………………………………………….9

2.3. Real-life news in Software Privacy……………………………………11

2.4. Social and ethical implications………………………………………...13

Reference…………………………………………………………………...15

0
1.1. Introduction in Hacking

Hacking is identifying weakness in computer systems or networks to exploit its weaknesses to gain access. For example, of Hacking is using password cracking

algorithm to gain access to a system.

Hacking is also an attempt to exploit a computer system or a private network inside a computer. It is the unauthorized access to or control over computer

network security systems for some illicit purpose.

Another way to be better describe hacking, needs to first understand hackers. One can easily assume them to be intelligent and highly skilled in computers. In

fact, breaking a security system requires more intelligence and expertise than actually creating one. There are no hard and fast rules whereby we can categorize

hackers into neat compartments. However, in general computer parlance, we call them white hats, black hats and grey hats.

White hat hackers hack to check their own security systems to make it more hack-proof. In most cases, they are part of the same organization.

Black hat hackers hack to take control over the system for personal gains. They can destroy, steal or even prevent authorized users from accessing the system.

They doing this by finding loopholes and weaknesses in the system. Some computer experts call them crackers instead of hackers.

Grey hat hackers comprise curious people who have just about enough computer language skills to enable them to hack a system to locate potential loopholes in

the network security system.

Grey hats hacker is different from Black hat hacker in the sense that the former notifies the admin of the network system about the weaknesses discovered in the

system, whereas the latter is only looking for personal gains. All kinds of hacking are considered illegal barring the work done by white hat hackers.

1
1.2 Types of Hacking

Ethical Hacking

Ethical hackers are experts who work in agreement with organizations, companies and brands in order to uncover security vulnerabilities.

Essentially, an ethical hacker will try to gain access to a network, computer, or system the same way a criminal hacker would only if they’re able, they aren’t

looking to cause any damage. Instead of these, they’ll report the vulnerabilities so they can be properly patched and fixed before a malicious hacker finds them.

Malware Hacking

Installing malware on a victim’s computer can be a key part of identity theft, but malware can have other nefarious consequences that have nothing to do with

stealing your information.

A hacker might also infect your computer with ransomware to extort money out of you in exchange for your own personal files.

Ego Hacking

Some hackers like to break into websites, computers and systems simply to prove that they can. In certain hacker communities, accomplishing difficult hacks

and bypassing tight security is worn as a badge of honor.

There’s also a sizable contingent of “grey hat” hackers, who seek out exploits and vulnerabilities in order to bring them to the attention of the people in charge

of fixing them. The difference between a grey hat hacker and an ethical hacker, however, is that grey hats don’t have permission to do this ahead of time.

2
1.3. Example for Hacking

Ethical Hacking

For example, exploiting or exposing a website in order to discover its weak points. Then report your findings and let the appropriate person fix those

vulnerabilities. Then in the future, should they come under attack, they will be that bit safer. You are actually preparing them for any real threat of attack because

you are eliminating the areas which could possibly be exploited against them.

United States Air Force used it to conduct a security evaluation of an operating system. They were able to discover flaws like vulnerable hardware, software and

procedural security. They determined that even with a relatively low level of effort, their security can be bypassed and the intruder would get away with precious

information. This way, they could determine exactly how secure their system was. This is perhaps one of the best examples of ethical hacking because they were

sanctioned by the people who were responsible for the creation of the said online system. They recognized the need for such action because they know that there

are a lot of people capable of doing the same thing, or inflicting the same harm to their system.

Malware Hacking

For example, a hacker could recruit your computer to a botnet using zombieware. This would have minimal impact on you, personally, but it means they could

use your computer as part of a larger-scale attack on a high-value target.

Ego Hacking

Our logical brain and our emotional brain aren’t as connected as we might imagine. For example, in the workshop, we do an experiment where I give you 10

completely untrue negative comments in a row. You will logically know that none of what I say is true. Within just a minute, your self-esteem and self-

confidence would likely be impacted — and you logically know that I wasn’t saying anything real.

3
1.4. Real-Life News in Hacking

News 1

KUALA LUMPUR (THE STAR/ASI A NEWS NETWORK) - Malaysia's national cybersecurity agency said it detected intrusions in several local servers for

years and issued advisories to victims but ignorance was still making them easy targets for hackers.

It was found that over 2,100 servers have been compromised and their access sold to hackers for as low as RM29 (S$9.50) up to RM24,600 on an underground

cybercrime shopping website, xDedic, the "eBay of cybercrime" where hackers shop access and passwords for infiltrated servers worldwide for criminals to buy.

These servers belong to government agencies, banks, universities and businesses, said computer security company Kaspersky Lab, which unearthed the market.

Once in the server, hackers can have all the personal information of users attached to that server.

As at June 15, there were 70,624 hacked servers up for sale. Malaysian servers were the 10th most in demand, it said.

Cyber Security Malaysia chief executive Amirudin Abdul Wahab said his agency would work with Kaspersky Lab to get more details on the compromised

servers and offer assistance in fixing the intrusions.

But that will be difficult, if the victims do not know they are victims or had taken a lackadaisical approach to cybersecurity, he said.

"Cybersecurity is everyone's responsibility. People thought having a firewall is enough but the most vulnerable part of cybersecurity is still people. You can have

a firewall but when a worker opens something with his computer, it gets in.

"Then many don't have the proper process of managing things, you have to cover the whole ecosystem in cybersecurity," he said.

Dr Amirudin said companies may engage the agency's Cyber DEF service to skim their servers for intrusions and to clean and plug any weaknesses.

The Kaspersky Lab report comes as Science, Technology and Innovation Minister Datuk Seri Madius Tangau called for Malaysian companies and agencies to

have more cyber resilience and adopt better practices that would allow them to recover quickly from cyber-attacks.

"In today's cyber threat scape, we need to recognize that security goes beyond systems, software or IT departments. Cyber resilience focuses on the preventive,

detective and reactive controls in an IT environment to assess gaps and drive enhancements to the overall security posture of the entity," he said during a soft

launch for Cybersecurity Malaysia's Award, Conference and Exhibition on Thursday (June 16).

The conference and exhibition will see industry experts discussing the latest threats to cybersecurity and preventive measures that need to be taken.

News 2

WASHINGTON — The IRS suspended a $7.25 million contract with the credit reporting company Equifax Friday after members of Congress complained the tax

agency had awarded a no-bid contract to a company that recently had a massive data beach.

The IRS had contracted with Equifax to validate the identity of taxpayers communicating with the agency on the telephone or through its website.

In a statement Friday, the IRS said it suspended the contract as “a precautionary step” while the agency reviews the company’s security systems.

“During this suspension, the IRS will continue its review of Equifax systems and security,” the statement reads. “There is still no indication of any compromise

of the limited IRS data shared under the contract.”

Equifax revealed in September that hackers had obtained the personal information of more than 145 million people. Hackers stole Social Security numbers, birth

dates and addresses, and in some cases driver’s license numbers.

Equifax CEO Richard Smith stepped down. He later went before Congress for a public shaming in which he apologized.

4
Members of Congress from both political parties expressed outrage over the IRS contract.

“Given that Equifax failed to secure their own systems and provide timely notifications of a massive security breach, they should have never been an option for

hire by the IRS,” said Sen. Orrin Hatch, R-Utah, chairman of the Senate Finance Committee.

Sen. Sherrod Brown, D-Ohio, said: “Suspending the IRS contract is only the first step. We cannot know taxpayers are protected until Equifax is banned from all

federal contracts.”

Equifax issued a statement Friday that said, “We remain confident that we are the best party to perform the services required in this contract. We are engaging

IRS officials to review the facts and clarify available options.”

While the contract is suspended, taxpayers will not be able to create new accounts in the tax agency’s Secure Access program, which enables taxpayers to

securely access certain IRS services online. The IRS said taxpayers who already have accounts will not be affected.

5
1.5. Social and ethical implications 

Why Did the IRS pay Equifax $7.25 Million to Help Prevent Fraud? 

It’ s hard to believe the IRS will give Equifax $7.25 million to verify taxpayer identities and help prevent fraud under a no-bid contract. What were they thinking?

Alas, the IRS wasn’t thinking because if it was, the agency would have realized that rewarding Equifax after hackers made off with sensitive personal informa-

tion of more than 140 million Americans is rewarding bad behavior. This creates a moral hazard dilemma whereby an organization feels free to repeat the behav-

ior since there are no consequences. 

At least Congress is investigating the hacking incident, although if you expect them to do anything constructive, then I have some swamp land in New Jersey I’d

like to sell to you. This raises the question whether our government can, in fact, protect us against more intrusive forms of hacking. You’d have to be a naïve per -

son to think so given the allegations of hacking in our 2016 elections. 

Now comes a report that Kaspersky Lab may have participated in a Russian hack of  a NSA contractor. Apparently, the contractor’s use of Kaspersky’s antivirus

software “alerted Russian hackers to the presence of files that may have been taken from the NSA.” Once the machine was in their sights, the Russian hackers in-

filtrated it and obtained a significant amount of data, according to a report in the Wall Street Journal. 

Cybersecurity is a serious problem today and is likely to get worse over time. Hackers and other evil-doers care less about the ethics of their practices and more

about wreaking havoc on others by stealing their personal, and many times sensitive data. 

Since my blog provides workplace advice, here are a few things you can do to keep your computer safe from hackers and viruses identified in a Miami Herald ar-

ticle. 

1. Use anti-virus software and keep it up to date, 

2. Don’t open emails or attachments from unknown sources. 

3. Use hard-to-guess passwords and change them frequently. 

4. Disconnect your computer from the Internet when not in use. 

5. Check your security on a regular basis and run scans. 

6. Back up your computer data regularly. 

It’s frustrating for all of us today to think we must take measures to protect ourselves from hackers who, we know, can create unspeakable breaches of our pri -

vacy. Privacy rights should be a given in a society like ours. However, we’ve passed the point of no return where others play by The Golden Rule. 

Reference 

Introduction in Hacking 

https://economictimes.indiatimes.com/definition/hacking 

Types of Hacking 

https://www.safetydetectives.com/blog/what-is-hacking/ 

Examples for Hacking 

6
https://www.safetydetectives.com/blog/what-is-hacking/ 

https://medium.com/@TheFarmanShekh/examples-of-ethical-hacking-how-hacking-can-improve-our-lives-fbf6ec1c9b1d 

Real-life news in Hacking 

https://www.straitstimes.com/asia/se-asia/more-than-2100-servers-in-malaysia-have-been-hacked-says-cybersecurity-agency 

https://www.pbs.org/newshour/nation/irs-suspends-7-25-million-equifax-contract-pressure-congress

Social and ethical implications 

https://www.workplaceethicsadvice.com/2017/10/social-media-ethics-and-the-implications-of-hacking.html 

7
2.0 Software Piracy

2.1 Introduction

Definition of Software Piracy

Software piracy is the illegal copying, distribution, or use of software. It is such a profitable “business” that it has caught the attention of organized crime groups

in a number of countries. According to the Business Software Alliance (BSA), about 36% of all software in current use is stolen.

2.2 Types of Software Piracy

There are five main type of software piracy

 Counterfeiting

This type of piracy is the illegal duplication, distribution, or sale of copyrighted material with the intent of imitating the copyrighted product. In the case

of packaged software, it is common to find counterfeit copies of the compact discs incorporating the software programs, as well as related packaging,

manuals, license agreements, labels, registration cards, and security features.

 Internet Piracy

This occurs when unauthorized software is downloaded from the Internet. The same purchasing rules apply to on-line software purchases as for those

bought in compact disc format. Common Internet piracy techniques are:

1. Websites that make software available for free download or in exchange for others

2. Internet auction sites that offer counterfeit or out-of-channel software

3. Peer-to-peer networks that enable unauthorized transfer of copyrighted programs

 End User Piracy

This occurs when an individual reproduces copies of software without authorization. These include:

1. Using one licensed copy to install a program on multiple computers

2. Copying discs for installation or distribution

3. Taking advantage of upgrade offers without having a legal copy of the version to be upgraded

8
4. Acquiring academic or other restricted or non-retail software without a proper license

5. Swapping discs in or outside the workplace

 Client-Server Overuse

This type of piracy occurs when too many users on a network are using a central copy

of a program at the same time. If you have a local-area network and install programs on the server for several people to use, you have to be sure your

license entitles you to do so. If you have more users than allowed by the license, that's "overuse".

 Hard-Disk Loading

This occurs when a business sells new computers with illegal copies of software loaded onto the hard disks to make the purchase of the machines more

attractive

10
Real-life News of Software Piracy

A 26-year-old California man who pleaded guilty last December to criminal copyright infringement charges was sentenced today to 87 months in federal prison --

the longest U.S. sentence ever for software piracy -- for his role in illegally copying and selling pirated software.

Nathan Peterson, of Antelope Acres, Calif., was sentenced today in U.S. District Court in Alexandria, Va. and ordered to pay $5.4 million in restitution,

according to the Software & Information Industry Association (SIIA), a software and digital content trade group based in Washington.

Peterson, former owner of the Web-based business, iBackups, illegally copied and sold software by mail and over the Internet, according to the government

statement. Officials called his operation "one of the largest for-profit software piracy Web sites to operate in the United States."

Peterson pleaded guilty in December to the charges of selling illegal software valued at more than $20 million. He earned $5.4 million from the illegal sales,

equal to the amount of restitution he must pay.

In his plea agreement, Peterson said he began his piracy business in 2003 and operated it until February 2005, when it was shut down by the FBI following an

undercover investigation. Peterson controlled the www.ibackups.net site, which sold copies of software products that were copyrighted by companies such as

Adobe Systems, Inc., Macromedia Inc., Microsoft Corp, Sonic Solutions and Symantec Corp. at prices substantially below suggested retail, according to

prosecutors.

The software products purchased on Peterson's Web site were reproduced and distributed either by instantaneous computer download of an electronic copy and/or

by shipment of a CD copy through the mail. Peterson often included a serial number that allowed the purchaser to activate and use the product, according to the

government.

"SIIA appreciates the tireless work of both the FBI and the US Attorney's Office," Keith Kupferschmid, SIIA's vice president of intellectual property policy and

enforcement, said in a statement. "We brought this activity to light in order to stop a specific crime from being perpetrated against our members. Law

enforcement's decision to aggressively pursue this case, I believe, sends a message to those who illegally copy and sell software that they will be punished to the

fullest extent of the law."

11
Social and Ethical Implications

Getting a hold of software without buying it is increasingly easy; whether by borrowing a friend’s copy or downloading it illegally from the Internet, millions of

people around the world do it.

The copyright infringement of software, or software piracy, is illegal in many countries. Even in countries where there are not legal measures in place for the

protection of copyrighted software, there are some compelling ethical issues that may be considered both for and against software piracy.

 Moral Responsibility

Moral arguments to follow the law date back to Plato, and one pertinent argument is attributed to British classicist W. D. Ross, who states in his 1930 "The Right

and the Good": “The duty of obeying the laws of one's country arises partly … from the duty of gratitude for the benefits one has received from it.”

If someone agrees that the law should not be broken, and the law says not to break copyright laws, as does the Digital Millennium Copyright Act (DMCA) in the

United States, citizens should not do so.

Other arguments that say using pirated software is morally wrong include the loss of revenue to the creator of the software, and that without software being paid

for creators will give up designing new software and there will be less software being created in the future.

According to G. Frederick: in “Software Piracy: Some Facts, Figures, and Issues,” 82 percent of PC software used in China is pirated. Advocates against piracy

would ask how much revenue to software companies is lost every year in China alone.

 Arguments in favor of software piracy

Software licenses cost the same wherever in the world you buy them, but wages vary greatly over the world. People in countries with lower GDP per capita will

therefore find it harder to buy software, which can be considered to be unfair to them and emerging market economies.

In reference to China, Microsoft CEO Bill Gates famously said: “As long as they are going to steal it, we want them to steal ours. They'll get sort of addicted, and

then we'll somehow figure out how to collect sometime in the next decade.” Here the “biggest loser” of software piracy seems to be condoning it to some degree.

Another ethical argument that can be considered is consequentialism, which can be defined as “the consequences of a particular action form the basis for any

valid moral judgment about that action.” Traian Basescu, Romanian president as of 2010, invoked a consequentialist argument when he said: "piracy helped the

young generation discover computers. It set off the development of the IT industry in Romania."

 Professional standards

The Association for Computing Machinery, or ACM, claims to be the “world’s largest educational and scientific computing society.” Any person wishing to join

the society must accept a “Code of Ethics and Professional Conduct”, which covers the ethical issues surrounding software piracy.

Consequence and Impact of Software Piracy

The losses suffered as a result of software piracy directly affect the profitability of the software industry. Because of the money lost to pirates, publishers have

fewer resources to devote to research and development of new products, have less revenue to justify lowering software prices and are forced to pass these costs

on to their customers. Consequently, software publishers, developers, and vendors are taking serious actions to protect their revenues.

12
Using pirated software is also risky for users. Aside from the legal consequences of using pirated software, users of pirated software forfeit some practical

benefits as well. Those who use pirate software:

 Increase the chances that the software will not function correctly or will fail completely

 Forfeit access to customer support, upgrades, technical documentation, training, and bug fixes

 Have no warranty to protect themselves

 Increase their risk of exposure to a debilitating virus that can destroy valuable data

 May find that the software is actually an outdated version, a beta (test) version, or a non-functioning copy

 Are subject to significant fines for copyright infringement

 Risk potential negative publicity and public and private embarrassment

References

I. Todd R. Weiss (2006, September 8), Software pirate gets 87 months in prison, Computerworld.

https://www.computerworld.com/article/2547659/software-pirate-gets-87-months-in-prison.html

II. Panda Security (2019, April 22), What is Software Piracy. https://www.pandasecurity.com/mediacenter/panda-security/software-piracy/

13

You might also like