Ethics Project Report
Ethics Project Report
1. Hacking.....................................................................................................….
1.1. Introduction in Hacking....................................................................…. 1
1.3. Examples for Hacking......................................................................…...3
Reference……………………………………………………………………8
2. Software Privacy………………………………………………………….…
Reference…………………………………………………………………...15
0
1.1. Introduction in Hacking
Hacking is identifying weakness in computer systems or networks to exploit its weaknesses to gain access. For example, of Hacking is using password cracking
Hacking is also an attempt to exploit a computer system or a private network inside a computer. It is the unauthorized access to or control over computer
Another way to be better describe hacking, needs to first understand hackers. One can easily assume them to be intelligent and highly skilled in computers. In
fact, breaking a security system requires more intelligence and expertise than actually creating one. There are no hard and fast rules whereby we can categorize
hackers into neat compartments. However, in general computer parlance, we call them white hats, black hats and grey hats.
White hat hackers hack to check their own security systems to make it more hack-proof. In most cases, they are part of the same organization.
Black hat hackers hack to take control over the system for personal gains. They can destroy, steal or even prevent authorized users from accessing the system.
They doing this by finding loopholes and weaknesses in the system. Some computer experts call them crackers instead of hackers.
Grey hat hackers comprise curious people who have just about enough computer language skills to enable them to hack a system to locate potential loopholes in
Grey hats hacker is different from Black hat hacker in the sense that the former notifies the admin of the network system about the weaknesses discovered in the
system, whereas the latter is only looking for personal gains. All kinds of hacking are considered illegal barring the work done by white hat hackers.
1
1.2 Types of Hacking
Ethical Hacking
Ethical hackers are experts who work in agreement with organizations, companies and brands in order to uncover security vulnerabilities.
Essentially, an ethical hacker will try to gain access to a network, computer, or system the same way a criminal hacker would only if they’re able, they aren’t
looking to cause any damage. Instead of these, they’ll report the vulnerabilities so they can be properly patched and fixed before a malicious hacker finds them.
Malware Hacking
Installing malware on a victim’s computer can be a key part of identity theft, but malware can have other nefarious consequences that have nothing to do with
A hacker might also infect your computer with ransomware to extort money out of you in exchange for your own personal files.
Ego Hacking
Some hackers like to break into websites, computers and systems simply to prove that they can. In certain hacker communities, accomplishing difficult hacks
There’s also a sizable contingent of “grey hat” hackers, who seek out exploits and vulnerabilities in order to bring them to the attention of the people in charge
of fixing them. The difference between a grey hat hacker and an ethical hacker, however, is that grey hats don’t have permission to do this ahead of time.
2
1.3. Example for Hacking
Ethical Hacking
For example, exploiting or exposing a website in order to discover its weak points. Then report your findings and let the appropriate person fix those
vulnerabilities. Then in the future, should they come under attack, they will be that bit safer. You are actually preparing them for any real threat of attack because
you are eliminating the areas which could possibly be exploited against them.
United States Air Force used it to conduct a security evaluation of an operating system. They were able to discover flaws like vulnerable hardware, software and
procedural security. They determined that even with a relatively low level of effort, their security can be bypassed and the intruder would get away with precious
information. This way, they could determine exactly how secure their system was. This is perhaps one of the best examples of ethical hacking because they were
sanctioned by the people who were responsible for the creation of the said online system. They recognized the need for such action because they know that there
are a lot of people capable of doing the same thing, or inflicting the same harm to their system.
Malware Hacking
For example, a hacker could recruit your computer to a botnet using zombieware. This would have minimal impact on you, personally, but it means they could
Ego Hacking
Our logical brain and our emotional brain aren’t as connected as we might imagine. For example, in the workshop, we do an experiment where I give you 10
completely untrue negative comments in a row. You will logically know that none of what I say is true. Within just a minute, your self-esteem and self-
confidence would likely be impacted — and you logically know that I wasn’t saying anything real.
3
1.4. Real-Life News in Hacking
News 1
KUALA LUMPUR (THE STAR/ASI A NEWS NETWORK) - Malaysia's national cybersecurity agency said it detected intrusions in several local servers for
years and issued advisories to victims but ignorance was still making them easy targets for hackers.
It was found that over 2,100 servers have been compromised and their access sold to hackers for as low as RM29 (S$9.50) up to RM24,600 on an underground
cybercrime shopping website, xDedic, the "eBay of cybercrime" where hackers shop access and passwords for infiltrated servers worldwide for criminals to buy.
These servers belong to government agencies, banks, universities and businesses, said computer security company Kaspersky Lab, which unearthed the market.
Once in the server, hackers can have all the personal information of users attached to that server.
As at June 15, there were 70,624 hacked servers up for sale. Malaysian servers were the 10th most in demand, it said.
Cyber Security Malaysia chief executive Amirudin Abdul Wahab said his agency would work with Kaspersky Lab to get more details on the compromised
But that will be difficult, if the victims do not know they are victims or had taken a lackadaisical approach to cybersecurity, he said.
"Cybersecurity is everyone's responsibility. People thought having a firewall is enough but the most vulnerable part of cybersecurity is still people. You can have
a firewall but when a worker opens something with his computer, it gets in.
"Then many don't have the proper process of managing things, you have to cover the whole ecosystem in cybersecurity," he said.
Dr Amirudin said companies may engage the agency's Cyber DEF service to skim their servers for intrusions and to clean and plug any weaknesses.
The Kaspersky Lab report comes as Science, Technology and Innovation Minister Datuk Seri Madius Tangau called for Malaysian companies and agencies to
have more cyber resilience and adopt better practices that would allow them to recover quickly from cyber-attacks.
"In today's cyber threat scape, we need to recognize that security goes beyond systems, software or IT departments. Cyber resilience focuses on the preventive,
detective and reactive controls in an IT environment to assess gaps and drive enhancements to the overall security posture of the entity," he said during a soft
launch for Cybersecurity Malaysia's Award, Conference and Exhibition on Thursday (June 16).
The conference and exhibition will see industry experts discussing the latest threats to cybersecurity and preventive measures that need to be taken.
News 2
WASHINGTON — The IRS suspended a $7.25 million contract with the credit reporting company Equifax Friday after members of Congress complained the tax
agency had awarded a no-bid contract to a company that recently had a massive data beach.
The IRS had contracted with Equifax to validate the identity of taxpayers communicating with the agency on the telephone or through its website.
In a statement Friday, the IRS said it suspended the contract as “a precautionary step” while the agency reviews the company’s security systems.
“During this suspension, the IRS will continue its review of Equifax systems and security,” the statement reads. “There is still no indication of any compromise
Equifax revealed in September that hackers had obtained the personal information of more than 145 million people. Hackers stole Social Security numbers, birth
Equifax CEO Richard Smith stepped down. He later went before Congress for a public shaming in which he apologized.
4
Members of Congress from both political parties expressed outrage over the IRS contract.
“Given that Equifax failed to secure their own systems and provide timely notifications of a massive security breach, they should have never been an option for
hire by the IRS,” said Sen. Orrin Hatch, R-Utah, chairman of the Senate Finance Committee.
Sen. Sherrod Brown, D-Ohio, said: “Suspending the IRS contract is only the first step. We cannot know taxpayers are protected until Equifax is banned from all
federal contracts.”
Equifax issued a statement Friday that said, “We remain confident that we are the best party to perform the services required in this contract. We are engaging
While the contract is suspended, taxpayers will not be able to create new accounts in the tax agency’s Secure Access program, which enables taxpayers to
securely access certain IRS services online. The IRS said taxpayers who already have accounts will not be affected.
5
1.5. Social and ethical implications
Why Did the IRS pay Equifax $7.25 Million to Help Prevent Fraud?
It’ s hard to believe the IRS will give Equifax $7.25 million to verify taxpayer identities and help prevent fraud under a no-bid contract. What were they thinking?
Alas, the IRS wasn’t thinking because if it was, the agency would have realized that rewarding Equifax after hackers made off with sensitive personal informa-
tion of more than 140 million Americans is rewarding bad behavior. This creates a moral hazard dilemma whereby an organization feels free to repeat the behav-
At least Congress is investigating the hacking incident, although if you expect them to do anything constructive, then I have some swamp land in New Jersey I’d
like to sell to you. This raises the question whether our government can, in fact, protect us against more intrusive forms of hacking. You’d have to be a naïve per -
Now comes a report that Kaspersky Lab may have participated in a Russian hack of a NSA contractor. Apparently, the contractor’s use of Kaspersky’s antivirus
software “alerted Russian hackers to the presence of files that may have been taken from the NSA.” Once the machine was in their sights, the Russian hackers in-
filtrated it and obtained a significant amount of data, according to a report in the Wall Street Journal.
Cybersecurity is a serious problem today and is likely to get worse over time. Hackers and other evil-doers care less about the ethics of their practices and more
about wreaking havoc on others by stealing their personal, and many times sensitive data.
Since my blog provides workplace advice, here are a few things you can do to keep your computer safe from hackers and viruses identified in a Miami Herald ar-
ticle.
It’s frustrating for all of us today to think we must take measures to protect ourselves from hackers who, we know, can create unspeakable breaches of our pri -
vacy. Privacy rights should be a given in a society like ours. However, we’ve passed the point of no return where others play by The Golden Rule.
Reference
Introduction in Hacking
https://economictimes.indiatimes.com/definition/hacking
Types of Hacking
https://www.safetydetectives.com/blog/what-is-hacking/
6
https://www.safetydetectives.com/blog/what-is-hacking/
https://medium.com/@TheFarmanShekh/examples-of-ethical-hacking-how-hacking-can-improve-our-lives-fbf6ec1c9b1d
https://www.straitstimes.com/asia/se-asia/more-than-2100-servers-in-malaysia-have-been-hacked-says-cybersecurity-agency
https://www.pbs.org/newshour/nation/irs-suspends-7-25-million-equifax-contract-pressure-congress
https://www.workplaceethicsadvice.com/2017/10/social-media-ethics-and-the-implications-of-hacking.html
7
2.0 Software Piracy
2.1 Introduction
Software piracy is the illegal copying, distribution, or use of software. It is such a profitable “business” that it has caught the attention of organized crime groups
in a number of countries. According to the Business Software Alliance (BSA), about 36% of all software in current use is stolen.
Counterfeiting
This type of piracy is the illegal duplication, distribution, or sale of copyrighted material with the intent of imitating the copyrighted product. In the case
of packaged software, it is common to find counterfeit copies of the compact discs incorporating the software programs, as well as related packaging,
Internet Piracy
This occurs when unauthorized software is downloaded from the Internet. The same purchasing rules apply to on-line software purchases as for those
1. Websites that make software available for free download or in exchange for others
This occurs when an individual reproduces copies of software without authorization. These include:
3. Taking advantage of upgrade offers without having a legal copy of the version to be upgraded
8
4. Acquiring academic or other restricted or non-retail software without a proper license
Client-Server Overuse
This type of piracy occurs when too many users on a network are using a central copy
of a program at the same time. If you have a local-area network and install programs on the server for several people to use, you have to be sure your
license entitles you to do so. If you have more users than allowed by the license, that's "overuse".
Hard-Disk Loading
This occurs when a business sells new computers with illegal copies of software loaded onto the hard disks to make the purchase of the machines more
attractive
10
Real-life News of Software Piracy
A 26-year-old California man who pleaded guilty last December to criminal copyright infringement charges was sentenced today to 87 months in federal prison --
the longest U.S. sentence ever for software piracy -- for his role in illegally copying and selling pirated software.
Nathan Peterson, of Antelope Acres, Calif., was sentenced today in U.S. District Court in Alexandria, Va. and ordered to pay $5.4 million in restitution,
according to the Software & Information Industry Association (SIIA), a software and digital content trade group based in Washington.
Peterson, former owner of the Web-based business, iBackups, illegally copied and sold software by mail and over the Internet, according to the government
statement. Officials called his operation "one of the largest for-profit software piracy Web sites to operate in the United States."
Peterson pleaded guilty in December to the charges of selling illegal software valued at more than $20 million. He earned $5.4 million from the illegal sales,
In his plea agreement, Peterson said he began his piracy business in 2003 and operated it until February 2005, when it was shut down by the FBI following an
undercover investigation. Peterson controlled the www.ibackups.net site, which sold copies of software products that were copyrighted by companies such as
Adobe Systems, Inc., Macromedia Inc., Microsoft Corp, Sonic Solutions and Symantec Corp. at prices substantially below suggested retail, according to
prosecutors.
The software products purchased on Peterson's Web site were reproduced and distributed either by instantaneous computer download of an electronic copy and/or
by shipment of a CD copy through the mail. Peterson often included a serial number that allowed the purchaser to activate and use the product, according to the
government.
"SIIA appreciates the tireless work of both the FBI and the US Attorney's Office," Keith Kupferschmid, SIIA's vice president of intellectual property policy and
enforcement, said in a statement. "We brought this activity to light in order to stop a specific crime from being perpetrated against our members. Law
enforcement's decision to aggressively pursue this case, I believe, sends a message to those who illegally copy and sell software that they will be punished to the
11
Social and Ethical Implications
Getting a hold of software without buying it is increasingly easy; whether by borrowing a friend’s copy or downloading it illegally from the Internet, millions of
The copyright infringement of software, or software piracy, is illegal in many countries. Even in countries where there are not legal measures in place for the
protection of copyrighted software, there are some compelling ethical issues that may be considered both for and against software piracy.
Moral Responsibility
Moral arguments to follow the law date back to Plato, and one pertinent argument is attributed to British classicist W. D. Ross, who states in his 1930 "The Right
and the Good": “The duty of obeying the laws of one's country arises partly … from the duty of gratitude for the benefits one has received from it.”
If someone agrees that the law should not be broken, and the law says not to break copyright laws, as does the Digital Millennium Copyright Act (DMCA) in the
Other arguments that say using pirated software is morally wrong include the loss of revenue to the creator of the software, and that without software being paid
for creators will give up designing new software and there will be less software being created in the future.
According to G. Frederick: in “Software Piracy: Some Facts, Figures, and Issues,” 82 percent of PC software used in China is pirated. Advocates against piracy
would ask how much revenue to software companies is lost every year in China alone.
Software licenses cost the same wherever in the world you buy them, but wages vary greatly over the world. People in countries with lower GDP per capita will
therefore find it harder to buy software, which can be considered to be unfair to them and emerging market economies.
In reference to China, Microsoft CEO Bill Gates famously said: “As long as they are going to steal it, we want them to steal ours. They'll get sort of addicted, and
then we'll somehow figure out how to collect sometime in the next decade.” Here the “biggest loser” of software piracy seems to be condoning it to some degree.
Another ethical argument that can be considered is consequentialism, which can be defined as “the consequences of a particular action form the basis for any
valid moral judgment about that action.” Traian Basescu, Romanian president as of 2010, invoked a consequentialist argument when he said: "piracy helped the
young generation discover computers. It set off the development of the IT industry in Romania."
Professional standards
The Association for Computing Machinery, or ACM, claims to be the “world’s largest educational and scientific computing society.” Any person wishing to join
the society must accept a “Code of Ethics and Professional Conduct”, which covers the ethical issues surrounding software piracy.
The losses suffered as a result of software piracy directly affect the profitability of the software industry. Because of the money lost to pirates, publishers have
fewer resources to devote to research and development of new products, have less revenue to justify lowering software prices and are forced to pass these costs
on to their customers. Consequently, software publishers, developers, and vendors are taking serious actions to protect their revenues.
12
Using pirated software is also risky for users. Aside from the legal consequences of using pirated software, users of pirated software forfeit some practical
Increase the chances that the software will not function correctly or will fail completely
Forfeit access to customer support, upgrades, technical documentation, training, and bug fixes
Increase their risk of exposure to a debilitating virus that can destroy valuable data
May find that the software is actually an outdated version, a beta (test) version, or a non-functioning copy
References
I. Todd R. Weiss (2006, September 8), Software pirate gets 87 months in prison, Computerworld.
https://www.computerworld.com/article/2547659/software-pirate-gets-87-months-in-prison.html
II. Panda Security (2019, April 22), What is Software Piracy. https://www.pandasecurity.com/mediacenter/panda-security/software-piracy/
13