Ethics Of Hacking And Cracking

1156 WordsMar 19, 20165 Pages
Ethics of Hacking and Cracking in AT&T’s iPad 3G Hack With the explosion of both computing power and network interconnectedness, devices and connections have grown significantly complex. However, this upsurge in computing technology has come at a price. With the prolific expansion and dependence of interconnected computers, there has also been a rise in the exploitation of vulnerabilities discovered within these multifaceted systems. The terms hacking and cracking refer to dichotomy of how individuals choose to respond to the exploitation of system vulnerabilities. Once, the term ‘hacking’ was used to define the activity of circumventing a computer’s, or a network’s, security without authorization for reasons such as financial gain, corporate espionage, personal challenge, of fame (Ashoo & Gore, 2011). Now, with the advent of the computer security industry, professional security penetration testers have chosen to distance themselves from this shadowy designation by labeling malicious attackers as crackers. They have begun to redefine the term ‘hacker’ to denote an individual who uses their extensive computer knowledge to ethically, and with permission from the system’s owner, to circumvent security features, in an effort to identify weaknesses in security components before they are exploited by a malicious attacker. Ultimately, the distinction between a hacker and a cracker come down to the code of ethics used by the individual and the intentions behind their
Open Document