Ethics Of Hacking And Cracking

1156 Words5 Pages
Ethics of Hacking and Cracking in AT&T’s iPad 3G Hack
With the explosion of both computing power and network interconnectedness, devices and connections have grown significantly complex. However, this upsurge in computing technology has come at a price. With the prolific expansion and dependence of interconnected computers, there has also been a rise in the exploitation of vulnerabilities discovered within these multifaceted systems.
The terms hacking and cracking refer to dichotomy of how individuals choose to respond to the exploitation of system vulnerabilities. Once, the term ‘hacking’ was used to define the activity of circumventing a computer’s, or a network’s, security without authorization for reasons such as financial gain, corporate espionage, personal challenge, of fame (Ashoo & Gore, 2011). Now, with the advent of the computer security industry, professional security penetration testers have chosen to distance themselves from this shadowy designation by labeling malicious attackers as crackers. They have begun to redefine the term ‘hacker’ to denote an individual who uses their extensive computer knowledge to ethically, and with permission from the system’s owner, to circumvent security features, in an effort to identify weaknesses in security components before they are exploited by a malicious attacker.
Ultimately, the distinction between a hacker and a cracker come down to the code of ethics used by the individual and the intentions behind their

More about Ethics Of Hacking And Cracking

Open Document