nstead of a hacker/cracker dichotomy, they give more emphasis to a spectrum of deferent categories, such as white hat, grey hat, black hat and script kiddies. World Of Hacking Hacking is the practice of modifying the features of a system, in order to accomplish a goal outside of the creator’s original purpose. The person who is consistently engaging In hacking activities, and has accepted hacking as a lifestyle and philosophy of their choice, Is called a hacker. Modifying the features of a system. Gaining an unauthorized access to a computer system. Breaks into a system security.
Refers to the hobby/profession of working with computers. It also about learning how a system works and how to make it do things it wasn’t designed to do, or you haven’t got the privileges to do. Hacker A hacker Is someone who seeks and exploits weaknesses In a computer system or computer network. Hackers may be motivated by a multitude of reasons, such as profit, protest, or challenge. The subculture that has evolved around hackers is often referred to as the computer underground and is now a known community. White Hats – good Gray hats – good or bad Black hats – bad Script skilled
A script skilled (also known as a skid or skilled) Is a non-expert who breaks Into computer systems by using pre-packaged automated tools written by others, usually with little understanding of the underlying concept-?hence the term script (I. E. A prearranged plan or set of activities) kiddies (I. E. Kid, child-?an individual lacking knowledge and experience, immature). Blue hat A blue hat hacker is someone outside computer security consulting firms who Is used to bug test a system prior to Its launch, looking for exploits so they can be closed.
Microsoft also uses the term Blue Hat to represent a series of security briefing vents. Hacker Code Of Ethics Levy (1984) suggests that there is a “code of ethics” for hacking which, though not pasted on the walls, is in the air: Access to Computers – and anything which might teach you something about the way the world works – should be unlimited and total. Always yield to the Hands-on Imperative! Mistrust Authority – Promote Decentralization. Hackers should be Judged by their hacking, not bogus criteria such as degrees, age, race, or position.
You can create art and beauty on a computer. Computers can change your life for the better. CYBER CRIME LAW Senator Angora is defined as any illegal and criminal act activity committed on the internet. State Policy Regarding Cyber Crimes The State Recognize.. 1 . The vital role of information and communication industries such as content production, telecommunication, broadcasting, electronic commerce, and data processing, in the nation’s overall social and economic development. 2.
The importance of providing an environment conducive to the development, acceleration, and rational application and exploitation of information and communication technology to attain free, easy and intelligible access to exchange and/or delivery of information. 3. The need to protect and safeguard the integrity of computer, computer and communication systems, network, and databases and the confidentiality, integrity, and availability of information and data stored therein, from all forms of misuse, abuse, and illegal access by making punishable under the law such conduct or conducts.
Cyber Crimes Offenses 1 . Offenses against the confidentiality, integrity and availability of computer data and systems. A. Illegal Access – The intentional access to the whole or any part of a computer system without right. Element of Computer System There must be a device a group of interconnected or related devices. At least one of the devices performs automatic processing of data pursuant to a program. The device need NOT be connected in a network as long as it consists of both hardware and software and have input, output and storage facilities.
Element of the offense of illegal Access 1 . There must be an intentional access in whole or any part of a computer system. 2. The person who attempts, or is accessing, or had already access the data has no right to access to the system. “An Authorized person may not be authorized. ” B. Illegal Interception Interception – refers to the listening to, recording, monitoring or surveillance of the content of communication. Elements of Illegal Interception 1. It must be intentional. 2.
It must be by technical means. 3. The person involved is without any right to do the intercept. 4. The transmission of computer data to, from, or within a computer system is non-public. 5. It must not fall in any exemption. C. Data Interference Intentional or reckless alteration of computer data without right. C. System Interference Intentional or reckless hindering without the right of the functioning of a computer yester by inputting, transmitting, deleting or altering computer data or program.