HACKING AND SECURITY
- How can we condone learning by experimentation and exploration, commonly known as Hacking, while encouraging computer enthusiasts to follow the community standards represented by the 10 Commandments of Computing and the ACM Code of Professional Conduct? Do the The Hacker's Code of Ethics contradict other "professional" codes of conduct?
- Read the articles entitled "Reformed
Crackers Reveal Their Secrets To Paying Audiences of Former Victims",
New Dimensions International, 1997 and NOW HIRING:
HACKERS (TATTOOS WELCOME), Special to the Chicago Tribune, April
12, 1998. Then answer the following questions:
Print your answers on a single sheet of paper with your name on top, and
be ready with your answers for a class discussion.
- What is the difference between a hacker and a cracker?
- What is a sniffer?
- Can a consultant who has not been a "true hacker" actually provide any advice to potential targets for hackers?
- Is there a difference between benign and malicious hackers?
- In Virginia Law, is there a difference between benign and malicious hackers?
- Is it appropriate for "criminals" to benefit from their previous misdeeds?
- Is hacking becoming an industry?
- Should hacking tools, such as password crackers, be controlled by the government? If not, why not?
- Should a university computer science such as ours have a course on hacking?
- Is it not better to have enough knowledge about hacking to protect your company against it? How much knowledge is sufficient?
Scenarios for Debate:
Last updated 2002/02/16
© J.A.N. Lee, 1997-2002.