Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
Principles of cyber ethics
Short essay about ethical issues of cyberspace
Principles of cyber ethics
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: Principles of cyber ethics
Background
Google Malaysia website was hacked at 10 October 2011 morning (Malaysia Time), and this hacking issue is done by a team from Pakistan that called ‘Team Madleets’. They signed off the hacked website with Pakistan Zindabad (Vinod, 2013). Apart from that, ‘Team Madleets’ also known as team 1337, they was hacked other domain of several countries before. They are not supported by any other organization also (Phillips, 2013). In addition, Google Malaysia two domains were under attack and keep offline for several hours at the morning until late afternoon (Kashyap, 2013). Moreover, DNS poisoning attack was affected both domain of Google Malaysia (www.google.com.my, and www.google.my). After the domain was affected, ‘Team Madleets’ success to access Malaysia Network Information Centre to change the records of domain and pointed the server to the server’s name of madleets like show below:
- Primary Name Server: b0x4.madleets.com
- Secondary Name Server: b0x3.madleets.com
Hence, no information have been changed on servers on Google at this time, it is a redirect attack (Panzarino, 2013).
The actor for this hacking issue, madleets stamped the Google Malaysia front page as the picture shown in Figure 1. This clearly proven this hacking issue was done by them.
The hacking issues not only happen from hackers to organization, but also attacked personal property like bank account, Facebook account, ATM card password, and so much. Hacking is a cyberethic issue which bring the meaning of use a computer to gain unauthorized access to information and data in a system without the intention of destroying data (Hacking, 2004).
Hacking is done by someone called Hacker. A hacker utilizes a...
... middle of paper ...
... madleets’ Takes credit. Retrieved from http://www.theepochtimes.com/n3/315032-google-malaysia-hacked-team-madleets-takes-credit/?photo=2
Rouse, M. (2013). Distributed denial-of-service attack (DDoS). Retrieved from http://searchsecurity.techtarget.com/definition/distributed-denial-of-service-attack
Silver, J. (2013). 20 ways to keep your internet identity safe from hackers. Retrieved from http://www.theguardian.com/technology/2013/may/12/20-ways-keep-internet-identity-safe
Swami, D. L. (n.d.). How to prevent hacking. Retrieved from http://www.wikihow.com/Prevent-Hacking
Vinod, G. (2013). Google Malaysia hacked. Retrieved from http://www.freemalaysiatoday.com/category/nation/2013/10/11/google-malaysia-hacked/
Wallace, G. (2013). Target credit card hack: What you need to know. Retrieved from http://money.cnn.com/2013/12/22/news/companies/target-credit-card-hack/
Mandiant is an information security company which deals with the advanced threat detections and response solutions. It has investigated various computer security breaches, the major security breaches are attributed to advanced threat actors referred to as the “Advanced Persistent Threat” (APT). APT1 is one of the most prolific cyber espionage groups in China, it has stolen the large amount of confidential data from 141 organizations all over the world. This report was released on 18 February 2013, provided evidences of APT1 group identity, time line and details of attack infrastructure, economic espionage, commands, and its modus operandi.
accusations, Google says it will not end here but that it might effect other companies
Naoki’s email was linked to his domain, so the hacker had control of his email and websites. Naoki quickly changed the email for his Twitter account, which prevented its theft, but his websites were used by the hacker as a bargaining tool to trade for the @N username. After the hacker got the Twitter account, which was the actual target, he detailed how he had social engineered a PayPal phone operator to give him the last four digits of the account card number. The hacker then called GoDaddy, and told them that he lost his card, but he remembered the last four digits of it. The representat...
There is an increase in fraudulent robocalls. In one case, someone made a prerecorded robocall pretending to be Google. The robocall told receivers that their business was at risk of being removed from Google’s top search results page. They promised to provide a solution, but the receiver would be charged a fee.
“Google said that it takes its partners and users' trust and safety seriously. "We will continue to work to earn that trust every day," the company
The American corporate is hiring only the best security researchers who can contribute their fullest, of mind and time, toward enhancing security across the World Wide Web. Google is not placing specific bounds on this project and aims only to elevate the security of any software depended by a substantial population. The team will pay careful attention to the methods, targets, and inspirations of hackers using standard approaches. Further, the security team will conduct new research into exploitations, mitigations, and program analysis; practically anything it deems important.
Once these websites were up and running, emails came in inviting them to conferences to speak on behalf of the WTO. The organizers clearly thought the sites were official and gave the ym an opportunity to speak. This is when the YM’s original idea to prank the people in attendance, using satire to bring awareness to world issues.
The Ted Talk presented by Catherine Bracy took the word hacking to another level. A new way of looking at a hacker. A hacker meaning much more than a teen behind a computer trying to steal information. The points she brought out is that reaching out to the people can get things done and strengthen relationships between people and an organization and through that relationship both parties are more stable and content. Bracy expressed her experiences with hackers in a government and citizen view, but this can also be applied to personal and
Large businesses and corporations have a huge impact on today’s society. These large businesses provide jobs, products, and services to the public and have a great influence in our community. In fact, it can even be said that some companies such as Google have a greater influence in our society over government or even church. Many of these large companies have a social responsibility, whether one realizes it or not. These responsibilities include protecting the rights of its stakeholders and making ethical business decisions. These ethical decisions can be based on ethical norms such as rights and duties, justice, as well as utilitarianism (1). Unfortunately, not all businesses follow these ethical norms. However, in 2013 Forbes magazine
Internet Security covers a broad list of topics. I have chosen to cover hackers and their history. I will go through who hackers are and how we define hackers. I will also cover the history of how hackers got started. This was a very interesting topic and may surprise a lot of people who have had misconceptions of what hackers do due to how the are covered by the media.
Taber, M (n.d.). Maximum Security: A Hacker's Guide to Protecting Your Internet Site and Network (chapter 3.)
Protecting your personal information, both on your personal computer and in other places such as your bank or your job, has become more difficult with the massive growth of the internet and the expertise of some unsavory characters called hackers, crackers or phreakers. Whatever they choose to call themselves, they are theives, plain and simple. Some people still question whether or not hacking should be illegal. I think it's obvious that what hackers do is illegal. A personal computer is personal and the information on it is private. When a hacker invades that privacy, he/she is trespassing and when they take your personal information they're committing a form of thievery (Ludlow). In addition to hackers, we now have marketers invading our privacy through the use of cookies (Rodger).
Hacking was a term established in the 1960s. This word is the concept of unauthorised intrusion of a computer or network with malicious intentions behind them. This includes any technical effort of manipulating or damaging the normal behaviour of network connections/systems or stealing information. In this generation, hacking has become evidently significant and the debate of hacking being considered ethical or unethical arises. Therefore, will hacking ever be justified? The justification (reasonableness) of hacking has become a disputation of mixed opinions and emotions amongst society. These opinions range from hacking being considered immoral due to it being illegal activity and the vast negative impact it has on people. This includes the affirmative opinions on hacking; such as hacking being considered ethical due to the “white hat” hackers.
Google and the Government of China. A case study in Cross-Cultural Negotiations. Develop a negotiations planning document using the Kellogg format in Exhibit 11. Issue Google Chinese government Purpose of negotiation Priority: 1 Position: focuses on profit and brand management Priority: 2 Position: technological, economic gaining.
One of the ways to reduce cybercrime is receiving education and training. Hackers are not the only ones who have the ability to learn new things from a wide variety of information. We also have the ability to improve ourselves by studying about many different types of threats and scams that have existed on the Internet. We can explore what necessary and important ways can be adopted to prevent them from happening. This is not only to protect ourselves from cybercriminals but also all the nations in Malaysia.