Cyber Ethics: Principles to Combat Hacking

2190 Words5 Pages

Introduction
Issues of ethics and professionalism had been touch frequently in our current society lately. Experts from a particular field usually and logically should behave professionally or show their expertise to the civilian. However, in fact they are working oppositely and crime their expertise with their knowledge. This actually brought troubles to the outsider or victim and causes them to loss their property or reputation.
In information technology field, issue regarding to ethics and professionalism had been given name as cyber ethics. According to ikeepsafe (n.d.), cyber ethics is the discipline of using ethical behaviors and acknowledging moral duties to online environment and digital media. This issue includes hacking, phishing, copyright, downloading, cyber bullying, etc. The issue discussed in this paper, is the most problematic and troublesome - Hack.
According to Wikipedia (2013b), hacker is someone who attack and seek into a computer system or network. They may motivated by different kinds of reason such as profit, to protest, to challenge a system, to grab information, etc. There are 3 types of hacker which can be classified into white hat, black hat, and grey hat. White hat hacker breaks the computer security for non-malicious reasons where they are actually to test their own security system. Black hat hacker violates the computer ethics and hacks system for their personal profit. Grey hacker hacks the computer system with the purpose of notifying the administrative of that system has a weak security system and provide them a better solution with a charge (Wikipedia, 2013b).
Recall back to the incident happened in 3 years ago, our government websites had been hacked after received the message from “Anonymous” ...

... middle of paper ...

... how to protect yourself from hackers. Retrieved from http://events.hamptonu.edu/ias/docs/DanielRyan.pdf
Sembok, T. M. T. (2003). Ehics of information communication technology (ICT). Retrieved from http://www2.unescobkk.org/elib/publications/ethic_in_asia_pacific/ 239_325ETHICS.PDF
Sepior Raises Seed Round For Protecting Cloud Data Against Hacking. (2013). Retrieved from http://sepior.com/media/.
Veroffentlicht, V. S. (2011). Anonymous – operation malaysia. Retrieved from http://serpentsembrace.wordpress.com/2011/06/16/anonymous-operation-malaysia/
Wikipedia. (2013a). Anonymous(group). Retrieved from http://en.wikipedia.org/wiki/Anonymous_(group)
Wikipedia. (2013b). Hacker (computer security). Retrieved from http://en.wikipedia.org/wiki/Hacker_(computer_security)
#1 Anonymous - Operation Malaysia. (2011). Retrieved from http://www.youtube.com/watch?v=wpmMPq6nl4c

Open Document