Computer Hacking and Cyber Crime Law

Topics: Computer, Computer program, Defamation Pages: 13 (4036 words) Published: October 5, 2013
COMPUTER HACKING AND CYBER CRIME LAW
History of Hacking
According to (Clifford R.D. 2006) a cracker or cracking is to "gain unauthorized access to a computer in order to commit another crime such as destroying information contained in that system". These subgroups may also be defined by the legal status of their activities. Eric S. Raymond (author of  The New Hacker's Dictionary) advocates that members of the computer underground should be called crackers. Yet, those people see themselves as hackers and even try to include the views of Raymond in what they see as one wider hacker culture, a view harshly rejected by Raymond himself. Instead of a hacker/cracker dichotomy, they give more emphasis to a spectrum of different categories, such as white hat, grey hat, black hat and script kiddie. World Of Hacking

Hacking is the practice of modifying the features of a system, in order to accomplish a goal outside of the creator's original purpose. The person who is consistently engaging in hacking activities, and has accepted hacking as a lifestyle and philosophy of their choice, is called a hacker. Modifying the features of a system.

Gaining an unauthorized access to a computer system.
Breaks into a system security.
Refers to the hobby/profession of working with computers.
 It also about learning how a system works and how to make it do things it wasn't designed to do, or you haven't got the privileges to do.  Hacker
A hacker is someone who seeks and exploits weaknesses in a computer system or computer network. Hackers may be motivated by a multitude of reasons, such as profit, protest, or challenge. The subculture that has evolved around hackers is often referred to as the computer underground and is now a known community. White Hats – good

Gray hats – good or bad
Black hats – bad
Script kiddie
A script kiddie (also known as a skid or skiddie) is a non-expert who breaks into computer systems by using pre-packaged automated tools written by others, usually with little understanding of the underlying concept—hence the term script (i.e. a prearranged plan or set of activities) kiddie (i.e. kid, child—an individual lacking knowledge and experience, immature). Blue hat

A blue hat hacker is someone outside computer security consulting firms who is used to bug test a system prior to its launch, looking for exploits so they can be closed. Microsoft also uses the term Blue Hat to represent a series of security briefing events. Hacker Code Of Ethics

Levy (1984) suggests that there is a "code of ethics" for hacking which, though not pasted on the walls, is in the air: Access to Computers - and anything which might teach you something about the way the world works - should be unlimited and total. Always yield to the Hands-On Imperative!

All information should be free.
Mistrust Authority - Promote Decentralization.
Hackers should be judged by their hacking, not bogus criteria such as degrees, age, race, or position. You can create art and beauty on a computer.
Computers can change your life for the better.
CYBER CRIME LAW
Senator Angara is defined as any illegal and criminal act activity committed on the internet. State Policy Regarding Cyber Crimes
The State Recognize..
1. The vital role of information and communication industries such as content production, telecommunication, broadcasting, electronic commerce, and data processing, in the nation’s overall social and economic development. 2. The importance of providing an environment conducive to the development, acceleration, and rational application and exploitation of information and communication technology to attain free, easy and intelligible access to exchange and/or delivery of information. 3. The need to protect and safeguard the integrity of computer, computer and communication systems, network, and databases and the confidentiality, integrity, and availability of information and data stored therein, from all forms of misuse, abuse, and illegal access...
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Essay about Cyber Crimes
  • cyber crime Essay
  • CYBER CRIME Essay
  • Essay on cyber crime
  • Cyber Crime Law Essay
  • Essay on Cyber Crime Law
  • Cyber Crime Law Essay
  • On the Philippine Cyber Crime Law Essay

Become a StudyMode Member

Sign Up - It's Free