Computer Security Ethics
Computer Security Ethics
In terms of:
• Physical Security
• Non-Physical Security
Security Threats (sources, causes, people behind) :
– Hackers
– Crackers
– Script Kiddies
– Unethical Employees (logic bombs, backdoor,…)
– Cyberterrorists
– Corporate Spy
– Worm / Virus / Trojan (incl. keyloggers,…)
– Spoofing / Sniffing / Phishing
– DoS / DDoS attacks
– Hoax / Spam
– ...
Examples:
Example of Phishing:
Hackers’ Code of Ethics:
• Hackers like to understand how things work, and want to make their
own improvements or modifications.
• Every hacker must make his or her own decisions about what is right or
wrong, and some might do things they believe are illegal, amoral or anti-
social.
• Hackers' motivations are their own, and there is no reason for all hackers
to agree.
• Hackers have a shared identity, however, and many shared interests.
• By reading this Code, hackers can recognize themselves and each other,
and understand better the group they are a part of.
Hackers’ Code of Ethics: