SlideShare a Scribd company logo
1 of 8
Download to read offline
OVBE AssignmentTASMAC
Mar 26, 2010
Computer Hacking – Is it Ethical?
Vivekanandan M
Presented by…..
Date: Slide No: 1Vivekanandan M
OVBE AssignmentTASMAC
Mar 26, 2010
Computer Hacking – Is it Ethical?
Why I have selected this topic?
Date: Slide No: 2
Why Ethics is important in this modern world?
Vivekanandan M
OVBE AssignmentTASMAC
Mar 26, 2010
Computer Hacking – Is it Ethical?
Date: Slide No: 3Vivekanandan M
Concepts of Ethics
 Utilitarism – Morality of action is determined by its consequences.
 Deontologism – Actions are not justified by their consequences.
 Relativism – No universal standard by which morality can be judged.
What is right for one society might be wrong for another society.
 Egoism – One ought to act in his/her own self interest, obeying the
laws.
OVBE AssignmentTASMAC
Mar 26, 2010
Computer Hacking – Is it Ethical?
Date: Slide No: 4Vivekanandan M
Brief introduction to Computer Hacking
 Practice of gaining control and using hardware and software without
authorization.
 Started at Massachusetts Institute of Technology (MIT) as a method
to figure out how computer systems worked.
 Do not break into system for stealing or destroying data.
 Use their skills in legitimate ways, such as becoming security
consultant.
OVBE AssignmentTASMAC
Mar 26, 2010
Computer Hacking – Is it Ethical?
Date: Slide No: 5Vivekanandan M
Key Principles followed by hackers
 Do not destroy computer or delete data.
 Do not copy sensitive information from remote computer.
 Do not leave any traces of hacking
 Constantly test the system and find new ways to improve the
system.
OVBE AssignmentTASMAC
Mar 26, 2010
Computer Hacking – Is it Ethical?
Date: Slide No: 6Vivekanandan M
 Utilitarism view – hackers are ethical, if they do not destroy the
remote system.
 Deontologism view – hackers are ethical if they follow the code of
ethics.
 Relativism – Cyber laws are different in different countries, so a
hacker will be ethical in one country, wherelse he will be unethical in
another country.
 Egoism – hackers are ethical if their action promotes their long term
goals.
Hackers accessed based on 4 concepts of Ethics
OVBE AssignmentTASMAC
Mar 26, 2010
Computer Hacking – Is it Ethical?
Date: Slide No: 7Vivekanandan M
 Computer hacking has lead to development of new technology like
UNIX operating system, developed by former hackers Dennis Ritchie
and Ken Thompson.
Conclusion
OVBE AssignmentTASMAC
Mar 26, 2010
Computer Hacking – Is it Ethical?
Thank You!
Team MemberDate: Slide No: 8

More Related Content

What's hot

What's hot (20)

Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Top 10 most famous hackers of all time
Top 10 most famous hackers of all timeTop 10 most famous hackers of all time
Top 10 most famous hackers of all time
 
Ethicalhacking
Ethicalhacking Ethicalhacking
Ethicalhacking
 
Ethicalhacking 130906120356-
Ethicalhacking 130906120356-Ethicalhacking 130906120356-
Ethicalhacking 130906120356-
 
It security &_ethical_hacking
It security &_ethical_hackingIt security &_ethical_hacking
It security &_ethical_hacking
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Windows Hacking
Windows HackingWindows Hacking
Windows Hacking
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Ethical hacking by chandra prakash upadhyay
Ethical hacking by chandra prakash upadhyayEthical hacking by chandra prakash upadhyay
Ethical hacking by chandra prakash upadhyay
 
Hacking Tutorial in Telugu
Hacking Tutorial in TeluguHacking Tutorial in Telugu
Hacking Tutorial in Telugu
 
Secure Shell - a Presentation on Ethical Hacking
Secure Shell - a Presentation on Ethical HackingSecure Shell - a Presentation on Ethical Hacking
Secure Shell - a Presentation on Ethical Hacking
 
the best hacking ppt
the best hacking pptthe best hacking ppt
the best hacking ppt
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethicalhacking
Ethicalhacking Ethicalhacking
Ethicalhacking
 
Hacking Presentation
Hacking PresentationHacking Presentation
Hacking Presentation
 
Ethical hacking
Ethical hacking Ethical hacking
Ethical hacking
 
hacking presentation slide
hacking presentation slide hacking presentation slide
hacking presentation slide
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
Ehtical hacking speech
Ehtical hacking speechEhtical hacking speech
Ehtical hacking speech
 

Viewers also liked

Viewers also liked (6)

Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking ppt
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking ppt
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 
ETHICAL HACKING PPT
ETHICAL HACKING PPTETHICAL HACKING PPT
ETHICAL HACKING PPT
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
 

Similar to Computer hacking – Is it Ethical PPT

Ethical Hacking As A Career
Ethical Hacking As A CareerEthical Hacking As A Career
Ethical Hacking As A CareerSrashti Jain
 
Social & professional issues in IT
Social & professional issues in ITSocial & professional issues in IT
Social & professional issues in ITRohana K Amarakoon
 
Introduction to Ethical Hacking
Introduction to Ethical Hacking Introduction to Ethical Hacking
Introduction to Ethical Hacking Nasir Bhutta
 
Ethical Hacking and Network Defense
Ethical Hacking and Network Defense Ethical Hacking and Network Defense
Ethical Hacking and Network Defense Rishab garg
 
CEH Hacking Overview from beginner to expert
CEH Hacking Overview from beginner to expertCEH Hacking Overview from beginner to expert
CEH Hacking Overview from beginner to expertjmbrrvgzhr
 
Cybercrime (Computer Hacking)
Cybercrime (Computer Hacking)Cybercrime (Computer Hacking)
Cybercrime (Computer Hacking)Esteban
 
Identify ethical use of computers
Identify ethical use of computersIdentify ethical use of computers
Identify ethical use of computersAl Forte
 
Hacking and its types
Hacking and its typesHacking and its types
Hacking and its typesRishab Gupta
 
Ethics in using computer
Ethics in using computerEthics in using computer
Ethics in using computeribrahimtbl3147
 
Cybercrime (Computer Hacking)
Cybercrime (Computer Hacking)Cybercrime (Computer Hacking)
Cybercrime (Computer Hacking)Michael Asres
 
Computer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docxComputer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docxdonnajames55
 
PPT Lab Assignment - Computers - Computer Ethics
PPT Lab Assignment - Computers - Computer EthicsPPT Lab Assignment - Computers - Computer Ethics
PPT Lab Assignment - Computers - Computer EthicsScøtt Lıgøckı
 
If you can't beat em, join em
If you can't beat em, join emIf you can't beat em, join em
If you can't beat em, join emJohn Eberhardt
 

Similar to Computer hacking – Is it Ethical PPT (20)

Ethical Hacking As A Career
Ethical Hacking As A CareerEthical Hacking As A Career
Ethical Hacking As A Career
 
Social & professional issues in IT
Social & professional issues in ITSocial & professional issues in IT
Social & professional issues in IT
 
Introduction to Ethical Hacking
Introduction to Ethical Hacking Introduction to Ethical Hacking
Introduction to Ethical Hacking
 
Ethical Hacking and Network Defense
Ethical Hacking and Network Defense Ethical Hacking and Network Defense
Ethical Hacking and Network Defense
 
Ethical development of ai applications
Ethical development of ai applicationsEthical development of ai applications
Ethical development of ai applications
 
CEH Hacking Overview from beginner to expert
CEH Hacking Overview from beginner to expertCEH Hacking Overview from beginner to expert
CEH Hacking Overview from beginner to expert
 
Cybercrime (Computer Hacking)
Cybercrime (Computer Hacking)Cybercrime (Computer Hacking)
Cybercrime (Computer Hacking)
 
Identify ethical use of computers
Identify ethical use of computersIdentify ethical use of computers
Identify ethical use of computers
 
Ethical Hacking Essay
Ethical Hacking EssayEthical Hacking Essay
Ethical Hacking Essay
 
ch01.ppt
ch01.pptch01.ppt
ch01.ppt
 
Hacking and its types
Hacking and its typesHacking and its types
Hacking and its types
 
Why IT Security Is Fucked Up
Why IT Security Is Fucked UpWhy IT Security Is Fucked Up
Why IT Security Is Fucked Up
 
Ethics in using computer
Ethics in using computerEthics in using computer
Ethics in using computer
 
Cybercrime (Computer Hacking)
Cybercrime (Computer Hacking)Cybercrime (Computer Hacking)
Cybercrime (Computer Hacking)
 
Computer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docxComputer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docx
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
ethical hacking
ethical hackingethical hacking
ethical hacking
 
PPT Lab Assignment - Computers - Computer Ethics
PPT Lab Assignment - Computers - Computer EthicsPPT Lab Assignment - Computers - Computer Ethics
PPT Lab Assignment - Computers - Computer Ethics
 
If you can't beat em, join em
If you can't beat em, join emIf you can't beat em, join em
If you can't beat em, join em
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 

More from Vivekanandan M

SWOT Analysis and formulation of Marketing Mix for Colgate sensitive
SWOT Analysis and formulation of Marketing Mix for Colgate sensitiveSWOT Analysis and formulation of Marketing Mix for Colgate sensitive
SWOT Analysis and formulation of Marketing Mix for Colgate sensitiveVivekanandan M
 
SWOT Analysis and formulation of Marketing Mix for Colgate sensitive PPT
SWOT Analysis and formulation of Marketing Mix for Colgate sensitive PPTSWOT Analysis and formulation of Marketing Mix for Colgate sensitive PPT
SWOT Analysis and formulation of Marketing Mix for Colgate sensitive PPTVivekanandan M
 
Pricing Models in IT Industry
Pricing Models in IT IndustryPricing Models in IT Industry
Pricing Models in IT IndustryVivekanandan M
 
Personality and Big Five Model
Personality and Big Five ModelPersonality and Big Five Model
Personality and Big Five ModelVivekanandan M
 
Microeconomic Analysis of a FMCG prod
Microeconomic Analysis of a FMCG prodMicroeconomic Analysis of a FMCG prod
Microeconomic Analysis of a FMCG prodVivekanandan M
 
Financial Performance of 2 companies in Cement industry
Financial Performance of 2 companies in Cement industryFinancial Performance of 2 companies in Cement industry
Financial Performance of 2 companies in Cement industryVivekanandan M
 
Ethical Issues in Corporate Governance
Ethical Issues in Corporate GovernanceEthical Issues in Corporate Governance
Ethical Issues in Corporate GovernanceVivekanandan M
 
Ethical Issues in Corporate Governance PPT
Ethical Issues in Corporate Governance PPTEthical Issues in Corporate Governance PPT
Ethical Issues in Corporate Governance PPTVivekanandan M
 
Env anal eval of veg oil ind att in India
Env anal eval of veg oil ind att in IndiaEnv anal eval of veg oil ind att in India
Env anal eval of veg oil ind att in IndiaVivekanandan M
 
Env anal eval of veg oil ind att in India PPT
Env anal eval of veg oil ind att in India PPTEnv anal eval of veg oil ind att in India PPT
Env anal eval of veg oil ind att in India PPTVivekanandan M
 
Country Analysis - South Korea
Country Analysis - South KoreaCountry Analysis - South Korea
Country Analysis - South KoreaVivekanandan M
 
Computer hacking – Is it Ethical
Computer hacking – Is it EthicalComputer hacking – Is it Ethical
Computer hacking – Is it EthicalVivekanandan M
 
Case Analysis – Hedging Foreign
Case Analysis – Hedging ForeignCase Analysis – Hedging Foreign
Case Analysis – Hedging ForeignVivekanandan M
 
A Study on Trends and Determinants of Outward Foreign Direct Investment and I...
A Study on Trends and Determinants of Outward Foreign Direct Investment and I...A Study on Trends and Determinants of Outward Foreign Direct Investment and I...
A Study on Trends and Determinants of Outward Foreign Direct Investment and I...Vivekanandan M
 

More from Vivekanandan M (16)

Talent Management
Talent ManagementTalent Management
Talent Management
 
Talent Management PPT
Talent Management PPTTalent Management PPT
Talent Management PPT
 
SWOT Analysis and formulation of Marketing Mix for Colgate sensitive
SWOT Analysis and formulation of Marketing Mix for Colgate sensitiveSWOT Analysis and formulation of Marketing Mix for Colgate sensitive
SWOT Analysis and formulation of Marketing Mix for Colgate sensitive
 
SWOT Analysis and formulation of Marketing Mix for Colgate sensitive PPT
SWOT Analysis and formulation of Marketing Mix for Colgate sensitive PPTSWOT Analysis and formulation of Marketing Mix for Colgate sensitive PPT
SWOT Analysis and formulation of Marketing Mix for Colgate sensitive PPT
 
Pricing Models in IT Industry
Pricing Models in IT IndustryPricing Models in IT Industry
Pricing Models in IT Industry
 
Personality and Big Five Model
Personality and Big Five ModelPersonality and Big Five Model
Personality and Big Five Model
 
Microeconomic Analysis of a FMCG prod
Microeconomic Analysis of a FMCG prodMicroeconomic Analysis of a FMCG prod
Microeconomic Analysis of a FMCG prod
 
Financial Performance of 2 companies in Cement industry
Financial Performance of 2 companies in Cement industryFinancial Performance of 2 companies in Cement industry
Financial Performance of 2 companies in Cement industry
 
Ethical Issues in Corporate Governance
Ethical Issues in Corporate GovernanceEthical Issues in Corporate Governance
Ethical Issues in Corporate Governance
 
Ethical Issues in Corporate Governance PPT
Ethical Issues in Corporate Governance PPTEthical Issues in Corporate Governance PPT
Ethical Issues in Corporate Governance PPT
 
Env anal eval of veg oil ind att in India
Env anal eval of veg oil ind att in IndiaEnv anal eval of veg oil ind att in India
Env anal eval of veg oil ind att in India
 
Env anal eval of veg oil ind att in India PPT
Env anal eval of veg oil ind att in India PPTEnv anal eval of veg oil ind att in India PPT
Env anal eval of veg oil ind att in India PPT
 
Country Analysis - South Korea
Country Analysis - South KoreaCountry Analysis - South Korea
Country Analysis - South Korea
 
Computer hacking – Is it Ethical
Computer hacking – Is it EthicalComputer hacking – Is it Ethical
Computer hacking – Is it Ethical
 
Case Analysis – Hedging Foreign
Case Analysis – Hedging ForeignCase Analysis – Hedging Foreign
Case Analysis – Hedging Foreign
 
A Study on Trends and Determinants of Outward Foreign Direct Investment and I...
A Study on Trends and Determinants of Outward Foreign Direct Investment and I...A Study on Trends and Determinants of Outward Foreign Direct Investment and I...
A Study on Trends and Determinants of Outward Foreign Direct Investment and I...
 

Computer hacking – Is it Ethical PPT

  • 1. OVBE AssignmentTASMAC Mar 26, 2010 Computer Hacking – Is it Ethical? Vivekanandan M Presented by….. Date: Slide No: 1Vivekanandan M
  • 2. OVBE AssignmentTASMAC Mar 26, 2010 Computer Hacking – Is it Ethical? Why I have selected this topic? Date: Slide No: 2 Why Ethics is important in this modern world? Vivekanandan M
  • 3. OVBE AssignmentTASMAC Mar 26, 2010 Computer Hacking – Is it Ethical? Date: Slide No: 3Vivekanandan M Concepts of Ethics  Utilitarism – Morality of action is determined by its consequences.  Deontologism – Actions are not justified by their consequences.  Relativism – No universal standard by which morality can be judged. What is right for one society might be wrong for another society.  Egoism – One ought to act in his/her own self interest, obeying the laws.
  • 4. OVBE AssignmentTASMAC Mar 26, 2010 Computer Hacking – Is it Ethical? Date: Slide No: 4Vivekanandan M Brief introduction to Computer Hacking  Practice of gaining control and using hardware and software without authorization.  Started at Massachusetts Institute of Technology (MIT) as a method to figure out how computer systems worked.  Do not break into system for stealing or destroying data.  Use their skills in legitimate ways, such as becoming security consultant.
  • 5. OVBE AssignmentTASMAC Mar 26, 2010 Computer Hacking – Is it Ethical? Date: Slide No: 5Vivekanandan M Key Principles followed by hackers  Do not destroy computer or delete data.  Do not copy sensitive information from remote computer.  Do not leave any traces of hacking  Constantly test the system and find new ways to improve the system.
  • 6. OVBE AssignmentTASMAC Mar 26, 2010 Computer Hacking – Is it Ethical? Date: Slide No: 6Vivekanandan M  Utilitarism view – hackers are ethical, if they do not destroy the remote system.  Deontologism view – hackers are ethical if they follow the code of ethics.  Relativism – Cyber laws are different in different countries, so a hacker will be ethical in one country, wherelse he will be unethical in another country.  Egoism – hackers are ethical if their action promotes their long term goals. Hackers accessed based on 4 concepts of Ethics
  • 7. OVBE AssignmentTASMAC Mar 26, 2010 Computer Hacking – Is it Ethical? Date: Slide No: 7Vivekanandan M  Computer hacking has lead to development of new technology like UNIX operating system, developed by former hackers Dennis Ritchie and Ken Thompson. Conclusion
  • 8. OVBE AssignmentTASMAC Mar 26, 2010 Computer Hacking – Is it Ethical? Thank You! Team MemberDate: Slide No: 8