Please enable JavaScript.
Coggle requires JavaScript to display documents.
Security and Ethical Issues - Coggle Diagram
Security and Ethical Issues
Hackers
Grey Hat Hacke
r:
exploit the internet systems
only to make public that would be of benefit to everyone
Blue Hat Hacker: amateur, revenge attacks.
White Hat Hacker
: ethical hackers create algorithms to break existing internet networks so as to
solve the loopholes
in them.
Red Hat Hacker
:
find black hat hackers
, intercept and destroy their schemes.
Black Hat Hacker
: break into computer networks with purely
negative motives
Green Hat Hacker
:simply want to observe and learn about the world of hacking
Ethical Principles
The first ethical principle
: we should avoid doing anything if it is against universal morality
The second ethical principle
: An act is ethical if it brings about a good result
The third ethical principle
: An act is ethical if a majority of people in society agree with it
Three main principles of ethics:
MORAL RULES,ULTILIZATION, SOCIAL CONTRACT
Privacy
codes of ethics
Collect only data that are needed.
Be sure that the collected data are accurate.
Allow individuals to know what data have been collected.
Allow individuals to correct the collected data if necessary.
Be sure that collected data are used only for the original purpose.
Use encryption techniques
Confidentiality
A substitution cipher
replaces one symbol with another
In additive cipher
, the plain text,cipher text, and key are integers in modulo 26
A tranposition cipher
reorders symbols
symmetric-key cryptography
is based on sharing secretcy
assymmetric-key cryptography
is based on personal secretcy
Based on the definition, in a
block cipher
,
a single key
is used to encrypt the whole block even if the key is made of multiple values
In a
stream cipher
, we have a plaintext stream, a ciphertext stream, and a
key stream
SA cryptosystem
e
is
public
d
is
private
To see the position dependency of the key, a simple polyalphabetic cipher called the
autokey ciphe
r
Introduction
TO BE SECURE, IN4 NEEDS
to be hidden from unauthorized access (
confidentiality
),
Snooping
Traffic analysis
protected from unauthorized change (
integrity
)
Modification
Masquerading
Replaying
Repudiation
and available to an authorized entity when it is needed (
availability
).
Denial of service