Security and Ethical Issues - Coggle Diagram
Security and Ethical Issues
Grey Hat Hacke
exploit the internet systems
only to make public that would be of benefit to everyone
Blue Hat Hacker: amateur, revenge attacks.
White Hat Hacker
: ethical hackers create algorithms to break existing internet networks so as to
solve the loopholes
Red Hat Hacker
find black hat hackers
, intercept and destroy their schemes.
Black Hat Hacker
: break into computer networks with purely
Green Hat Hacker
:simply want to observe and learn about the world of hacking
The first ethical principle
: we should avoid doing anything if it is against universal morality
The second ethical principle
: An act is ethical if it brings about a good result
The third ethical principle
: An act is ethical if a majority of people in society agree with it
Three main principles of ethics:
MORAL RULES,ULTILIZATION, SOCIAL CONTRACT
codes of ethics
Collect only data that are needed.
Be sure that the collected data are accurate.
Allow individuals to know what data have been collected.
Allow individuals to correct the collected data if necessary.
Be sure that collected data are used only for the original purpose.
Use encryption techniques
A substitution cipher
replaces one symbol with another
In additive cipher
, the plain text,cipher text, and key are integers in modulo 26
A tranposition cipher
is based on sharing secretcy
is based on personal secretcy
Based on the definition, in a
a single key
is used to encrypt the whole block even if the key is made of multiple values
, we have a plaintext stream, a ciphertext stream, and a
To see the position dependency of the key, a simple polyalphabetic cipher called the
TO BE SECURE, IN4 NEEDS
to be hidden from unauthorized access (
protected from unauthorized change (
and available to an authorized entity when it is needed (
Denial of service