MODULE 7 SAQs
1. What is spamming? Differentiate it from flaming.
Spamming is the process where individuals post identical messages to different newsgroups sometimes with the intent of purposely disrupting ongoing discussions. It also may mean sending mass copies of unsolicited Email to multiple addresses. This action makes it more difficult for receivers to separate personal Email from ‘junk mail’ and maintain on-topic, relevant newsgroup discussions. It may also result in local technical problems such as storage overflow and slow response.
Flaming is a public personal attack against another user (calling another user names). The absence of a social mechanism to correct the behavior and the anonymity of the abusers, may lead to flaming that is initially amusing to bystanders but can quite rapidly get out of control.
2. What are computer worms and viruses? Explain how these operate. Give examples.
A computer virus attaches itself to a program or file so it can spread from one computer to another, leaving infections as it travels. Much like human viruses, computer viruses can range in severity; some viruses cause only mildly annoying effects while others can damage your hardware, software, or files. Almost all viruses are attached to an executable file, which means the virus may exist on your computer but it cannot infect your computer unless you run or open the malicious program. It is important to note that a virus cannot be spread without a human action, (such as running an infected program) to keep it going. People continue the spread of a computer virus, mostly unknowingly, by sharing infecting files or sending e-mails with viruses as attachments in the e-mail.
A worm is similar to a virus by its design, and is considered to be a sub-class of a virus. Worms spread from computer to computer, but unlike a virus, it has the ability to travel without any help from a person. A worm takes advantage of file or information transport features on your system, which allows it to travel unaided. The biggest danger with a worm is its ability to replicate itself on your system, so rather than your computer sending out a single worm, it could send out hundreds or thousands of copies of itself, creating a huge devastating effect. One example would be for a worm to send a copy of itself to everyone listed in your e-mail address book. Then, the worm replicates and sends itself out to everyone listed in each of the receiver's address book, and the manifest continues on down the line. Due to the copying nature of a worm and its ability to travel across networks the end result in most cases is that the worm consumes too much system memory (or network bandwidth), causing Web servers, network servers, and individual computers to stop responding. In more recent worm attacks such as the much talked about .Blaster Worm, the worm has been designed to tunnel into your system and allow malicious users to control your computer remotely.
3. Choose one example of computer abuse which you think is morally wrong. Explain why you consider it morally wrong using any of the ethical principles you have learned in the earlier modules.
Hacking is one of a computer abuse that is really destructive. At first, "hacker" was a positive term for a person with a mastery of computers who could push programs beyond what they were designed to do.
According to The New Hacker's Dictionary(http://www.logophilia.com/jargon/jargon_toc.html) a hacker can be defined as:
1. A person who enjoys exploring the details of programmable systems and how to stretch their capabilities, as opposed to most users, who prefer to learn only the minimum necessary.
One who programs enthusiastically (even obsessively) or who enjoys programming rather than just theorizing about programming.
2. A person capable of appreciating hack value.
3. A person who is good at programming quickly.
4. An expert at a particular program, or one who frequently does work using it or on it.
5. An expert or enthusiast of any kind.
6. One who enjoys the intellectual challenge of creatively overcoming or circumventing limitations.
Nowadays, a number of issues arise in considering hacking from the educator perspective. First, we need to consider the fact that the public perception of hackers is mixed, and that "hacking" and "being considered a hacker" can be quite appealing to students who are going through developmental periods in which they are defining themselves, as well as challenging authority and rules. There is often a Robin Hood mentality to early actions, though it is unclear exactly who "the poor" are, and how they are "being compensated". Second, the anonymity of actions which hackers perform against others often enhances the severity of actions. For example, an adolescent who would never consider picking someone's pocket or physically damaging someone else's property or home, might be quite willing to steal people's credit card numbers or destroy poorly protected business or government files, since files and credit card numbers are not tangible entities, and the damage is done anonymously.
We studied About different ethical principles, one of the definition stated “Ethics as an concept suggests the notion of correct or incorrect practices relative to various concerns or fields of study” thus hacking is one of the applied ethics that holds the boundaries of the study. Although “hackers” have their own reason in doing such things, the absence of good values, correct practices, and right attitudes point to their job.
We also studied about the different existing laws such as Divine, Natural, Moral and Physical law. Divine law - Allowing evil thoughts can be considered committing a sin, how much more if you put it into action like the job of the hackers. Natural law – according to Plato, we must infatuated the law within our selves and not only the institutional law given by the human beings, it means that every human being must show innate goodness, thus hackers can also apply in their profession.
We also studied the ten commandments for computer ethics. Almost all the given precept violated by the “hackers”.
0 Comments:
Post a Comment
<< Home