Preview

Corporate Social Responsibility and Business Ethics: Ethical and Unethical Hacking

Powerful Essays
Open Document
Open Document
4335 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Corporate Social Responsibility and Business Ethics: Ethical and Unethical Hacking
CORPORATE SOCIAL RESPONSIBILITY AND BUSINESS ETHICS

ETHICAL AND UNETHICAL HACKING

Acknowledgement

We would like to express our special thanks of gratitude to our teacher, Professor Supriya Matthew who gave us the golden opportunity to do this project on the topic “Ethical and Unethical Hacking”, which also helped us in doing a lot of Research and we came to know about so many new things I am really thankful to her.
Whatever we have done is only due to her guidance and assistance.
Completion of this project within the limited time frame would be impossible without her continuous support and guidance.

Student Declaration This is to certify that the Research work incorporated in the report “Ethical and Unethical Hacking” a bonafide work done by Nikita Aurora, Arvin Tamboowalla, Aakash Mansukhani, Devangna Dossa and Nikita Sahota.
This work is submitted in partial fulfillment of the requirement for BBA degree in the academic year 2013 – 2014.

INDEX

SR.NO
TOPIC
1.
Literature Review
2.
Hypothesis
3.
Objectives
4.
Introduction
5.
Primary and Secondary Data
6.
Conclusion
7.
Bibliography

Literature Review

1. Dr.B.Muthukumaran is his article cybercrime scenario in india mentions that “Cyber-crime is emerging as a serious threat. World-wide governments, police departments and intelligence units have started to react. Initiatives to curb cross border cyber threats are taking shape. Indian police has



Bibliography: As per the Google’s Transparency Report, 2013, in the case of India, the number of user data requests rose by 16 per cent to 2,691 in January-June this year from 2,319 in the same period in 2012.” Hypothesis

You May Also Find These Documents Helpful

  • Better Essays

    Oriyano, S.-P., & Gregg, M. (2011). Hacking Techniques, Tools, and Incident Handeling . Burlington: Jones & Bartelle Learning .…

    • 1902 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    Nt1310 Final Exam

    • 393 Words
    • 2 Pages

    Computer Hacking in 1960’s up to 1970’s – an individual working with computers who were technically gifted and skilled it was defined by computer ethicist Duncan Langford (1995).…

    • 393 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Crt 205 Final Project

    • 2361 Words
    • 10 Pages

    | |author. If none exist, explain how you |However, hacking is a process use be Information Technology (IT) |…

    • 2361 Words
    • 10 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Tim J. Watts goes more into the dark side of the “hacker” community by bringing up the constant back in forth between computer security officers and the so called hackers. This article, being written this year is able to reflect on the events of September 11, 2001 and new homeland security measures. He represents this viewpoint of a dangerous hacker in his definition: “While some hackers are harmless, others break into systems with the intent to steal information or to do destruction to the system. Hackers performing the latter pose a serious threat to the economic future of the United States” (Watts). Tim Watt outright blames the hacker community of accessing information that should be private. Only looking and reflecting on the serious threat…

    • 154 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    The Certification of Ethical Hacker is achieved after completing a program involved with popular information security and hacking training. Investigators are taught techniques that are used by malicious, black hat hackers.…

    • 966 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Digital Crime

    • 5203 Words
    • 21 Pages

    Computers are used for many different types of personal and work related activities. Getting on the Internet and researching a topic for a college paper, researching types of flat screen televisions and their various prices, or what about getting on the computer and playing games, or using computers to watch movies and chat with friends and family. From a work standpoint, computers assist in processing orders, calculating and tracking numbers, manufacturing vehicles, sending email, and literally millions of other computer related activities. But, what if computers were used to copy Microsoft’s Office software applications and sell them at 60% cost on the black market? What if computers were used to login to accounts that weren’t the owners and take unauthorized data to sell for identify theft purposes? What if computers were used to hack into databases and “borrowed” data that then provided “insider information” that endowed an unprecedented stock gain for Members of the Board of Directors? These examples would mean that computers were being used for cyber-crimes. There are four primary categories of these types of cyber-crimes that will be the focus of this research paper.…

    • 5203 Words
    • 21 Pages
    Powerful Essays
  • Best Essays

    McClure, S., Scambray, J., & Kurtz, G. (2009). Hacking exposed 6: Network security secrets & solutions. New York: McGraw-Hill.…

    • 4737 Words
    • 19 Pages
    Best Essays
  • Good Essays

    Kevin Poulsen Report

    • 1849 Words
    • 8 Pages

    Kevin Poulsen is a news editor at wired.com, and is co-author of Kingpin — How One Hacker Took Over the Billion Dollar Cyber Crime Underground (Crown, 2010). However, Poulsen did not start out as a journalist. Kevin Poulsen began his “career” as a hacker, and thanks to media attention, became rather notorious for his exploits. In this report I will attempt to highlight what Kevin Poulsen is famous for, what techniques he used, the criminal charges faced and the possible punishments, the social and ethical issues surrounding the case, and what countermeasures could have been used to prevent Poulsen's attacks.…

    • 1849 Words
    • 8 Pages
    Good Essays
  • Better Essays

    Trends in Cybercrime

    • 1077 Words
    • 5 Pages

    Cybercrime is nothing to new in this day and time; this has been a problem for many since the early onset of the 80’s. Although much seems to have been done to combat cybercrime over the years, criminals still have an advantage edge. With IT experts, companies see now just how important it is to involve law enforcement in the efforts to fight against computer crime. Computer cybercrime as we know it today is now used as potentially illegal activities.…

    • 1077 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Abstract: The study seeks to identify the relationship between student seating preference within the classroom and academic performance. Data was collected from 56 2nd year BBA students of IBA, Dhaka University through questionnaire survey. The result showed there is an inverse relation between sitting in the back seats and CGPA. However, the direction of inverse relation is not incrementally linear.…

    • 1243 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Bibliography: “Key events in Computer Hacking.” 12 May 2000. Issues and Controversies Facts on File…

    • 1908 Words
    • 8 Pages
    Better Essays
  • Good Essays

    People think that when they post something online, whether it is good, bad, privately, or publicly, that information is safely sealed and secured. But the truth is, it can be freely access or easily steal from them. Hacking, viruses, trojans, and especially own self are some of the reasons that threaten internet security. Among all of these examples, hacking is on the top list. Even though there are some laws against hacking like the Republic Act No. 10175, also known as the Cybercrime Prevention Act of 2012, it is not enough assurance to protect the people against hackers and it doesn’t improve the internet security. Changes need to be made in the law to increase internet security, and find and punish cyber criminals. Additional laws to stop cybercriminals and necessary, unenforceable, and could infringe upon interest users rights to privacy and the growth of the internet.…

    • 894 Words
    • 4 Pages
    Good Essays
  • Good Essays

    In today’s information age, the issue of ethics has risen to the forefront of the business agenda. Constant innovation and advancement of Information technology, and the widespread use of information systems, has posed many challenges to the business world, and raised many ethical issues that also affect society as a whole. Ethics is a fundamental concern of every human being, and everyone should have the freedom of choice, but when this choice is taken out of your control, which is often the case with recent developments in information technology, a serious issue has arisen. “Ethics must begin at the top of an Organisation. It is a leadership issue, and the chief executive must set the example.” Edward Hennessy, CEO, Allied Signal. The ease in which computer systems now share and distribute digital information among its users of one of the great success stories of modern technology, however, such technology can also give way to widespread misuse, criminal activity and mistreatment towards others.…

    • 1056 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Internship Report

    • 9438 Words
    • 38 Pages

    The report titled above is submitted as partial fulfillment of the requirements of BBA program.…

    • 9438 Words
    • 38 Pages
    Satisfactory Essays
  • Good Essays

    Case Study

    • 957 Words
    • 4 Pages

    According to data from Indian Computer Emergency Response Team (Cert-In), in November last year more than 800 “.in” websites and nearly 700 “.com” websites in India were defaced by miscreants. A good number of Indian sites, including a few government ones, are hacked by cyber criminals every year. This has spurred the demand for security professionals and white-hat hackers.…

    • 957 Words
    • 4 Pages
    Good Essays