Test I
Identification
1. It is the act of bypassing ones account or database and hacking involves stealing of identity and use it in his/her own interest.
Answer: Computer Hacking
2. Who is the computer ethicist that defines computer hacker as an individual working with computers who was technically gifted and skilled?
Answer: Duncan Langford
3. It is considered as an act of trespassing, it is an unauthorized viewing of someone’s computer private or confidential documents.
Answer: Computer Hacking/Hacking
4. It is a program in which malicious or harmful code is disguised inside some apparently harmless programming or data.
Answer: Trojan Horse/s
5. This is a standalone malware computer program that replicates itself in order …show more content…
Give the four destructive or malicious computer programs.
Answer: Trojan Horses, Worms, Time or Logic Bombs, and Denial-of-service
12-17. Enumerate the motives behind computer hacking.
Answer: Vandalism, Public Interest, Reveal Wrongdoing, Financial Gain, As a Protest, and The Challenge (fun).
Test III
Definition
18-20. Define Computer Hacking.
Answer: Computer Hacking it is the act of bypassing ones account or database and hacking involves stealing of identity and use it in his/her own interest.
PREPARED BY: GROUP II
Chapter II
SUMMARY:
Computer Hacking – it is the act of bypassing ones account or database and hacking involves stealing of identity and use it in his/her own interest.
Computer Hacking in 1960’s up to 1970’s – an individual working with computers who were technically gifted and skilled it was defined by computer ethicist Duncan Langford (1995).
Forester and Morrison Hacker Terms
The Motives Behind Hacking: Vandalism, Public Interest, Reveal Wrongdoing, Financial Gain, As a Protest, The Challenge (fun).
Destructive or Malicious Programs: Trojan Horses, Worms, Time or Logic Bombs, and Denial-of-service.
Hacker Ethics
Hacker As Public Watchdogs
Hacker As Security