Internet Security: Hacking, Counterhacking, and SocietyThe frequency of digital attacks and intrusions has steadily increased over the years as the number of people with the appropriate motivation and technical ability continues to grow. Internet Security: Hacking, Counterhacking, and Society is a modern survey of the recent ethical policy issues arising in connection with Internet and network security. This exciting collection of papers, articles, and monographs discusses a number of important ethical questions arising in many distinct areas of Internet and network security, including: Are hacker attacks and hacktivism morally justified? Is hacking justified as self-defense? How should professionals respond to security issues? Is publishing malicious code protected by moral rights to free speech? Is it morally permissible for the government or individuals to actively conceal e-content? Internet Security: Hacking, Counterhacking, and Society is a valuable addition to the library of anyone concerned with the growing number of Internet security issues and intrusions facing society today. |
Contents
Part | 3 |
Chapter | 9 |
Is Hacktivism Morally Justified? | 73 |
Response to Computer Intrusions | 99 |
Professionalism Profits Ethics or Sleaze? | 143 |
Implementing ValueSensitive | 153 |
Software Development | 171 |
Kai Kimppa Andy Bissett and N Ben Fairweather Security in | 221 |
Maria CanellopoulouBottis Disclosing Software | 255 |
Common terms and phrases
acts of civil acts of hacktivism aggressive anonymous argue argument Available break-ins browser buffer overflow claim communication computer security computer systems Computer Virus cookie cookie watcher Core Wars crime cyber cyberattacks cyberspace cyberterrorism damage database defense principle digital attack digital intrusions disclosure discussion disk electronic civil disobedience encryption ethical issues evaluation example Gotterbarn hacker ethic hackers hacking hacktivism hacktivists harm Himma impact individuals informed consent innocent intellectual property intermediate responses Internet development involving justified legitimate machines motivated Mozilla necessity principle on-line games password person political potential problems professional protect punishment relevant requires result risk secure software server significant social software development software development process Software Engineering software process software project goals someone Spafford steganalysis steganography Tavani terrorists third parties threat tion unauthorized user stories users vendors victim virus viruses vulnerability worm