Hacking Into Ethics

advertisement
Athayde 1
Hacking Into Ethics
EDUB 2330: Teaching Computer Science in Senior Years
Jason M. J. Athayde, 6812398
Instructor: Dr. Reynold V. J. Redekopp
Athayde 2
Preamble
As the world of technology grows and those involved seek to further the industry,
individuals and groups of individuals seek to further their own abilities through the
manipulation and invasion of these new developments. As educators of computer science,
we are charged with the care of budding programmers and the growth of their abilities.
Those who pursue lives entrenched in the world of computer science may use their
abilities to promote the development of technology, but there are some who may instead
find themselves with malicious intentions. Some may perform deeds that cause harm to
others without realizing the damage being caused, due to the distance and separation that
computers allow.
As educators, we cannot force value systems on our students. However, we can
discuss hacking and the issues that arise therein, promoting certain views. This paper
looks at the history of hacking and continues discussions in today’s world about the ethics
of teaching about hacking in the classroom.
History of Hacking
Computer science journalists agree that hacking can be traced back to 1960 at the
Massachusetts Institute of Technology (MIT), where students enrolled in an artificial
intelligence (AI) course were able to take programs and alter them to execute different
(possibly undesirable) actions. It was one decade later that hacking made its presence
known in society through “phone phreaking,” a process that allowed John Draper to access
AT&T’s long-distance switching system by playing a certain sound frequency. It can be
noted that Steve Jobs, known for his work with Apple Inc., previously made and sold
devices to play this frequency and make free long-distance phone calls.
Athayde 3
It was in the 1980s that hacking took off as a way to use, explore, and build
knowledge in computer science. With the greater emergence of hacking, the United States
Congress passed the Computer Fraud and Abuse Act of 1986, which essentially
criminalized the act of remotely accessing government and bank computers. The act has
been amended five times since its first edict, having to be adjusted to suit the ever-changing
times.
Many computer hackers initially put emphasis on obtaining access to the computers
of governments, banks, and financial institutions, as they were seen as the most profitable.
As internet use became more widespread, however, it was realized that more and more
points of computer access were being created by the day. In recent times, one of the most
memorable viruses was the “I Love You” virus of 2000, which was distributed through
emails and sent itself to the user’s email contacts while performing unwanted actions on
the computer’s system. As with most other viruses, the user had to open a file that would
cause the virus to activate; in this case it was an email attachment with a hidden, malicious
extension.
As with the implementation that led to the notable spread of the “I Love You” virus,
hackers who target general society will do so through websites and programs that base
themselves around popular culture or the quick perusal of links without thought (for
example, pornographic websites). Also, with the emergence of social networking sites,
hackers have been making attempts (which are sometimes successful, as with the recent
shutdown of Twitter) to access and manipulate such sites to garner information and data
on their users. This data would then, in theory and practice, be used to commit identity
theft and fraud.
Athayde 4
Even more recently, hacking has worked its way into debit card and credit card
fraud. Card issuers have been using chips to ensure the security of encoded data, but
though the chip cards are being touted as very high in security, it is still possible to extract
the information the cards contain.
Sith versus Jedi
There have traditionally been two general ways to define a hacker. One, which
relates more to the original development of hacking and is seen as more complimentary, is
as “a person who enjoys learning the details of computer systems and how to stretch their
capabilities,” or as “one who programs enthusiastically or who enjoys programming rather
than just theorizing about programming.” (Palmer 769) Alternately, a hacker can be
described in a much more negative context, as viewed by general society, as “someone who
maliciously breaks into systems for personal gain… they modify, delete, and steal critical
information, often making other people miserable.” (Farsole, Kashikar, & Zunzunwala 11)
There are, of course, other ways of looking at or defining hackers. There are some
who are simply testing their programming knowledge without malicious intent, though in
some cases the breach of security is noted and much time must be devoted to ensure that
the system that was accessed was not otherwise compromised. Because they are testing
their knowledge as novices, they may not realize when they are causing damage. There are
also “ethical hackers,” ones who have all of the skills of a malicious hacker, but use such
skills as computer security professionals to prevent the malicious hackers from carrying
out their plans. Ethical hackers are hired by governments, businesses, and software
developers who need to ensure that their systems have no holes, which is mostly desired
when their systems have large networks or they wish to make use of the Internet.
Athayde 5
The basic premise behind the function of ethical hacking is that “to catch a thief,
think like a thief.” (Farsole, Kashikan, & Zunzunwala 14) Essentially, ethical hackers try to
hack a system just as a malicious hacker would, except no undesirable things are done to
the system, and the holes (through which the hack is done) are reported and covered. This
is typically done before the system is released to the public, so that once that is done,
malicious hackers cannot get the access they want.
Teaching About Hacking
Typically, those outside of computer science’s realm object to the teaching of
hacking, as hacking has a negative connotation and it is believed that the teaching of such
will results in more malicious hackers. However, others (mainly directly involved with
computer science) believe that without such education, there will be fewer ethical hackers,
and malicious hackers will remain unchecked.
Universities and colleges are increasingly teaching about hacking. At first, this was
seen as dangerous, as stated in the Lemos article, “especially if the courses went beyond
computer intrusion and into cybercrime.” The University of Calgary had, at one point, set
out assignments wherein students had to create computer viruses, which of course was not
viewed favourably. Lemos says, however, that “ethical hacking courses have become more
mature and more accepted.”
Courses regarding hacking have, in fact, come to be endorsed by Microsoft. The
company has been working with various universities to teach students how to fix security
issues in software, even sponsoring such programs. According to the Evers article, Stuart
Okin, the chief security officer of Microsoft in the United Kingdom, hopes of a world where
“every computing course is teaching some part of writing secure code.”
Athayde 6
Author’s Opinion and Conclusion
To an extent, hacking should be taught in schools, and not necessarily strictly at a
university level. Ethical hacking can be a career pursuit for those in computer science, and
it should be presented as a viable option for students. It is part of the career focus that
makes computer science worth taking; as fun as it is, there still needs to be purpose, and
ethical hacking is one such purpose.
There is also a legal reason to teach about hacking: it is part of the computer science
curriculum in Manitoba. SLO 1.3.1 states that students will “discuss the effects of computer
crime, hacking, plagiarizing code, software piracy, virus distribution, and wilful destruction
of data,” and SLO 1.3.2 states that students will “demonstrate responsible security practices
while using computers and networks.” SLO 2.3 regards exploring and researching careers
in computer science. Clearly it is the case that at the most minimal level, hacking must be
discussed.
It is not this author’s belief, however, that students should be taught to write
malicious programs. If they wish to do that, they will find that on their own time. With the
“Sith versus Jedi” metaphor, the Jedi need not know how to manipulate the Dark Side of the
Force, they need only defend against it. Similarly, though ethical hackers may need to think
as malicious hackers would, the work done in computer science classes should directly
relate to fixing potential problems, not exploiting them.
Though ethics cannot be forced (just as learning cannot be forced), ethics systems
can be presented and demonstrated as options. As educators of those who could one day
take over the world, it is that demonstration that we are tasked with.
Athayde 7
Works Referenced
Farsole, A. A., Kashikar, A. G., & Zunzunwala, A. (2010). Ethical Hacking. International
Journal of Computer Applications, 1(10), 11-17.
Palmer, C. C. (2001). Ethical Hacking. IBM Systems Journal, 40(3), 769-780.
Hacker (computer security). (n.d.). Wikipedia. Retrieved November 6, 2010, from
en.wikipedia.org/wiki/Hacker_%28computer_security
How safe is your swipe? Thinking like hackers, programmers find security loopholes in
'secure' microchips. (n.d.). Science Daily: News & Articles in Science, Health,
Environment & Technology. Retrieved November 6, 2010, from
http://www.sciencedaily.com/releases/2010/09/100920123914.htm
Profs Patrol Cyberspace, Research Computer Hacking And Data Recovery. (n.d.). Science
Daily: News & Articles in Science, Health, Environment & Technology. Retrieved
November 6, 2010, from
http://www.sciencedaily.com/releases/2004/09/040921074111.htm
Lemos, R. (n.d.). Teaching hacking helps students, professors say. SecurityFocus. Retrieved
November 6, 2010, from http://www.securityfocus.com/news/11480
Delio, M. (2001, April 14). Teaching Kids About Hacking . Wired News . Retrieved November
6, 2010, from
http://www.wired.com/culture/lifestyle/news/2001/04/42923?currentPage=all
Evers, J. (2003, March 21). Microsoft asks colleges to teach hacking | Developer World InfoWorld. Business technology, IT news, product reviews and enterprise IT strategies
- InfoWorld. Retrieved November 6, 2010, from
http://www.infoworld.com/d/developer-world/microsoft-asks-colleges-teachhacking-609
Download