This Study Resource Was: Case 01: Reformed Hacker?

Download as pdf or txt
Download as pdf or txt
You are on page 1of 3

Case 01: Reformed Hacker?

According to John Markoff’s ‘‘Odyssey of a Hacker: From Outlaw to Consultant,’’ John T. Draper is attempting to
become a ‘‘white-hat’’ hacker as a way of repaying society for previous wrong doing. In the early 1970s, Draper
became known as ‘‘Cap’n Crunch’’ after discovering how to use a toy whistle in the Cap’n Crunch cereal box to
access the telephone network in order to get free telephone calls.
While serving time in jail for his misdeeds, he came up with the early design for EasyWriter, IBM’s first word-
processing program for its first PC in 1981. However, says Markoff, in subsequent years Draper used his skills to
hack into computer networks, became a millionaire, lost jobs, and experienced homelessness.
Now, however, Draper has been enlisted to help operate an Internet security software and consulting firm that
specializes in protecting the online property of corporations. Draper says, ‘‘I’m not a bad guy.’’ However, realizing
there are bound to be doubters, he adds, ‘‘But I’m being treated like a fox trying to guard the hen house.’’ SRI
International’s computer security expert Peter Neumann summarizes the concern:
“Whether black hats can become white hats is not a black-and-white question. In general, there are quite a few
black hats who have gone straight and become very effective. But the simplistic idea that hiring overtly black-hat
folks will increase your security is clearly a myth.”
Discuss the ethical issues this case raises. What might reasonably convince doubters that Draper has, indeed,

m
reformed? Are customers of the consulting firm entitled to know about Draper’s history and his role at the firm?

er as
co
Ans: In this reformed hacker case, the ethical issue raise was about John T. Draper

eH w
wrong doing to society. First he used toy whistle from cereal box to access the

o.
telephone network in order to get free telephone calls then many times he hacked
rs e
into computer networking and lost his job and home. However there few things he
ou urc
did which reformed him. He designed first IBM word-processing program and also
worked for other firms in computer networking; which shows that Draper has
o

indeed reformed. According to me, customers of the consulting firms should know
aC s
vi y re

about the draper history and his role at firm because he was a thief before and even
after going to jail for misdeed he also used his hacker trick into other firms and
destroyed his career. Due to all his criminal activity, he shouldn’t be trusted.
ed d
ar stu

In this case, the ethical issue raise was about John T. Draper wrong doing to
society. Notwithstanding he used toy yell from grain box to get to the telephone
is

organize to get free telephone calls then generally he hacked into PC frameworks
Th

affiliation and lost his occupation and home. However there couple of things he did
which enhanced him. He illustrated out first IBM word-get ready program
sh

additionally worked for various firms in PC managing; which demonstrates that


Draper has certainly changed. As demonstrated by me, customers of the organizing
firms should consider the draper history and his part at firm since he was a cheat
before and even in the wake of going to restrict for wrongdoing he additionally

This study source was downloaded by 100000801312284 from CourseHero.com on 10-03-2021 00:54:01 GMT -05:00

https://www.coursehero.com/file/21560830/EE-Assignment/
used his item configuration trap into various firms and destroyed his occupation. In
light of all his criminal activity, he shouldn't be trusted.

Case 02: Software for a Library


A small library seeks a software system to catalogue its collection and
keep records of materials checked out of the library. Currently, the
records of who has checked out what, when materials are due, and the
like are kept in a file drawer behind the check-out desk. These records
are confidential. Patrons are assured that these records are not
accessible to anyone other than library personnel. But, of course,
drawers can be opened when no one is looking.

m
What assurance is there that the software systems under consideration

er as
will provide as much, if not greater, security? If no one in the library is a

co
eH w
software specialist, the library has no alternative but to place its trust in

o.
rs e
someone who presumably has the requisite expertise. How concerned
ou urc
should that expert be (again, bearing in mind that even the best system
is not completely sleuth proof)? Furthermore, what assurance has the
o

library that it is not being oversold or undersold in general? To what


aC s
vi y re

extent should software specialists be concerned with determining


precisely what the various needs of the library are—and to try to meet
those needs rather than offer more than is necessary to secure greater
ed d
ar stu

profit or less than is needed to come in with a lower bid?

Ans: In the case the library seeks for a software system which can
is

provide high security of confidential documents and it will be reliable


Th

software. Before confidential data of the library were kept manually in a


file drawer which was not fully secured because anyone could see the
sh

documents when there is no one in the desk. If document keeping


system become software based then there will be added some security
on the software that anyone can’t see the confidential records so easily.
Though there are some issues of software security but if the software is

This study source was downloaded by 100000801312284 from CourseHero.com on 10-03-2021 00:54:01 GMT -05:00

https://www.coursehero.com/file/21560830/EE-Assignment/
maintained properly with encrypted password system the confidential
document will be able to keep secure and if new operator appointment
is necessary for the software operation the operator should be

m
er as
co
eH w
o.
rs e
ou urc
o
aC s
vi y re
ed d
ar stu
is
Th
sh

This study source was downloaded by 100000801312284 from CourseHero.com on 10-03-2021 00:54:01 GMT -05:00

https://www.coursehero.com/file/21560830/EE-Assignment/
Powered by TCPDF (www.tcpdf.org)

You might also like