Hacking Seth A Borja
Hacking Seth A Borja
Hacking Seth A Borja
A Research Paper
Submitted By:
Seth A. Borja
(Subject)
Submitted To:
(teacher)
Vision: Marinduque State College is a research-driven higher education institution pursuing excellence and innovation by 2025.
Mission: Marnduque State College is committed to pursue progressive and innovative lifelong education founded on humanistic, professional
and technologically advanced programs across cultures and communities by establishing centers of excellence and development and research-
driven outreach program.
Build a Brighter Future with MSC!
Republic of the Philippines
Abstract:
This paper explores the ethics behind ethical hacking and whether there are problems that lie with
this new field of work. Since ethical hacking has been controversial subject over the past few years, the
question remains of the true intentions of ethical hackers. And also what are the differences between of
Vision: Marinduque State College is a research-driven higher education institution pursuing excellence and innovation by 2025.
Mission: Marnduque State College is committed to pursue progressive and innovative lifelong education founded on humanistic, professional
and technologically advanced programs across cultures and communities by establishing centers of excellence and development and research-
driven outreach program.
Build a Brighter Future with MSC!
Republic of the Philippines
I.INTRODUCTION
We often hear about hacking and the dangers it poses. Little did people know that there are two
sides to it like two sides of a coin. Understanding the true intensions of undertaking a hacking activity
requires a deeper understanding than a general knowledge of the concept. For the general public, this
is quite a hard task these days, and it is even harder once the issue of ethics come in. To understand the
intensions of every single ethical hacker getting into vulnerable system or networks, requires a more
complex knowledge.
It is therefore important to explain the two facets of hacking, that is ethical and unethical hacking.
It is necessary to present the two sides of the concept so that people understand why there is a need to
This paper explored the two facets of hacking. It sought to explain the difference between ethical
and unethical hacking. It also sought to compare ethical hacker and unethical hacker.
Vision: Marinduque State College is a research-driven higher education institution pursuing excellence and innovation by 2025.
Mission: Marnduque State College is committed to pursue progressive and innovative lifelong education founded on humanistic, professional
and technologically advanced programs across cultures and communities by establishing centers of excellence and development and research-
driven outreach program.
Build a Brighter Future with MSC!
Republic of the Philippines
II. BODY
system, application, or data ( Ghappour, Ahmed 2017). Carrying out an ethical hack involves
duplicating strategies and actions of malicious attackers. This practice helps to identify security
vulnerabilities which can then be resolved before a malicious attacker has the opportunity to
exploit them. Also known as “white hats,” ethical hackers are security experts that perform
these assessments. The proactive work they do helps to improve an organization’s security
posture. With prior approval from the organization or owner of the IT asset, the mission of
Hacking refers to activities that seek to compromise digital devices, such as computers,
smartphones, tablets, and even entire networks. And while hacking might not always be for
malicious purposes, nowadays most references to hacking, and hackers, characterize it/them as
Many think that “hacker” refers to some self-taught whiz kid or rogue programmer skilled at
modifying computer hardware or software so it can be used in ways outside the original
Vision: Marinduque State College is a research-driven higher education institution pursuing excellence and innovation by 2025.
Mission: Marnduque State College is committed to pursue progressive and innovative lifelong education founded on humanistic, professional
and technologically advanced programs across cultures and communities by establishing centers of excellence and development and research-
driven outreach program.
Build a Brighter Future with MSC!
Republic of the Philippines
developers' intent. But this is a narrow view that doesn't begin to encompass the wide range of
Hacking is typically technical in nature (like creating malvertising that deposits malware in a
drive-by attack requiring no user interaction). But hackers can also use psychology to trick the
user into clicking on a malicious attachment or providing personal data. These tactics are
“Hacking has evolved from teenage mischief into a billion-dollar growth business.” In
fact, it's accurate to characterize hacking as an over-arching umbrella term for activity behind
most if not all of the malware and malicious cyberattacks on the computing public, businesses,
and governments. Besides social engineering and malvertising, common hacking techniques
include: Botnets, Browser, hijacks, Denial of service (DDoS) attacks ,Ransomware, Rootkits,
Unethical Hacking is undertaken in order to provide harm or loss to the company. Even
the hackers are categorized as White Hackers or Black Hackers depending on the type of
More than two months ago, the Philippines was placed under a nationwide lockdown.
Overnight, everything became digital. The traditional classroom set-up became virtual classes, while
Vision: Marinduque State College is a research-driven higher education institution pursuing excellence and innovation by 2025.
Mission: Marnduque State College is committed to pursue progressive and innovative lifelong education founded on humanistic, professional
and technologically advanced programs across cultures and communities by establishing centers of excellence and development and research-
driven outreach program.
Build a Brighter Future with MSC!
Republic of the Philippines
boardroom meetings, as well as informal gatherings, shifted to video conferencing meetings. Online
apps for buying and selling are also utilized, and going cashless has become the preferred mode of
payment.
With the rise of these online platforms, the threat to our personal data is also increasing.
Recent news reported several cyber-related breaches, including fraudulent credit card transactions,
identity thefts, and software stealing. Cybercriminals have taken advantage of the current health
crisis and are attacking individuals, corporations, and even government organizations when their
Hacking is one of the most common types of cybercrimes. These hackers, specifically the
black hat hackers, are responsible for taking advantage of the weaknesses of computer systems and
maliciously infiltrate the same to illegally obtain some gain or benefits ( Thomas J. Holt and
In the Philippines, we have several laws that punish the act of hacking. Foremost is Republic
Act No. 8792, or the Electronic Commerce Act of 2000, which defines hacking as the “unauthorized
or any access in order to corrupt, alter, steal, or destroy using a computer or other similar
information and communication devices, without the knowledge and consent of the owner of the
Vision: Marinduque State College is a research-driven higher education institution pursuing excellence and innovation by 2025.
Mission: Marnduque State College is committed to pursue progressive and innovative lifelong education founded on humanistic, professional
and technologically advanced programs across cultures and communities by establishing centers of excellence and development and research-
driven outreach program.
Build a Brighter Future with MSC!
Republic of the Philippines
viruses and the like, resulting in the corruption, destruction, alteration, theft or loss of electronic
A person who is found guilty of hacking is “punished by a minimum fine of P100,000 and a
maximum commensurate to the damage incurred and a mandatory imprisonment of six months to
three years.”
Republic Act No. 11449, which expanded the Access Devices Regulations Act of 1998, likewise
punishes hacking. A person found guilty of this act is punished by an “imprisonment for not less
than six years and not more than 10 years and a fine of P500,000 or twice the value obtained by the
offender, whichever is higher, without prejudice to the civil liability of the offender.” Moreover,
hacking of a bank’s system is considered an economic sabotage, which is met with the harshest
Under Republic Act No. 10175, or the Cybercrime Prevention Act of 2012, offenses against
confidentiality, integrity and availability of computer data and systems, including, 1.) illegal access
to a computer system without right; 2.) illegal interception; 3.) data interference; and, 4.) system
interference, are penalized. Any person found guilty of any of the above acts shall be “punished
Vision: Marinduque State College is a research-driven higher education institution pursuing excellence and innovation by 2025.
Mission: Marnduque State College is committed to pursue progressive and innovative lifelong education founded on humanistic, professional
and technologically advanced programs across cultures and communities by establishing centers of excellence and development and research-
driven outreach program.
Build a Brighter Future with MSC!
Republic of the Philippines
Finally, Republic Act No. 10173, or the Data Privacy Act of 2012, recognizes the role of
information and communications technology in the modern world, and the need to protect and
secure the rights of the data subject, particularly its right to privacy. The law punishes unauthorized
intentional breach of security data systems where personal and sensitive information is stored. A
person found violating the provisions of the Data Privacy Act will be subject to imprisonment and/or
a fine.
With the government’s policy encouraging everyone to stay, learn, or work from home, focus
on one’s cybersecurity is essential. Being online opens new doors for cybercriminals to exploit our
vulnerabilities. Thus, it is timely and apt to know and understand the laws that protect our rights
against hacking.
Vision: Marinduque State College is a research-driven higher education institution pursuing excellence and innovation by 2025.
Mission: Marnduque State College is committed to pursue progressive and innovative lifelong education founded on humanistic, professional
and technologically advanced programs across cultures and communities by establishing centers of excellence and development and research-
driven outreach program.
Build a Brighter Future with MSC!
Republic of the Philippines
III.Conclusion
Ethical hackers use their knowledge to secure and improve the technology of
they provide remediation advice. In many cases, with the organization’s consent, the ethical
Malicious hackers (Black hat) intend to gain unauthorized access to a resource (the more sensitive
the better) for financial gain or personal recognition. Some malicious hackers deface websites or crash
backend servers for fun, reputation damage, or to cause financial loss. The methods used and
vulnerabilities found remain unreported. They are not concerned with improving the organizations
security posture.
Vision: Marinduque State College is a research-driven higher education institution pursuing excellence and innovation by 2025.
Mission: Marnduque State College is committed to pursue progressive and innovative lifelong education founded on humanistic, professional
and technologically advanced programs across cultures and communities by establishing centers of excellence and development and research-
driven outreach program.
Build a Brighter Future with MSC!
Republic of the Philippines
References
Thomas J. Holt and Bernadette H. Schell (2018). Hackers and Hacking:A Reference Handbook
Wendy Zamora (2018) Under the Hoodie: Why money and power drive hackers to cybercrime
universityoffers-ethical-hacking-course.html
https://www.synopsys.com/glossary/what-is-ethical-hacking.html#:~:text=Ethical%20hacking%20involves
%20an%20authorized,and%20actions%20of%20malicious%20attackers.
and-unethical-hacking/#:~:text=While%2C%20Ethical%20Hacking%20is%20done,or%20loss%20to%20the
%20company. , https://www.synopsys.com/glossary/what-is-ethical-hacking.html#:~:text=Ethical
Vision: Marinduque State College is a research-driven higher education institution pursuing excellence and innovation by 2025.
Mission: Marnduque State College is committed to pursue progressive and innovative lifelong education founded on humanistic, professional
and technologically advanced programs across cultures and communities by establishing centers of excellence and development and research-
driven outreach program.
Build a Brighter Future with MSC!
Republic of the Philippines
%20hacking%20involves%20an%20authorized,and%20actions%20of%20malicious%20attackers.
Vision: Marinduque State College is a research-driven higher education institution pursuing excellence and innovation by 2025.
Mission: Marnduque State College is committed to pursue progressive and innovative lifelong education founded on humanistic, professional
and technologically advanced programs across cultures and communities by establishing centers of excellence and development and research-
driven outreach program.
Build a Brighter Future with MSC!