Legal and Ethical issues

Legal and Ethical issues

Cracking
 Cracking is illegally entering a computer or a network and using or destroying its databases.
Pornography
 Pornography is the display and spreading of obscene information and pictures.
Copyright
The exclusive right given by law for a certain term of years to an author, composer etc.to print, publish and sell copies of his original work. Copyright allows authors, musicians, artists, etc. to make money of their labor.  It also prevents people from altering the work without permission. Copyright law can be protected, Literary Works, Musical Works, Dramatic Works, Choreographic Work, Pictorial, Graphic,  Sculptural Works, Motion Pictures ,AV, Sound Recordings, Architectural Works. It give the copyright holders  to reproduce the work, Right to prepare derivative works, Right to distribute copies for sale, Right to perform AV works publicly, Right to display musical and artistic works publicly.
Plagiarism
Plagiarism is the act of taking another person's writing, conversation, song, or even idea and passing it off as your own. This includes information from web pages, books, songs, television shows, email messages, interviews, articles, artworks or any other medium. Whenever you paraphrase, summarize, or take words, phrases, or sentences from another person's work, it is necessary to indicate the source of the information within your paper using an internal citation.
Hacking
The process of attempting to gain or successfully gaining unauthorized access to computer resources for the purpose of help or secure system is called hacking. Hacking is the technique in which any one can access and one’s computer without his permission . A hacker knows all about the operating system and different holes in the system. Computer hacking is when files on your computer are view created or edited without your authorization. Hacker can gain complete access to your computer from any were in the world if your computer is turned ON, unprotected and has an internet connection.
1.   White-Hat Hackers
The good guys who identify the security weakness of the system or network and inform the owner about them. A white hat hacker breaks security for no-malicious reason, perhaps to test their own security system or while working in a security company which makes security software. White –hat hacker is also referred to as the ethical hacker.
2.   Black Hat Hacker
A black hat is the villain or bad guy, who crash into victim’s security to steal information and destroy the victims security network. Black hat hacker is also known as cracker. Black hat hacker break into secure networks to destroy data.
3.   Grey Hat Hackers

Grey hat hacker is the combination of black hat hacker and a white hat hacker .A grey hat hacker may surf the internet and hack into a computer system for the sole purpose of notifying the administrator that their system has a security defect, for example. Then they may offer to correct the defect for a fee.