handouts/ho01.tex
changeset 160 4cbd6ca025e6
parent 159 77cf0362b87a
child 167 d8657ff8cca1
equal deleted inserted replaced
159:77cf0362b87a 160:4cbd6ca025e6
    50 
    50 
    51 {\Large\bf Warning!} However, don’t be evil! Using those
    51 {\Large\bf Warning!} However, don’t be evil! Using those
    52 techniques in the real world may violate the law or King’s
    52 techniques in the real world may violate the law or King’s
    53 rules, and it may be unethical. Under some circumstances, even
    53 rules, and it may be unethical. Under some circumstances, even
    54 probing for weaknesses of a system may result in severe
    54 probing for weaknesses of a system may result in severe
    55 penalties, up to and including expulsion, civil fines, and
    55 penalties, up to and including expulsion, fines and
    56 jail time. Acting lawfully and ethically is your
    56 jail time. Acting lawfully and ethically is your
    57 responsibility. Ethics requires you to refrain from doing
    57 responsibility. Ethics requires you to refrain from doing
    58 harm. Always respect privacy and rights of others. Do not
    58 harm. Always respect privacy and rights of others. Do not
    59 tamper with any of King's systems. If you try out a technique,
    59 tamper with any of King's systems. If you try out a technique,
    60 always make doubly sure you are working in a safe environment
    60 always make doubly sure you are working in a safe environment
    61 so that you cannot cause any harm, not even accidentically.
    61 so that you cannot cause any harm, not even accidentally.
    62 Don't be evil. Be an ethical hacker.
    62 Don't be evil. Be an ethical hacker.
    63 
    63 
    64 
    64 
    65 In this lecture I want to make you familiar with the security
    65 In this lecture I want to make you familiar with the security
    66 mindset and dispel the myth that encryption is the answer to
    66 mindset and dispel the myth that encryption is the answer to