50 |
50 |
51 {\Large\bf Warning!} However, don’t be evil! Using those |
51 {\Large\bf Warning!} However, don’t be evil! Using those |
52 techniques in the real world may violate the law or King’s |
52 techniques in the real world may violate the law or King’s |
53 rules, and it may be unethical. Under some circumstances, even |
53 rules, and it may be unethical. Under some circumstances, even |
54 probing for weaknesses of a system may result in severe |
54 probing for weaknesses of a system may result in severe |
55 penalties, up to and including expulsion, civil fines, and |
55 penalties, up to and including expulsion, fines and |
56 jail time. Acting lawfully and ethically is your |
56 jail time. Acting lawfully and ethically is your |
57 responsibility. Ethics requires you to refrain from doing |
57 responsibility. Ethics requires you to refrain from doing |
58 harm. Always respect privacy and rights of others. Do not |
58 harm. Always respect privacy and rights of others. Do not |
59 tamper with any of King's systems. If you try out a technique, |
59 tamper with any of King's systems. If you try out a technique, |
60 always make doubly sure you are working in a safe environment |
60 always make doubly sure you are working in a safe environment |
61 so that you cannot cause any harm, not even accidentically. |
61 so that you cannot cause any harm, not even accidentally. |
62 Don't be evil. Be an ethical hacker. |
62 Don't be evil. Be an ethical hacker. |
63 |
63 |
64 |
64 |
65 In this lecture I want to make you familiar with the security |
65 In this lecture I want to make you familiar with the security |
66 mindset and dispel the myth that encryption is the answer to |
66 mindset and dispel the myth that encryption is the answer to |