Beruflich Dokumente
Kultur Dokumente
Krutz
Russell Dean Vines
The CEH
Prep Guide:
The Comprehensive
Guide to Certified
Ethical Hacking
Wiley Publishing, Inc.
35921ffirs.qxd:WileyRed 9/3/07 10:35 PM Page iii
35921ffirs.qxd:WileyRed 9/3/07 10:35 PM Page ii
The CEH
Prep Guide:
The Comprehensive Guide to
Certified Ethical Hacking
35921ffirs.qxd:WileyRed 9/3/07 10:35 PM Page i
35921ffirs.qxd:WileyRed 9/3/07 10:35 PM Page ii
Ronald L. Krutz
Russell Dean Vines
The CEH
Prep Guide:
The Comprehensive
Guide to Certified
Ethical Hacking
Wiley Publishing, Inc.
35921ffirs.qxd:WileyRed 9/3/07 10:35 PM Page iii
The CEH
The Code title number (each title is a grouping of statutes dealing with
a particular subject matter)
The extent to which the offense violated the privacy rights of individuals
harmed
Fine or imprisonment for not more than 20 years, or both in the case of an
offense that occurs after a conviction for another offense under this section
Fine or imprisonment for not more than one year, or both, in the case of
an offense of this section which does not occur after a conviction for
another offense under this section,
Fine or imprisonment for not more than 20 years, or both in the case of
an offense that occurs after a conviction for another offense under this
section
Ethics
Ethics is concerned with standards of behavior and considerations of what is
right and what is wrong. It is difficult to state hard ethical rules because
definitions of ethical behavior are a function of an individuals experience,
background, nationality, religious beliefs, culture, family values, and so on.
Chapter 2 Legality and Ethics 35
35921c02.qxd:WileyRed 8/31/07 8:09 PM Page 35
Ethical computing should incorporate ethical norms. Furthermore, if an indi-
vidual is a certified professional in ethical computing or information systems
security, that individual is required to adhere to higher ethical and legal stan-
dards than noncertified personnel.
Hackers sometimes justify their attacks on computers with the following
rationale:
Computer files should always be backed up, so files that I might damage
can be retrieved.