Assignment 2 Semester 2 2025
Unique Number:
Due Date: 25 September 2025
QUESTION 1
Discuss and provide examples of the main differences between hacking and cracking
Hacking and cracking are both terms linked to gaining access to computer systems, but they
are not the same. Hacking is often done to understand systems better, sometimes even with
good intentions. For example, ethical hackers test systems to find weaknesses before
criminals can use them. Some hackers help companies improve their cybersecurity. These
types of hackers do not damage systems or steal information.
Cracking, on the other hand, is done with bad intentions. Crackers break into systems to
steal data, damage files, or cause harm. They may crack software to remove security codes
or license checks. For example, when someone removes the activation code from a program
so others can use it for free, that is cracking.
The key difference is the purpose. Hackers may explore and report problems, while crackers
want to break, destroy, or steal. Hackers can be legal and helpful. Crackers are always
breaking the law and damaging property. Terms of use
By making use of this document you agree to:
Use this document as a guide for learning, comparison and reference purpose,
Terms of use
Not to duplicate, reproduce and/or misrepresent the contents of this document as your own work,
By making use of this document you agree to:
Use this document
Fully accept the consequences
solely as a guide forshould you plagiarise
learning, reference,or and
misuse this document.
comparison purposes,
Ensure originality of your own work, and fully accept the consequences should you plagiarise or misuse this document.
Comply with all relevant standards, guidelines, regulations, and legislation governing academic and written work.
Disclaimer
Great care has been taken in the preparation of this document; however, the contents are provided "as is" without any express or
implied representations or warranties. The author accepts no responsibility or liability for any actions taken based on the
information contained within this document. This document is intended solely for comparison, research, and reference purposes.
Reproduction, resale, or transmission of any part of this document, in any form or by any means, is strictly prohibited.
, +27 67 171 1739
QUESTION 1
Discuss and provide examples of the main differences between hacking and
cracking
Hacking and cracking are both terms linked to gaining access to computer systems,
but they are not the same. Hacking is often done to understand systems better,
sometimes even with good intentions. For example, ethical hackers test systems to
find weaknesses before criminals can use them. Some hackers help companies
improve their cybersecurity. These types of hackers do not damage systems or steal
information.
Cracking, on the other hand, is done with bad intentions. Crackers break into
systems to steal data, damage files, or cause harm. They may crack software to
remove security codes or license checks. For example, when someone removes the
activation code from a program so others can use it for free, that is cracking.
The key difference is the purpose. Hackers may explore and report problems, while
crackers want to break, destroy, or steal. Hackers can be legal and helpful. Crackers
are always breaking the law and damaging property.
To summarise, hacking can be legal or illegal depending on the intent and
permission, while cracking is always illegal and harmful. (SEP2605 study guide,
2014)
QUESTION 2
Discuss the factors that are basic to information protection
Information protection is about making sure information is kept safe from harm. This
includes protecting the information itself and also the people using it. According to
the SEP2605 study guide (2014), several important factors help protect information
properly.
Disclaimer
Great care has been taken in the preparation of this document; however, the contents are provided "as is"
without any express or implied representations or warranties. The author accepts no responsibility or
liability for any actions taken based on the information contained within this document. This document is
intended solely for comparison, research, and reference purposes. Reproduction, resale, or transmission
of any part of this document, in any form or by any means, is strictly prohibited.