100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

SEP2605 ASSIGNMENT 2 SEMESTER 2 2025 *COMPLETE ANSWERS* DUE DATE 25 SEPTEMBER 2025

Rating
-
Sold
-
Pages
7
Grade
A+
Uploaded on
23-09-2025
Written in
2025/2026

SEP2605 ASSIGNMENT 2 SEMESTER 2 2025 *COMPLETE ANSWERS* DUE DATE 25 SEPTEMBER 2025

Institution
Course









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Course

Document information

Uploaded on
September 23, 2025
Number of pages
7
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

, SEP2605 ASSIGNMENT 2 SEMESTER 2 2025 ANSWERS

DUE DATE: 25 SEPTEMBER 2025




QUESTION 1:

DIFFERENCES BETWEEN HACKING AND CRACKING (8 MARKS)

Hacking and cracking are terms often used interchangeably in everyday discourse, but in the
field of information technology, they refer to distinct activities with differing intentions, methods,
and ethical implications. Hacking broadly refers to the exploration, manipulation, or use of
computer systems to identify vulnerabilities, improve system security, or achieve specific
technical outcomes, often without malicious intent. According to Himma (2007), hacking can
be ethical or unethical depending on the purpose, with ethical hacking being conducted to
strengthen cybersecurity defenses and prevent unauthorized access. Hackers typically
analyze systems to understand how they operate and may report security flaws to
organizations for corrective action (Cole, 2018).

In contrast, cracking is inherently malicious, involving the intentional bypassing of security
measures to gain unauthorized access to data, software, or computer systems. Crackers aim
to exploit vulnerabilities for personal gain, data theft, system disruption, or intellectual property
violation. As noted by Erickson (2008), cracking often involves techniques such as password
breaking, software key generation, or the deployment of malware to compromise systems.
Unlike ethical hacking, which emphasizes legal boundaries and responsible disclosure,
cracking is illegal and punishable under cybercrime legislation in most jurisdictions (Brenner,
2010).

Furthermore, the motivation behind these activities distinguishes the two practices. Hackers
may operate out of curiosity, professional necessity, or ethical responsibility to improve system
security, whereas crackers are driven by profit, malice, or the challenge of defeating security
controls (Denning, 1999). In essence, all cracking can be considered hacking, but not all
hacking qualifies as cracking. The distinction is therefore largely ethical and legal rather than
purely technical.

In summary, hacking is a broad term that encompasses both ethical and unethical activities
related to understanding and interacting with computer systems, while cracking is specifically
focused on illegal actions intended to exploit, damage, or steal information. Recognizing this

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
THEUNISAPRO UNISA
Follow You need to be logged in order to follow users or courses
Sold
255
Member since
4 months
Number of followers
0
Documents
324
Last sold
5 days ago

4.3

38 reviews

5
25
4
4
3
7
2
1
1
1

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions