Assignment 2 Semester 2 2025
2 2025
Unique Number:
Due date: 25 September 2025
QUESTION 1
Discuss and provide examples of the main differences between hacking and cracking
Hacking and cracking are both terms linked to gaining access to computer systems, but they
are not the same. Hacking is often done to understand systems better, sometimes even with
good intentions. For example, ethical hackers test systems to find weaknesses before
criminals can use them. Some hackers help companies improve their cybersecurity. These
types of hackers do not damage systems or steal information.
Cracking, on the other hand, is done with bad intentions. Crackers break into systems to
steal data, damage files, or cause harm. They may crack software to remove security codes
or license checks. For example, when someone removes the activation code from a program
so others can use it for free, that is cracking.
The key difference is the purpose. Hackers may explore and report problems, while crackers
want to break, destroy, or steal. Hackers can be legal and helpful. Crackers are always
breaking the law and damaging property.
DISCLAIMER & TERMS OF USE
Educational Aid: These study notes are intended to be used as educational resources and should not be seen as a
replacement for individual research, critical analysis, or professional consultation. Students are encouraged to perform
their own research and seek advice from their instructors or academic advisors for specific assignment guidelines.
Personal Responsibility: While every effort has been made to ensure the accuracy and reliability of the information in
these study notes, the seller does not guarantee the completeness or correctness of all content. The buyer is
responsible for verifying the accuracy of the information and exercising their own judgment when applying it to their
assignments.
Academic Integrity: It is essential for students to maintain academic integrity and follow their institution's policies
regarding plagiarism, citation, and referencing. These study notes should be used as learning tools and sources of
inspiration. Any direct reproduction of the content without proper citation and acknowledgment may be considered
academic misconduct.
Limited Liability: The seller shall not be liable for any direct or indirect damages, losses, or consequences arising from
the use of these notes. This includes, but is not limited to, poor academic performance, penalties, or any other negative
consequences resulting from the application or misuse of the information provided.
, For additional support +27 81 278 3372
QUESTION 1
Discuss and provide examples of the main differences between hacking and
cracking
Hacking and cracking are both terms linked to gaining access to computer systems,
but they are not the same. Hacking is often done to understand systems better,
sometimes even with good intentions. For example, ethical hackers test systems to
find weaknesses before criminals can use them. Some hackers help companies
improve their cybersecurity. These types of hackers do not damage systems or steal
information.
Cracking, on the other hand, is done with bad intentions. Crackers break into
systems to steal data, damage files, or cause harm. They may crack software to
remove security codes or license checks. For example, when someone removes the
activation code from a program so others can use it for free, that is cracking.
The key difference is the purpose. Hackers may explore and report problems, while
crackers want to break, destroy, or steal. Hackers can be legal and helpful. Crackers
are always breaking the law and damaging property.
To summarise, hacking can be legal or illegal depending on the intent and
permission, while cracking is always illegal and harmful. (SEP2605 study guide,
2014)
QUESTION 2
Discuss the factors that are basic to information protection
Information protection is about making sure information is kept safe from harm. This
includes protecting the information itself and also the people using it. According to
the SEP2605 study guide (2014), several important factors help protect information
properly.