100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4,6 TrustPilot
logo-home
Exam (elaborations)

SEP2605 Assignment 2 Semester 2 Memo | Due 25 September 2025

Rating
-
Sold
-
Pages
11
Grade
A+
Uploaded on
23-09-2025
Written in
2025/2026

SEP2605 Assignment 2 Semester 2 Memo | Due 25 September 2025. All questions fully answered. 1. Discuss and provide examples of the main differences between hacking and cracking. 2. Cohen (1995:108-109) defines information as a symbolic representation in its most general sense. Protection is defined as keeping from harm. In the field of information protection, it refers to preventing harm to symbolic representations and the users of the information. Discuss the factors that are basic to information protection.

Show more Read less









Whoops! We can’t load your doc right now. Try again or contact support.

Document information

Uploaded on
September 23, 2025
Number of pages
11
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

, PLEASE USE THIS DOCUMENT AS A GUIDE TO ANSWER YOUR ASSIGNMENT

1. Discuss and provide examples of the main differences between hacking and cracking.

Hacking and cracking are often used interchangeably in popular culture, but in the world of
cybersecurity, they refer to distinct activities.

Definition:
 Hacking refers to the act of gaining unauthorized access to systems or networks with the aim of
understanding how they work, exploring vulnerabilities, or testing the security. While it can be
legal (when done with permission, e.g., by "ethical hackers"), hacking is typically associated
with illegal activities when performed without consent.
 Cracking, on the other hand, is the act of breaking into systems, software, or networks with
malicious intent—usually for purposes like stealing information, spreading malware, or
disabling a system.

Intent:
 Hacking can have both good and bad intentions. White-hat hackers (ethical hackers) use their
skills to identify vulnerabilities and improve system security. For example, a security
researcher might hack into a system to report flaws to the owner (Rosenblatt, 2021).
 Cracking typically has harmful intent. Cracking usually involves activities like bypassing
security measures, breaking software licenses, or stealing data, as seen when someone cracks a
software’s copy protection to distribute it illegally (Zhao, 2020).

Ethical Considerations:
 Hacking can be ethical or unethical. For example, an ethical hacker may conduct penetration
testing for a company to identify security vulnerabilities.
 Cracking is inherently unethical. A cracked piece of software, for example, is often used for
illegal purposes, such as distributing pirated content (Wang, 2019).

Methods:
 Hackers use sophisticated techniques, including exploiting vulnerabilities, social engineering,
and phishing, but their goal might be to explore or improve systems.
 Crackers typically use tools designed specifically to bypass security or decrypt software or data.
This includes tools like key generators, password crackers, or software patching tools (Smith,
2021).

Examples:
 Hacking: A cybersecurity expert who conducts a "bug bounty" program to find and report
vulnerabilities in a company’s software or system.
 Cracking: A person who bypasses the copy protection on a paid software to distribute it for free,
making it available for illegal downloads.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Aimark94 University of South Africa (Unisa)
View profile
Follow You need to be logged in order to follow users or courses
Sold
6621
Member since
6 year
Number of followers
3168
Documents
1336
Last sold
9 hours ago
Simple & Affordable Study Materials

Study Packs & Assignments

4,2

533 reviews

5
283
4
128
3
75
2
15
1
32

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can immediately select a different document that better matches what you need.

Pay how you prefer, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card or EFT and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions