{"id":602,"date":"2022-01-24T08:51:51","date_gmt":"2022-01-24T08:51:51","guid":{"rendered":"http:\/\/learnlearn.uk\/igcsecs\/?page_id=602"},"modified":"2022-01-25T07:11:47","modified_gmt":"2022-01-25T07:11:47","slug":"ethics-hacking-cracking-malware","status":"publish","type":"page","link":"https:\/\/learnlearn.uk\/igcsecs\/ethics-hacking-cracking-malware\/","title":{"rendered":"Ethics of hacking, cracking &#038; malware"},"content":{"rendered":"<div class=\"responsive-tabs\">\n<h2 class=\"tabtitle\">Introduction<\/h2>\n<div class=\"tabcontent\">\n\n<p>Hacking<\/p>\n<p>&nbsp;<\/p>\n<p>Cracking<\/p>\n<p>&nbsp;<\/p>\n<p>Malware<\/p>\n<p>&nbsp;<\/p>\n<p>for and against each &#8211; examples<\/p>\n<p>case study examples<\/p>\n<p>punishment<\/p>\n<p>essay based assignment<\/p>\n\n<\/div><h2 class=\"tabtitle\">Resources<\/h2>\n<div class=\"tabcontent\">\n\n<h3>Resources<\/h3>\n<p><strong>Past Paper Exam Questions<\/strong><\/p>\n<p><a href=\"https:\/\/pastpapers.papacambridge.com\/viewer\/caie\/cambridge-upper-secondary-igcse-computer-science-0478-2016-jun-0478-s16-qp-12-pdf\">0478\/12 &#8211; Paper 1 Theory May\/June 2016 Qn<\/a>8b<\/p>\n<p><a href=\"https:\/\/pastpapers.papacambridge.com\/viewer\/caie\/cambridge-upper-secondary-igcse-computer-science-0478-2016-nov-0478-w16-qp-11-pdf\">0478\/11 &#8211; Paper 1 Theory October\/November 2016 qn 11<\/a><\/p>\n<p><a href=\"https:\/\/pastpapers.papacambridge.com\/viewer\/caie\/cambridge-upper-secondary-igcse-computer-science-0478-2017-nov-0478-w17-qp-12-pdf\">0478\/12 &#8211; Paper 1 Theory October\/November 2017 Qn11<\/a><\/p>\n<p>&nbsp;<\/p>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Hacking &nbsp; Cracking &nbsp; Malware &nbsp; for and against each &#8211; examples case study examples punishment essay based assignment Resources Past Paper Exam Questions 0478\/12 &#8211; Paper 1 Theory May\/June 2016 Qn8b 0478\/11 &#8211; Paper 1 Theory October\/November 2016 qn 11 0478\/12 &#8211; Paper 1 Theory October\/November 2017 Qn11 &nbsp;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":70,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Ethics of hacking, cracking &amp; malware | IGCSE Computer Science | Learnlearn.uk<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/learnlearn.uk\/igcsecs\/ethics-hacking-cracking-malware\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ethics of hacking, cracking &amp; malware | IGCSE Computer Science | Learnlearn.uk\" \/>\n<meta property=\"og:description\" content=\"Hacking &nbsp; Cracking &nbsp; Malware &nbsp; for and against each &#8211; examples case study examples punishment essay based assignment Resources Past Paper Exam Questions 0478\/12 &#8211; Paper 1 Theory May\/June 2016 Qn8b 0478\/11 &#8211; Paper 1 Theory October\/November 2016 qn 11 0478\/12 &#8211; Paper 1 Theory October\/November 2017 Qn11 &nbsp;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/learnlearn.uk\/igcsecs\/ethics-hacking-cracking-malware\/\" \/>\n<meta property=\"og:site_name\" content=\"IGCSE Computer Science\" \/>\n<meta property=\"article:modified_time\" content=\"2022-01-25T07:11:47+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/learnlearn.uk\/igcsecs\/ethics-hacking-cracking-malware\/\",\"url\":\"https:\/\/learnlearn.uk\/igcsecs\/ethics-hacking-cracking-malware\/\",\"name\":\"Ethics of hacking, cracking & malware | IGCSE Computer Science | Learnlearn.uk\",\"isPartOf\":{\"@id\":\"https:\/\/learnlearn.uk\/igcsecs\/#website\"},\"datePublished\":\"2022-01-24T08:51:51+00:00\",\"dateModified\":\"2022-01-25T07:11:47+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/learnlearn.uk\/igcsecs\/ethics-hacking-cracking-malware\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/learnlearn.uk\/igcsecs\/ethics-hacking-cracking-malware\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/learnlearn.uk\/igcsecs\/ethics-hacking-cracking-malware\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"IGCSE Computer Science Course\",\"item\":\"https:\/\/learnlearn.uk\/igcsecs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ethics of hacking, cracking &#038; malware\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/learnlearn.uk\/igcsecs\/#website\",\"url\":\"https:\/\/learnlearn.uk\/igcsecs\/\",\"name\":\"IGCSE Computer Science\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/learnlearn.uk\/igcsecs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/learnlearn.uk\/igcsecs\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/learnlearn.uk\/igcsecs\/#organization\",\"name\":\"IGCSE Computer Science\",\"url\":\"https:\/\/learnlearn.uk\/igcsecs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/learnlearn.uk\/igcsecs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/learnlearn.uk\/igcsecs\/wp-content\/uploads\/sites\/23\/2020\/08\/LearnLearnLogowhitenew.png\",\"contentUrl\":\"https:\/\/learnlearn.uk\/igcsecs\/wp-content\/uploads\/sites\/23\/2020\/08\/LearnLearnLogowhitenew.png\",\"width\":710,\"height\":98,\"caption\":\"IGCSE Computer Science\"},\"image\":{\"@id\":\"https:\/\/learnlearn.uk\/igcsecs\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ethics of hacking, cracking & malware | IGCSE Computer Science | Learnlearn.uk","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/learnlearn.uk\/igcsecs\/ethics-hacking-cracking-malware\/","og_locale":"en_GB","og_type":"article","og_title":"Ethics of hacking, cracking & malware | IGCSE Computer Science | Learnlearn.uk","og_description":"Hacking &nbsp; Cracking &nbsp; Malware &nbsp; for and against each &#8211; examples case study examples punishment essay based assignment Resources Past Paper Exam Questions 0478\/12 &#8211; Paper 1 Theory May\/June 2016 Qn8b 0478\/11 &#8211; Paper 1 Theory October\/November 2016 qn 11 0478\/12 &#8211; Paper 1 Theory October\/November 2017 Qn11 &nbsp;","og_url":"https:\/\/learnlearn.uk\/igcsecs\/ethics-hacking-cracking-malware\/","og_site_name":"IGCSE Computer Science","article_modified_time":"2022-01-25T07:11:47+00:00","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/learnlearn.uk\/igcsecs\/ethics-hacking-cracking-malware\/","url":"https:\/\/learnlearn.uk\/igcsecs\/ethics-hacking-cracking-malware\/","name":"Ethics of hacking, cracking & malware | IGCSE Computer Science | Learnlearn.uk","isPartOf":{"@id":"https:\/\/learnlearn.uk\/igcsecs\/#website"},"datePublished":"2022-01-24T08:51:51+00:00","dateModified":"2022-01-25T07:11:47+00:00","breadcrumb":{"@id":"https:\/\/learnlearn.uk\/igcsecs\/ethics-hacking-cracking-malware\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/learnlearn.uk\/igcsecs\/ethics-hacking-cracking-malware\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/learnlearn.uk\/igcsecs\/ethics-hacking-cracking-malware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"IGCSE Computer Science Course","item":"https:\/\/learnlearn.uk\/igcsecs\/"},{"@type":"ListItem","position":2,"name":"Ethics of hacking, cracking &#038; malware"}]},{"@type":"WebSite","@id":"https:\/\/learnlearn.uk\/igcsecs\/#website","url":"https:\/\/learnlearn.uk\/igcsecs\/","name":"IGCSE Computer Science","description":"","publisher":{"@id":"https:\/\/learnlearn.uk\/igcsecs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/learnlearn.uk\/igcsecs\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/learnlearn.uk\/igcsecs\/#organization","name":"IGCSE Computer Science","url":"https:\/\/learnlearn.uk\/igcsecs\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/learnlearn.uk\/igcsecs\/#\/schema\/logo\/image\/","url":"https:\/\/learnlearn.uk\/igcsecs\/wp-content\/uploads\/sites\/23\/2020\/08\/LearnLearnLogowhitenew.png","contentUrl":"https:\/\/learnlearn.uk\/igcsecs\/wp-content\/uploads\/sites\/23\/2020\/08\/LearnLearnLogowhitenew.png","width":710,"height":98,"caption":"IGCSE Computer Science"},"image":{"@id":"https:\/\/learnlearn.uk\/igcsecs\/#\/schema\/logo\/image\/"}}]}},"rttpg_featured_image_url":null,"rttpg_author":{"display_name":"learnlearnadmin","author_link":"https:\/\/learnlearn.uk\/igcsecs\/author\/learnlearnadmin\/"},"rttpg_comment":0,"rttpg_category":null,"rttpg_excerpt":"Hacking &nbsp; Cracking &nbsp; Malware &nbsp; for and against each &#8211; examples case study examples punishment essay based assignment Resources Past Paper Exam Questions 0478\/12 &#8211; Paper 1 Theory May\/June 2016 Qn8b 0478\/11 &#8211; Paper 1 Theory October\/November 2016 qn 11 0478\/12 &#8211; Paper 1 Theory October\/November 2017 Qn11 &nbsp;","_links":{"self":[{"href":"https:\/\/learnlearn.uk\/igcsecs\/wp-json\/wp\/v2\/pages\/602"}],"collection":[{"href":"https:\/\/learnlearn.uk\/igcsecs\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/learnlearn.uk\/igcsecs\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/learnlearn.uk\/igcsecs\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/learnlearn.uk\/igcsecs\/wp-json\/wp\/v2\/comments?post=602"}],"version-history":[{"count":5,"href":"https:\/\/learnlearn.uk\/igcsecs\/wp-json\/wp\/v2\/pages\/602\/revisions"}],"predecessor-version":[{"id":796,"href":"https:\/\/learnlearn.uk\/igcsecs\/wp-json\/wp\/v2\/pages\/602\/revisions\/796"}],"wp:attachment":[{"href":"https:\/\/learnlearn.uk\/igcsecs\/wp-json\/wp\/v2\/media?parent=602"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}