Premium Essay

Ethical Hacking Essay

In:

Submitted By maycod
Words 1017
Pages 5
Ethical Hacking Essay

Introduction
Almost 90 percent of our society now depends on complex computer based system. With the increasingly use of computer and explosive growth of the Internet has brought many good things: electronic commerce, online banking, e-mail, video conferencing etc. The improvement of systems security to prevent criminal hacker has become an important concern to society. There are many ways to protect those information systems; it seems that the Ethical Hacking is a better way. Therefore, whether to teach or not teach the "Ethical Hacking" as a course in Tertiary education has become an interesting argument. In this article will analysis the ethical, legal, and ethical implications of this issue.

In order to discuss the ethical, legal, and social implications of this issue, one has to understand the definition of Ethical Hacking. The Word Spy states that "Ethical hacking is a computer hacker who attempts to infiltrate a secure computer system in an effort to learn the system's weaknesses so that they can be repaired" (The Word Spy, 2003). The question arises here is whether Ethical Hacking is ethical or unethical.

Ethical
The "Computer Ethics" states in part that all information belongs to everyone and there should be no boundaries or restraints to prevent disclosure of this information (Johnson, 1994). From most hacker's perspective, freedom of information includes the right to source codes and the programs themselves. This freedom also includes the right to access information stored on a computer network. At times, hackers argue that the freedom of information doctrine gives them the right to have unrestricted access to computer accounts, passwords and email. At this point, the ethical position of hacking has become "system cracking" (Granger, 1994). When the information of the system has become free to everyone, there is no such

Similar Documents

Premium Essay

Hackers For Good: A Bug Bounty Hunter's Path To Our Society

...hypothesis completely. Outline your thesis in Toulmin terms: Despite the negative definition, hacking can be considered both unethical and ethical. -- Claim: Hacking can be ethical. -- Reason(s): There are white-hat hackers who contributed so much to our society. -- Warrant(s): Hacking can be a good thing since there are white-hat hackers. Explain why this argument of definition deserves attention. What is at stake? Why is it important for your readers to consider? When seeing the word “hacker”, the audience automatically picks up the negative vibe. Truth is, not all hackers are bad. The common definition of is that this bad “hacker” gets unauthorized access to someone else’s device. It is this definition that risk ruining...

Words: 475 - Pages: 2

Free Essay

Intelligence Collections

...INT476 Intelligence Collection Mod 5 Essay 3 Cedric.l.smith@gmail.com Technology has systematically improved over the years. The advancement in computer systems and the information that’s readily available to all is unlimited. In 1980, computers were foreign to most households. Computer use grew in the 1990’s and in the 2000’s; more homes became equipped with them. There is no argument that technology has increased proficiency and overall productivity both personally and professionally. However, there is some ambiguity as well as concerns about the potential threat on personal privacy and national intelligence. The impact technology have on information collection is a double edge sword. The ethical decisions a collections officer make is mission driven and may often compromise personal morality. It’s a known fact that information sent via Internet access is public information. This very known fact isn’t directly truthful in all aspects. Public information can be retrieved from your computers and in some cases, authorization is required and in others it is not. Handbook of Surveillance Technologies (third edition) definition of a cookie is, a software marker or identifying piece of information that may potentially be accessed by other computer programs. By definition, personal information is already potentially compromised. Cookies can be disabled in order to safeguard private information however, technology has advanced itself pass the disabling...

Words: 678 - Pages: 3

Premium Essay

Ethical Hacking

...Importance of ethical hacking Chapter 1 Introduction Ethical hacking is an emerging tools used by most of the organizations for testing network security. The security risks and vulnerabilities in a network can be recognized with the help of ethical hacking. This research completely concentrates on ethical hacking, problems that may occur while hacking process is in progress and various ethical hacking tools available for organizations. Information is the important source for any organizations while executing business operations. Organizations and government agencies have to adopt ethical hacking tools in order secure important documents and sensitive information (Harold F. Tipton and Micki Krause, 2004). Ethical hacker professionals have to be hired in order to test the networks effectively. Ethical hackers perform security measure on behalf of the organization owners. In order to bring out the ethical hacking efforts perfectly a proper plan must be executed. Ethical hacking has the ability to suggest proper security tools that can avoid attacks on the networks. Hacking tools can be used for email systems, data bases and voice over internet protocol applications in order to make communications securely. Ethical hacking can also be known as penetration testing which can be used for networks, applications and operating systems (Jeff Forristal and Julie Traxler, 2001). Using hacking tools is a best method for identifying the attacks before it effect the entire organization. Ethical hackers...

Words: 9223 - Pages: 37

Free Essay

News of the World Phone Hacking a Scandal, a Media Relations Analysis

...watch dog for a nation’s citizens, as it is long believed that a free media is the key to an effective democracy; and that it is the job of a government, to govern justly and in turn act as a watchdog for its citizens, to ensure the press does not violate their human rights as well as take action on parties choosing to engage themselves in criminal activity. In 2005, one of the biggest if not the biggest and most public phone hacking scandals came to light. The scandal in question is none other than the “News of The World” phone hacking scandal. (Chandrasekhar. Wardrop. Trotman. 2005.). The nature, size and impacts of the scandal were so immense that it led to not only several cases of litigation over the span of 6 years but also more on going cases outside of the scandal as a result of evidence collected, ultimately culminating in the closure of the “News of the World” in 2011. (Chandrasekhar. Wardrop. Trotman. 2005.). Moreover, in 2007 former British Prime Minister Tony Blair delivered a speech in regards to the scandal which very much relates to this essay. He said in a statement and I quote, “I do believe this relationship between the media and public life is now damaged in a manner that requires repair. The damage saps the country’s confidence and self-belief; it undermines its assessment of itself, its institutions; and, above all, it reduces our capacity to take the right decisions, in the right spirit for our future”, end quote. (Rutter. 2011.). As another result of the scandal...

Words: 2398 - Pages: 10

Premium Essay

It 590 Unit 4 Assignment

...Veronica McNutt IT590 Unit 4 Assignment Professor DePriest September 2, 2014 Unit 4 Assignment Essay Questions Scenario 1: You are working as a designer for a university that offers a program in Computer Science. One of the tracts is computer security. One of your colleagues has recommended adding a course addressing network security. In this course, students learn about the history of networks and study network attacks that have caused significant damage to the network that was the subject of the attack. During the second term of this two semester course, the students are taught how to hack into a system, how to create malware (including Trojan horses, viruses, and worms), and how to perpetrate a DOS attack. Choose one or more of the ethical theories discussed in Chapter 2 and combine that with research to determine whether this course should be taught. Be sure to discuss both sides of the issue before taking a specific side. Would it make a difference if this were a graduate or PhD level course instead of an undergraduate level course? Explain. Disadvantages According to research, there are many concerns for offering hands-on training to students in a computer network class. According to Trabelsi & Ibrahim (2013), UAE conducted a survey of the students who used the skills learned in the hands-on DOS attack class. Eighty five percent of students used the skills learned outside the isolated network university lab. These concerns would be the following: that the...

Words: 1270 - Pages: 6

Free Essay

Your Mom

...Program Guidebook Master of Science, Information Security and Assurance The Master of Science in Information Security and Assurance is a competency-based degree program that encompasses the main security domains of knowledge developed following strict guidelines for information security and assurance education prescribed by the National Security Agency. Understanding the Competency-Based Approach Practically speaking, what does it mean when we say that WGU’s programs are competency-based? Unlike traditional universities, WGU does not award degrees based on credit hours or on a certain set of required courses. Instead, you will earn your degree by demonstrating your skills, knowledge, and understanding of important concepts through a series of carefully designed courses. Progress through your degree program is governed not by classes but by satisfactory completion of the required courses that demonstrate your mastery of the competencies. Of course, you will need to engage in learning experiences as you brush up on competencies or develop knowledge and skills in areas in which you may be weak. For this learning and development, WGU has a rich array of learning resources in which you may engage under the direction of your student mentor. You will work closely with your mentor to schedule your program for completing the courses. You will also work closely with additional faculty members as you proceed through courses of study that are designed to lead you through...

Words: 4226 - Pages: 17

Premium Essay

E-Mail and Internet Policy

...E-Mail and Internet Policy Darryn Cooper COM/285 Angie Robert August 24, 2011 E-Mail and Internet Policy The integrity of a business relies on communication, both using internal and external communications. E-mails and the internet are two ways that businesses communicate with shareholders, employees and their customers. In today’s global market, the use of computer guidelines and policies have been implemented to ensure that all employees adhere to those policies. Communication via the internet and use of emails should be carefully considered when using it. This essay will discuss why e-mail and internet policies have been put in place. *1Congress passed the Privacy Act of 1974, as amended, (Privacy Act) to safeguard records of information pertaining to individuals that Federal agencies or components own and maintain. The Department of Defense (DoD) policy regarding e-mail and internet use is very strict. All employees who are employed by the DoD are given a Common Access Card (CAC). The CAC is inserted into the computer and requires that you enter a password. At no time should you leave your CAC in the computer when an individual leaves his or her computer. Ashmore ( 2009), " Many federal laws affect employer regulation of email and internet uses, such as the Federal Wiretap Act; the Electronic Communications Privacy Act; and the Stored Communications Act. In addition, state...

Words: 941 - Pages: 4

Free Essay

Cv England

...Bubuleandra Ionut Lucian Address12 Railway Road, B20 3HT, Birmingham, West Midlands, United Kingdom Telephone: 07553778061 E-mail: lucique88@yahoo.com Personal skills • Ability to work on own initiative or part of a team • Effective communication and reasoning skills • Fast learner and easily adaptable • Skilled in working with office equipment and software application • Ability to work driven by own initiative; good situational and methodical problem solving skills Work Experience 2011: Independent sales advisor for SMG Solutions, Coventry, United Kingdom Responsibilities: • Door-to-door sales • Customer service • Self management • Train the new people in the office 2011: Waitress for Compass Group at Ricoh Arena, Coventry, United Kingdom Responsibilities: • Serving drinks and food to clients • Till operation and cash handling • Maintaining the work area clean • Dealing with bill payments 2009, 2010: Receptionist for Rich Forest, Onesti, Romania Responsibilities: • Greeting visitors and directing them to the correct person or department; • Providing information and answering queries; answering calls and taking messages; • Organizing appointments and bookings; • Maintaining the reception area clean. 2008: Waitress for 8 Ball Club, Onesti Romania Responsibilities: • Serving drinks and food to clients • Till operation and...

Words: 550 - Pages: 3

Free Essay

Chemistry

...White hat hackers are the ethical, legal hackers (2002). Companies pay them to find holes in software or networks and fix the problems. The difference between white hat hackers and black hat hackers is that white hats have permission to carry out their attacks on a company to fix the problems. (2) A majority of company owners say that white hat protection is the only true way to ensue security in their businesses. White hats use the same programs and knowledge as black hats do. They usually stay in the cyber underworld to keep updated on attacks and information. Black hat hackers are the most rare and elite of all the hacker groups. Most are connected with criminal activities, such as espionage. (2001) Not all hackers labeled black hat hackers are connected with criminal activities in real life. There are many "old school" hackers considered black hat. They are the ones that are usually from the 1960's and use the word hacker with honor and freedom. (Quinter 2) Most of these hackers do not have a negative intent they are usually programs from Stanford or MIT. They have good ethics and believe in open source and fixing flaws in programming. Most black hat hackers are criminals and are very powerful. (Glenn 8) Political and personal revenge is a major motivating factor in becoming a true black hat hacker, but the most elite hackers go for the money. Industrial espionage is one of the best paid jobs for a hacker. A typical espionage attacks takes about three weeks and they...

Words: 4683 - Pages: 19

Premium Essay

Computer

...is any illegal action where the data on a computer is accessed without permission. This access doesn't have to result in loss of data or even data modifications. Arguably the worst computer crime occurs when there are no indications that data was accessed. Computer crime is often attributed to rogue hackers and crackers, but increasingly organized crime groups have realized the relative ease of stealing data with relative low-level of risk. Government organizations are also rumored to be involved with hacking in to computer systems, but the legality of such actions is far too grey an area to be discussed here. Computer crime, or cybercrime, refers to any crime that involves a computer and a network, where the computers may or may not have played an instrumental part in the commission of a crime.[1] Netcrime refers, more precisely, to criminal exploitation of the Internet.[2] Issues surrounding this type of crime have become high-profile, particularly those surrounding hacking, copyright infringement, child pornography, and child grooming. There are also problems of privacy when confidential information is lost or intercepted, lawfully or otherwise. On the global level, both governments and non-state actors continue to grow in importance, with the ability to engage in such activities as espionage, financial theft, and other cross-border crimes sometimes referred to as cyber warfare. The international legal system is attempting to hold actors accountable for their actions, with...

Words: 7299 - Pages: 30

Premium Essay

10 Commandments of Cumputer Ethics

...or files. The commandment states that it is wrong to use a computer to steal someone's personal information. Manipulating or destroying files of other users is ethically wrong. It is unethical to write programs, which on execution lead to stealing, copying or gaining unauthorized access to other users' data. Being involved in practices like hacking, spamming, phishing or cyber bullying does not conform to computer ethics. * Sending virus in order to hack personal information and exposing to the others. 2. THOU SHALT NOT INTERFERE WITH OTHER PEOPLE'S COMPUTER WORK. Explanation: Computer software can be used in ways that disturb other users or disrupt their work. Viruses, for example, are programs meant to harm useful computer programs or interfere with the normal functioning of a computer. Malicious software can disrupt the functioning of computers in more ways than one. It may overload computer memory through excessive consumption of computer resources, thus slowing its functioning. It may cause a computer to function wrongly or even stop working. Using malicious software to attack a computer is unethical. * Deleting friend's essay document and saying i was just playing. 3. THOU SHALT NOT SNOOP AROUND IN OTHER PEOPLE'S COMPUTER FILES. Explanation: We know it is wrong to read someone's personal letters. On the same lines, it is wrong to read someone else's email messages or files. Obtaining data from another person's private files is nothing less than breaking into someone's...

Words: 1069 - Pages: 5

Premium Essay

Business Ethics

...Electronic Commerce, 7th Edition 14188-37032 Chapter 10 Solutions Review Questions 1. In about 200 words, explain why Web sites use cookies. In your answer, discuss the reasons that cookies were first devised and explain where cookies are stored. You can use the links in the Online Companion to help with your research. Answer: Responses will vary, but should include references to shopping carts. Since cookies contain text data, they can help with the statelessness of the Internet. 2. In about 100 words, describe steganography and explain its connection to the topic of online security. You can use the links in the Online Companion to help with your research. Answer: Responses will vary, but should mention that this involves hiding information within another piece of information. 3. In about 200 words, explain the differences between public-key encryption and private-key encryption. List advantages and disadvantages of each encryption method. Explain which method you would use for e-mail sent from a field sales office to corporate headquarters. Assume that the e-mail regularly includes highly confidential information about upcoming sales opportunities. Answer: Responses will vary but should mention that public-key encryption, encodes messages by using two mathematically related numeric keys. Private-key encryption, encodes a message with one of several available algorithms that use a single numeric key, such as 456839420783, to...

Words: 1430 - Pages: 6

Premium Essay

Computer Cthics

...author's approval. And while it may be possible to access someone's personal information on a computer system, computer ethics would advise that such an action is unethical. As technology advances, computers continue to have a greater impact on society. Therefore, computer ethics promotes the discussion of how much influence computers should have in areas such as artificial intelligence and human communication. As the world of computers evolves, computer ethics continues to create ethical standards that address new issues raised by new technologies. Computer Ethics is a part of practical philosophy which deals with how computing professionals should make decisions regarding professional and social conduct.[1] Margaret Anne Pierce, a professor in the Department of Mathematics and Computers at Georgia Southern University has categorized the ethical decisions related to computer technology and usage into 3 primary influences: * 1. The individual's own personal code. * 2. Any informal code of ethical conduct that exists in the work place. * 3. Exposure to formal codes of ethics.[2] Contents   [hide]  * 1 Foundation * 2 History * 3 Internet Privacy * 4 Internet Control * 5 Computer Reliability * 6 Identifying issues * 7 Some questions in computer ethics * 8...

Words: 3631 - Pages: 15

Premium Essay

Hpw to Make Students Innovative

...Patrick Zimmer Home | Projects | Music | Sitemap | Contact Genetic Engineering Essay Projects / Academic / Genetic Engineering Essay GENETIC ENGINEERING - The benefits and problems Genetic engineering is a powerful and potentially very dangerous tool. To alter the sequence of nucleotides of the DNA that code for the structure of a complex living organism, can have extremely ill effects although the potential benefits can be huge. Before advances in genetic applications, gene therapy was unheard of and genetic defects were always inherited, plaguing generations. Today genetic testing is widely available, such as prenatal karyotyping of chromosomes to check for genetic abnormalities. Genetic testing is also useful for families in which autosomal recessive disorders are known to exist, when these are planning to have children. In addition, genetic testing is available for people who might have inherited a genetic disorder which only becomes apparent later in life (for example Huntington's Disease). Individual choice decides whether a person would rather know if they are particularly vulnerable to certain diseases or more likely to die young. Knowing that your life may be short could inspire you to make the most of it while it could equally well cause severe depression. Today`s advances in gene therapy make it possible to even remove a faulty gene and replace it with a functioning gene in cells lacking this function. Though these techniques are available, they are still in...

Words: 1772 - Pages: 8

Premium Essay

Bpo Cyber Security

...Network Security In Business Process Outsourcing Information Technology Essay The issue of information security and data privacy is assuming tremendous importance among global organizations, particularly in an environment marked by computer virus and terrorist attacks, hackings and destruction of vital data owing to natural disasters. The worldwide trend towards offshore outsourcing of processes and IT services to remote destinations, leading to the placing of valuable data and information infrastructure in the hands of the service providers, is also creating the need for information security solutions that will protect customers' information assets. As crucial information of a financial, insurance, medical and personal nature begins to get handled by remotely located offshore outsourcing service providers, there is a growing concern about the manner in which it is being collected, stored and utilized. Components of security The concept of information security is centered around the following components: · Integrity: gathering and maintaining accurate information and avoiding malicious modification · Availability: providing access to the information when and where desired · Confidentiality: avoiding disclosure to unauthorized or unwanted persons. Indian IT and ITES-BPO service providers today have the responsibility of not just protecting their own internal information, but also that of their customers, who trust them with crucial organizational data. A service providers own...

Words: 1616 - Pages: 7