Free Essay

Ethical Hacking Today

In:

Submitted By imrkha1629
Words 2916
Pages 12
Ethical Hacking in Today’s Society Patrick Bryant
ECPI UNIVERSITY
IS530
May 12, 2012
DR. BRYANT

Abstract

Over the years technology has advanced just as Moore’s Law has predicted. Not only does the technology double every year in a compounding way, but those who understand these concepts grow as well. These talented individuals can be looked at from several different viewpoints and depending on who that person may be could in fact determine whether it is a positive viewpoint or a negative one. In this paper I will prove why it is necessary to have Ethical Hackers in today’s security models and how they have come a long way to improve how our information systems operate in a more secure manner.

Ethical Hacking in today’s Society Hacker’s for years have been able to do things that the normal individuals have never even thought of pursuing and for several different reasons. There are several different types of hackers out there, but they all have one thing in common and that is their knowledge of Information System exploits and vulnerabilities. The constant issues highlighted by the media always reporting some type of cyber crime, a study showing that nearly 90% of attacks happen on the inside (Durant, 2007). The biggest key is that of understanding the hacker’s true intention and determining whether or not it was ethical or malicious. This leads us to first understand what an ethical hacker is and help determine their purpose is a positive venture when wanting to run your organization in a more secure manner.
Who is the Ethical Hacker?
The term “White Hat” has been slang term that often refers to an ethical hacker, who tends to be a computer security expert. These types of hackers have been known to specialize in penetration testing and help to ensure the security of an organization’s information system. This is unlike other type of hacker’s such as the “BLACK HAT” and the “GREY HAT”. Ethical hackers also carry several other specialized skills such as strong programming skills, networking skills and have been in vetted in the information technology industry for years. One of the more critical traits that all hackers tend to have is patience and has been known to work on difficult tasks outside of normal working hours. Most successful or savvy computer professionals often keep up with new technologies even if they are unfamiliar with such technologies they will take the time to research them to fully understand it. Keeping up with these technologies can not only be time consuming for ethical hackers but understanding the criminal’s that use them in malicious ways can be a lot for one person to manage. With all of these qualities being said, the most important quality that could change a hiring manager’s consideration for selecting a person is trust and a clean background. The best candidates tend to carry not only a clean history, but a higher level of clearance than most generic computer professionals do not require. The difference could range in a background investigation from a Secret clearance to a Top Secret clearance when determining the depth of an investigation. (IBM JOURNAL, VOL 40)
What makes Ethical Hacking Ethical?
Hacking in general is wrong for any one person to have some sort of gain whether it is financial or personal. Ethical hacking is often performed by trusted “White Hats” to determine an organization’s vulnerabilities in their internal information systems. Most companies will utilize an outside contractor or even a fulltime employee to ensure that their systems are secure as vulnerabilities are announced. The concept of ethical hacking is still considered hacking due to the end result of an information system being compromised, penetrated, and potentially crashed. This type of hacking becomes ethical because it is used to increase the safety of not only the organization, but to reduce the risk of the users within it. It is fairly understood that it takes a criminal to catch a criminal these days. With this type of reasoning if a grey hat hacker can possibly break into a system then most certainly a “Black Hat” hacker can with malicious intentions. With the goal being able to use present programs running to break into the system, the ethical hacker does this only at the request of the company that actually owns the information system. Organizations tend to do this on a regular basis so that any existing vulnerabilities to their systems can be patched and protected. (Ellis-Christensen, 2012) Once a contractual agreement has been signed by both parties, the penetration testing may begin. Unfortunately an ethical hacker could have a criminal hacker monitoring their ethical hack exposing sensitive information and vulnerabilities. Normally complete logs of the tests performed are always kept on record for not only the final report, but in the event something unusual happens. The testing can be hard to conceal within the organization because employees may tip off another employee. The penetration test is also subjective to system crashes, degraded networks, denial of service, and log-file explosions. Whenever a testing of system discovers vulnerability, the test should not be stopped, but further investigated to see how many others exist. Plenty of time should be allowed to not only conduct the testing. Nearly all information systems have some sort of vulnerability that can be exploited by a hacker whether it is an unpatched application, misconfigured router, or even a rogue modem. It is just a matter of time for either a White Hat or Black Hat to find the exploit during a penetration test. From February 17 until March 31st 2009 BT Professional services conducted a web-based survey on Ethical Hacking that involved 222 IT professionals from around the world. In the survey, the penetration testing was defined as a method of identifying the current state of security controls. (Blum, 2009)

Ethical hacking is normally done by a third party to get an unbiased assessment of the security controls and viability of the controls that are in place on the system at that time. The more focused ethical hacks are:

* Application testing- uncovers design and logic flaws in applications that couldresult in the compromise or unauthorized access of your networks, systems,applications or information. * Network testing- identifies vulnerabilities in external and internal networks,services, protocols, convergence solutions and systems and devices, including VPNtechnologies. * Code review- examines the source code that is part of the authentication systemand identifies the strengths and weaknesses of the software modules. * Wireless network testing -determines your network's vulnerability to an attackerwith radio access to the wireless network space. * War dialing - identifies unauthorized modems that endanger the corporate infrastructure. * System hardening - analyzes possible configuration issues, running services, andvulnerabilities that reside on the system. (Blum, 2009)

The biggest advantage to having ethical hacks done internally or by a third party is that each IT group can work more closely with the exploits and understand the vulnerability to be able to increase their knowledge of future exploits and hacks on their own information systems. There are several barriers that BT’s survey was able to acknowledge in this survey conducted in 2009 that pertain to the current day despite Morris’s Law. (Blum, 2009)

Who are ethical hackers?
People tend to get involved in the field of ethical hacking for several different reasons and are derived from several different backgrounds. Most ethical hackers haves some educational experience in computer science and most cases they were also a “Black Hat” hacker at one time. Some scenarios that exist today are that all hackers were considered criminals at one time and may have served jail time for some of the things they have done in their past. This brings us back to what were discussing prior, that it takes a criminal to catch a criminal. Instead of the person serving a substantial amount of jail time, the hacker was given a second chance to put their skills to a more positive and productive way in society. The IT industry has had more than its fair share of black hats who now become one of the most respected of Ethical hackers. The creator of one of the most dangerous worms the Internet has ever seen is now a professor at a prestigious college playing a more positive role in society.
Robert Morris wrote a worm while he was a student at Cornell. Originally it was intended to see how large the Internet was, but it replicated so quickly it slowed down over 6,000 machines. As a result of this crime, he was the first person prosecuted under the 1986 Computer Fraud and Abuse Act. The Morris worm landed Robert 400 hours of community service and $10,500 in fines. He is now a tenured professor at the MIT Computer Science and Artificial Intelligence Laboratory. Morris principally researches computer network architectures including distributed hash tables such as Chord and wireless mesh networks such as Roofnet. ( IT Security Editors , 2009) Morris is just one of millions that had a skill set and decided to use it for better reason. Everyday more and more IT proffesionals are trained to be just as savvy with information systems as Morris was.

Where do they get their training?
One of the bigger issues in training students today is the fact that you are giving an individual a weapon. With this weapon the student has the control to decide whether or not they will use it for good or bad intentions. They can either take what they have learned and use it for the good of society or they can turn around and commit heinous crimes. To have an instructor teach a student how to hack and find out that the student indeed used it to commit a criminal offense could most indefinitely defeat the purpose why the instructor was teaching the class in the first place. It is almost unimaginable what a student may do with some of the mentalities some students have in today’s society. In our own hometowns we can point out these types of criminal acts whether it was a slaughter of students in a college or burglarizing someone’s home during the holiday season. We must be cautious with what individuals are taught in schools. I feel that eventually students will have to have a clean record and more constraints will have to be put in place to keep computer criminal activity from rising after this type of training becomes more and more available. It is a must for a school to keep students from doing these activities and to further invoke more defined policies protect the institution.
No matter what their age, institutions are susceptible to having a few bad apples. The students could be as young as ten years old trying to manipulate software or video games. Defcon recently held a training conference to teach young kids about security and how to hack. The young children “implemented games like deciphering clues, picking locks, coaxing information out of people and reading subtle facial expressions. They also learned how to hack hardware, software and websites.” (Usigan, 2011) There are several avenues for a person that is interested in the Network Security field to be able to find the skill set to be able to be an ethical hacker, but it may be somewhat costly.
SANS Institute for example is one of the largest cooperative research and education organizations that now reach more than 165,000 professionals around the world. Training can be taken in several different environments. SANS offers a classroom setting, self paced over the Internet, or in mentored settings in cities all over the world. (SANS INSTITUTE, 2012)

Legal Implications of hacking Whether ethical or not, hacking can have some serious risks for not only the organization, but the penetration tester as well. We discussed earlier how having a contract is a must, but there are several ethical hackers out there that fight for the people that are unable to obtain a contract. They feel that it is their civic duty to protect the people against these companies that refuse to fix their security holes. There has been several instances of a supposed white hat hacker without malicious intent finding vulnerable systems across the internet that are owned by fortune 500 companies. After the hacker makes a discovery they would then proceed to report the finding to the company that owns the system to bring attention to its vulnerability. Unfortunately the submission of how the system was breeched is a confession to a crime that was conducted unlawfully and without the proper legal paperwork in place the individual is subject to legal action or arrest. The company could either thank you for doing the organization a huge favor or could potentially hang you out to dry by initiating legal action against the individual.
A recent case of this happened in February, 2012, where a British student breached security at the social networking site FACEBOOK. Glenn Mangham has done penetration testing on other sites such as Yahoo and gotten a huge slap on the back for finding vulnerabilities in its systems. The student was not as appreciated by facebook when he was able to breach a webserver. Although Mangnam’s intention was to present these vulnerabilities to have them fixed, the prosecution claimed that over $200,000 was spent fixing systems after his hack despite the cost of the actual investigation. The white hat hacker was found guilty by Judge Alistair McCreath, who reprimanded him with 8 months of jail time and the following justification;
"This was not just a bit of harmless experimentation - you accessed the very heart of the system of an international business of massive size."
"This was not just fiddling about in the business records of some tiny business of no great importance and you acquired a great deal of sensitive and confidential information to which you were simply not entitled... Potentially what you did could have been utterly disastrous to Facebook."

There are several others out there that are just as interested as Glen was in recovering security holes. Based on his situation others can now be wary of even thinking of breaching a system without the proper legal protection in place. (Cluley, 2012)
Conclusion
One of the most significant findings to emerge from this research is that ethical hacking can be beneficial in identifying vulnerabilities before they are exploited. In today’s society it can be more beneficial to company to practice due diligence in exposing these security holes. Ethical hacking is legal and performed with the target’s permission. It is part of an overall information risk management program that allows for ongoing security improvements (Beaver, 2005, p. 10). Finally, according to Ed Skoudis, Vice President of Security Strategy for Predictive Systems’ Global A Closer Look 15 Integrity consulting practice, “ethical hacking has continued to grow in an otherwise lackluster IT industry, and is becoming increasingly common outside the government and technology sectors where it began” (SearchSecurity, 2007, p. 1). The question still remains whether or not an Ethical Hacker’s intent is truly a trustworthy one to the organization in the future. I have often wondered after my organization’s penetration testers have completed their findings whether they found everything or even disclosed all of their findings. Phil Zimbardo has made a career on the study of coercion, obedience, and evil. After years of research he has developed a theory on how good people can turn evil. So another valid argument would be; who is to say that an ethical hacker could or could not one day turn malicious just for a higher good?

Works Cited
IT Security Editors . (2009). Top 10 Most Famous Hackers of All Time. Retrieved from www.focus.com: http://www.focus.com/fyi/top-10-most-famous-hackers-all-time/

Blum, R. (2009). Ethical Hacking IT Industry Survey. WORLDWIDE: British Telecommunications.

Cluley, G. (2012, FEBRUARY 20). Jail for 'ethical' hacker who bypassed Facebook security from his bedroom. Retrieved from nakedsecurity.sophos.com: http://nakedsecurity.sophos.com/2012/02/20/jail-facebook-ethical-hacker/

Durant, A. (2007). The Enemy Within. BusinessXL, 48-51.

Elias, M. (2007, March 14). An expert asks: Do we all have an evil, dark side? Retrieved from www.usatoday.com: http://www.usatoday.com/news/health/2007-03-13-zimbardo-evil_N.htm

Ellis-Christensen, T. (2012, May). What Is Ethical Hacking? (Conjecture Corporation) Retrieved from http://www.wisegeek.com/what-is-ethical-hacking.htm

Palmer, C. (2001, MAY). Ethical Hacking. IBM SYSTEMS JOURNAL, 769. Retrieved from http://en.wikipedia.org/wiki/White_hat_(computer_security)

SANS INSTITUTE. (2012, MAY). About the SANS Institute. Retrieved from SANS INSTITUTE: http://www.sans.org/about/sans.php

Usigan, Y. (2011, August 11). Kids learn how to hack at DefCon. Retrieved from www.cbsnews.com: http://www.cbsnews.com/8301-501465_162-20089444-501465.html

The Graduate School of Computer and Information Sciences

Certification of Authorship of FINAL PROJECT – DISS800

Submitted to: Dr. Michael Bryant:
Student’s Name: Patrick Bryant
Date of Submission: MAY 9, 2012
Purpose and Title of Submission: FINAL PROJECT
Certification of Authorship: I hereby certify that I am the author of this document and that any assistance I received in its preparation is fully acknowledged and disclosed in the document. I have also cited all sources from which I obtained data, ideas, or words that are copied directly or paraphrased in the document. Sources are properly credited according to accepted standards for professional publications. I also certify that this paper was prepared by me for this purpose.

Student's Signature: Patrick E Bryant

Similar Documents

Premium Essay

Ethical Hacking

...Ethical Hacking – Is There Such A Thing? Alexander Nevermind Nelson Stewart, PhD CIS 324 December 9, 2011 ABSTRACT ------------------------------------------------- When someone hears the word hacker, many things come to mind. Bad, thief, terrorist, crook and unethical are some words that may be used to describe a hacker. The reputation of a hacker is well deserved as many company networks have been compromised with viruses and spyware causing untold millions in damage, the theft of sensitive consumer information such as Social Security numbers and financial data and the unauthorized access of classified government information. To combat these issues, many companies employ individuals called ethical hackers who, by their direction and supervision look for vulnerabilities in network systems. There are naysayers who bristle at the term “ethical hacker” saying that a hacker is a hacker but those who hold such views could be missing the point. These subjects will be discussed in detail later in the text. ------------------------------------------------- Is there such a thing as “Ethical Hacking?” Define ethical hacking and support an argument in favor or against the concept. Consider who might believe/use ethical hacking and discuss if hacking, even for the purpose of protecting human rights, is ethical. You should extend the paper beyond the topics suggested in the questions within the paper description. Ethical hacking does exist, in fact, companies...

Words: 904 - Pages: 4

Free Essay

Hackers: Scourge of the Internet, or Information Superhero?

...PayPal taken offline by hackers, Sony’s PlayStation Network brought to its knees, a cyber defense contractor named Stratfor had its servers hacked and corporate emails leaked. Everything that people know about hacking can be summed up in news articles written by the uninformed. Hacking is bad, and there is no arguing that… Or is there? Most of what people know of hacking comes from the news or Hollywood movies such as Hackers and Swordfish. What they see is only one facet of this fascinating, yet misunderstood world. Hacking is not the evil act that some make it out to be. Hacking can also be a good thing. Enter the White Hat, or Ethical Hackers. These are the network security professionals in which no movies are based. Ethical hacking is used to help analyze networks for security flaws, stop attacks in progress and help keep companies in compliance with government regulations such as PCI or SOX. What is Ethical Hacking? Ethical hacking sounds like an oxymoron, but it does exist and is a very handsomely paying career field. The average ethical hacker can make anywhere from $24,760 a year to $111,502 (InfoSec Institute, n.d.). It does not stop there however. Some contracts can net an ethical hacker up to $17,500 in bonuses. (Computer Hope, n.d.). The main role of the ethical hacker is to penetrate a business network in order to recognize and fix security flaws before a “Black Hat” hacker can get to it. There is no such thing as a “fully secure” network,...

Words: 2096 - Pages: 9

Premium Essay

Ethical Hacking

...Ethical Hacking 1 Running head: ETHICAL HACKING: Teaching Students to Hack Ethical Hacking: Teaching Students to Hack Regina D. Hartley East Carolina University Ethical Hacking 2 Abstract One of the fastest growing areas in network security, and certainly an area that generates much discussion, is that of ethical hacking. The purpose of this study is to examine the literature regarding how private sectors and educational institutions are addressing the growing demand for ethical hacking instruction. The study will also examine the opportunity for community colleges in providing this type of instruction. The discussion will conclude with a proposed model of ethical hacking instruction that will be used to teach a course in the summer semester of 2006 through the continuing education department at Caldwell Community College and Technical Institute within the North Carolina Community College System. Ethical Hacking 3 Ethical Hacking: Teaching Students to Hack The growing dependence and importance regarding information technology present within our society is increasingly demanding that professionals find more effective solutions relating to security concerns. Individuals with unethical behaviors are finding a variety of ways of conducting activities that cause businesses and consumers much grief and vast amounts annually in damages. As information security continues to be foremost on the minds of information technology professionals, improvements in this area are critically...

Words: 6103 - Pages: 25

Premium Essay

Ethical Hacking

...Danish Jamil et al. / International Journal of Engineering Science and Technology (IJEST) IS ETHICAL HACKING ETHICAL? DANISH JAMIL Department of Computer Engineering, Sir Syed University of Engineering & Technology, Main University Road, Karachi, Sindh-75300,Pakistan mallick251@hotmail.com MUHAMMAD NUMAN ALI KHAN Department of Computer Engineering, Sir Syed University of Engineering & Technology, Main University Road, Karachi, Sindh-75300,Pakistan mallick89@yahoo.co.uk Abstract : This paper explores the ethics behind ethical hacking and whether there are problems that lie with this new field of work. Since ethical hacking has been a controversial subject over the past few years, the question remains of the true intentions of ethical hackers. The paper also looks at ways in which future research could be looked into to help keep ethical hacking, ethical. Keywords— Ethical hacking, hacking, hackers, education and training, risk management, automated security I. INTRODUCTION Understanding the true intentions of the general public is quite a hard task these days, and it is even harder so, to understand the intentions of every single ethical hacker getting into vulnerable systems or networks. Technology is ever growing and we are encountering tools that are beneficial to the general public, but in the wrong hands can create great controversy, breaching our basic right to privacy, respect and freewill. The constant issues highlighted by the media always reporting some type...

Words: 3974 - Pages: 16

Premium Essay

Hacking

...Danish Jamil et al. / International Journal of Engineering Science and Technology (IJEST) IS ETHICAL HACKING ETHICAL? DANISH JAMIL Department of Computer Engineering, Sir Syed University of Engineering & Technology, Main University Road, Karachi, Sindh-75300,Pakistan mallick251@hotmail.com MUHAMMAD NUMAN ALI KHAN Department of Computer Engineering, Sir Syed University of Engineering & Technology, Main University Road, Karachi, Sindh-75300,Pakistan mallick89@yahoo.co.uk Abstract : This paper explores the ethics behind ethical hacking and whether there are problems that lie with this new field of work. Since ethical hacking has been a controversial subject over the past few years, the question remains of the true intentions of ethical hackers. The paper also looks at ways in which future research could be looked into to help keep ethical hacking, ethical. Keywords— Ethical hacking, hacking, hackers, education and training, risk management, automated security I. INTRODUCTION Understanding the true intentions of the general public is quite a hard task these days, and it is even harder so, to understand the intentions of every single ethical hacker getting into vulnerable systems or networks. Technology is ever growing and we are encountering tools that are beneficial to the general public, but in the wrong hands can create great controversy, breaching our basic right to privacy, respect and freewill. The constant issues highlighted by the media always...

Words: 3982 - Pages: 16

Free Essay

Building an Access Control System

...Assignment 1: Attack Methodology and Countermeasures Terrance Moore Professor Siplin Perimeter Defense 10/31/2013 When you are utilizing security features in an application, consideration should be given to the design, implementation, and deployment. It would helpful if you understand how a hacker thinks and then utilize the tools a hacker would use. Today, every company is becoming completely networked, through the exchanging of information on desktops, laptops, tablets and smart phones. Thinking like a hacker and understanding a hacker’s tactics and scams could make you aware and become more effective when applying countermeasures. There are several methods for carrying out ethical hacking, the most common are limited vulnerability and penetration testing. Limited vulnerability analysis, focus on entry points to gather critical systems and data. By understanding the basic approach used by hackers to target organizations, you will be better equipped to take defensive measures you will be better equipped and know what you are up against. There are steps involved in scanning a network, the following points will highlight them. 1) Check for live systems, 2) Check for open ports, 3) Fingerprint the operating system, 4) Scan for vulnerabilities, 5) Probe the network. Tools that can be used to detect scanning threats and countermeasures that a company can use to deter and avoid vulnerabilities are as follows. “Spoofing user identity -use strong authentication for passwords...

Words: 996 - Pages: 4

Premium Essay

Cyber Security

...2011 Ethical Hacking & Penetration Testing ACC 626: IT Research Paper Emily Chow 20241123 July 1, 2011 I. Introduction Due to the increasing vulnerability to hacking in today’s changing security environment, the protection of an organization’s information security system has become a business imperative . With the access to the Internet by anyone, anywhere and anytime, the Internet’s “ubiquitous presence and global accessibility” can become an organization’s weakness because its security controls can become more easily compromised by internal and external threats. Hence, the purpose of the research paper is to strengthen the awareness of ethical hacking in the Chartered Accountants (CA) profession, also known as penetration testing, by evaluating the effectiveness and efficiency of the information security system. 2 1 II. What is Ethical Hacking/Penetration Testing? Ethical hacking and penetration testing is a preventative measure which consists of a chain of legitimate tools that identify and exploit a company’s security weaknesses . It uses the same or similar techniques of malicious hackers to attack key vulnerabilities in the company’s security system, which then can be mitigated and closed. In other words, penetration testing can be described as not “tapping the door” , but “breaking through the door” . These tests reveal how easy an organization’s security controls can be penetrated, and to obtain access to its confidential and sensitive information asset by hackers...

Words: 11999 - Pages: 48

Premium Essay

Ipad's Security Breach

...iPad’s Security Breach Samantha Phillips Dr. Prakash G. Menon BUS 508: The Business Enterprise May 29, 2011 Justifying Hacking into a Web site In 2010, McDonald’s said that customer information was exposed after a security breach involving an email marketing managing firm. McDonald’s released a statement explaining that information was obtained by an “unauthorized third party”, but added that financial information and social security numbers were not part of the data accidentally exposed. (Security Magazine, 2010) A security breach exposed iPad owners including dozens of CEOs, military officials, and top politicians. They, and every other buyer of the cellular-enabled tablet, were vulnerable to spam marketing and malicious hacking. The breach, which came just weeks after an Apple employee lost an iPhone prototype in a bar, exposed the most exclusive email list on the planet, a collection of early-adopter iPad 3G subscribers that includes thousands of A-listers in finance, politics and media, from New York Times Co. CEO Janet Robinson to Diane Sawyer of ABC News to Mayor Michael Bloomberg. It even appears that White House Chief of Staff Rahm Emanuel's information was compromised. In fact, it is believed 114,000 user accounts were compromised, although it's possible that confidential information about every iPad 3G owner in the U.S. has been exposed. (Tate, 2010) Earlier this year, the names and e-mails of customers of Citigroup Inc. and other large U.S. companies...

Words: 3288 - Pages: 14

Free Essay

Computer Hacking

...title                                      Cyber Security: Computer Hacking                                                          Abstract Computer hacking incidences have dramatically increased over the years. However, the current federal laws, such as the Computer Fraud and Abuse Act, have performed dismally in deterring potential cyber hackers. This paper explains that there are a very small percentage of computer hackers who are ever caught and prosecuted. This is the case since most companies, which are victimized by computer hackers, opt to hide the issue from the public and relevant authorities to maintain their position in the market. This paper explains the factors which encourage hacking by basing its arguments on formal psychological theories and informal observation. The review also explains the difference between malicious hackers and those who do it with good intentions. Business organizations today are hiring ethical hackers for the purpose of protecting themselves from the malicious ones. This paper also addresses police strategies for combating cyber hacking and also gives a comprehensive approach to reduce teenage hacking proclivity at an early stage. In countering this issue, law enforcement should apply previously done researches together with the current ones for maximum results.   Keywords: computer hacking, business organizations, ethical hackers, law enforcement             ...

Words: 4342 - Pages: 18

Premium Essay

Ipad's Security Breach

...transcontinental broadband-communications network. This paper will investigate and discuss some of the major issues involving Apple’s security breach. First determine if hacking into a website is ever justifiable, applying your theory to a real-world case in which someone hacked into a system, including the name of the company and details. We will create a corporate ethics statement for a computer security firm that would allow or even encourage activities like hacking. Secondly discuss if it is important for organizations like Gawker Media to be socially responsible; determine what factors CEOs should consider when responding to a security breach. Lastly, create an email script to be sent to AT&T customers informing them of the security breach and a plan to resolve the issue       IPAD’S SECURITY BREACH Determine if hacking into a website is ever justifiable, applying your theory to a real-world case in which someone hacked into a system, including the name of the company and details. According to Bosker (2010), recently, private information of iPad owners have been exposed through a security breach that has brought major embarrassment to Apple Company. Because of the said incident, it was speculated that buyers of the cellular-enabled tablet are susceptive to spam marketing and malicious hacking. This was written in an article, “Apple’s Worst Security Breach: 114,000 iPad Owners Exposed” (Bosker, 2010 p.3). According to Tate (2010) sadly, some CEOs, military...

Words: 1991 - Pages: 8

Free Essay

Hacking

...Certified Ethical Hacking - The 5 phases Every Hacker Must Follow The 5 Phases Every Hacker Must Follow Originally, to “hack” meant to possess extraordinary computer skills to extend the limits of computer systems. Hacking required great proficiency. However, today there are automated tools and codes available on the Internet that makes it possible for anyone with a will and desire, to hack and succeed. Mere compromise of the security of a system does not denote success. There are websites that insist on “taking back the net” as well as those who believe that they are doing all a favor by posting the exploit details. These can act as a detriment and can bring down the skill level required to become a successful attacker. The ease with which system vulnerabilities can be exploited has increased while the knowledge curve required to perform such exploits has shortened. The concept of the elite/super hacker is an illusion. However, hackers are generally intelligent individuals with good computer skills, with the ability to create and explore into the computer’s software and hardware. Their intention can be either to gain knowledge or to dig around to do illegal things. Attackers are motivated by the zeal to know more while malicious attackers would intend to steal data. In general, there are five phases in which an intruder advances an attack: 1. Reconnaissance 2. Scanning 3. Gaining Access 4. Maintaining Access 5. Covering Tracks For More Informaton contact EC-Council – (505)341-3228...

Words: 2322 - Pages: 10

Premium Essay

Network Security and Ethical Hacking

...Network Security & Ethical Hacking ------------------------------------------------- ------------------------------------------------- Neal Patrick and his friends did not realise they were doing anything unethical, in fact: when asked by Congress “At what point he questioned the ethics of his actions” – he answered “Once the FBI knocked upon my door.” “I have found that inadequate network security is usually caused by a failure to implement security policies and make use of the security tools that are readily available. It’s vital that companies complete professional risk assessments and develop comprehensive security plans and infrastructures that are publicly supported by upper management” Network security is not only about the WAN (Wide Area Network) but also the LAN (Local Area Network) as the two go hand in hand. It is possible to not only have an attack from the Internet but also internally. The moment any form of computer device becomes network capable or dependent of some form of network function, there is a given need for protection to safeguard the flow of information to and from the said device on a given network whether public or private and/or from a trusted to non-trusted source. The problem with locking down a network tightly is the administrative overhead it creates. The more secure the network becomes the greater the need is for someone or a team to administrate this. Eventually you would reach a point where it becomes impossible for the end-user...

Words: 5261 - Pages: 22

Premium Essay

Ethical Issues

...Software Development 2010 Ethical Issues in Information Technology There are a great variety of ethical issues in I.T.: 1 Ethical dilemmas There are various ethical dilemmas in relation to I.T. that need to be addressed. What are and are not ethical issues in I.T.? In regard to hackers, for example, are they testing the system or performing an immoral action? Will genetic engineering improve the quality of peoples’ lives or start to destroy it? How do we recognise when an ethical dilemma exists? There are, indeed, many grey ethical areas. 2 Plagiarism Plagiarism is where the work of others is copied, but the author presents it as his or her own work. This is a highly unethical practice, but happens quite frequently, and with all the information that is now available on the Internet it is much easier to do and is happening more often. 3 Piracy Piracy, the illegal copying of software, is a very serious problem, and it is estimated that approximately 50% of all programs on PCs are pirated copies. Programmers spend hours and hours designing programs, using elaborate code, and surely need to be protected. Although some might argue that some pirating at least should be permitted as it can help to lead to a more computer literate population. But, for corporations, in particular, this is a very serious issue, and can significantly damage profit margins. 4 Hacking Hackers break into, or ‘hack’ into a system. Hacking can be undertaken for a variety of reasons, such as the wish to damage...

Words: 2051 - Pages: 9

Free Essay

Computer Ethics

...Computer Ethics and Cyber Crimes Computer ethics has become a vital and necessary aspect in the world today. With the growth of computer use and technology it is imperative that some standards and guidelines are set to protect the public. Today it is common that each household has multiple computers that is utilized by everyone in the household, including children. According to Wall, the term ‘cybercrime’ is widely used today to describe the crimes or harms that result from opportunities created by networked technologies. With the increase of user knowledge comes the increase potential for crimes committed with the use of technology. Cybercrimes can be committed without ever leaving the comfort of ones home and is getting harder to prevent. In this paper specific cybercrimes such as hacking, identify thief, embezzlement, and secure fraud will be analyzed. The one of the most common cybercrimes is hacking. Computer hacking is when someone gains access to another individual's or company's computer network without their knowledge or permission. There are several different types of hacking. Bluetooth hacking is one form. Bluetooth hacking is when the Java programming language is used to gain access to various cellular phones. For this process to work the phone that is targeted to be hacked must be able to support JSR-82, this is the official Java Bluetooth Application Programming Interface. The best way to prevent your phone from being hacked using a bluetooth is to set your...

Words: 1560 - Pages: 7

Premium Essay

Ethical Use of Information Technoloby in Modern Society

...The problem to be investigated is the ethical use of information technology in a modern society. “Information technology basically refers to the employment of computer hardware and software applications to manage data” (K Alliance). Historically, information technology had limited applications and its impact on society was also limited. Information technology has come a long way since Jean Hoerni first developed the planar transistor whereby microscopic circuit boards could be laid out on the silicon surface, thus allowing the compacting of these circuits onto integrated circuits (“Darby consulting”). Today, however, information technology is a part of nearly every business and personal activity (Brooks, 2010). Because information technology is so widely used, the opportunity for individuals to engage in information technology in an unethical manner is abundant. This is why it is essential for education systems and businesses to address the ethical concerns of information technology usage. It is imperative that education systems and businesses develop a practical code of ethics to prevent ethical dilemmas and infractions, or at least try to mitigate them. Information technology has caused widespread society ethical changes. To previous generations, information technology was reserved for very specific industries. There was a selective segregation who worked with information technology and what pieces of information were impacted by information technology (Brooks, 2010). With...

Words: 1620 - Pages: 7