Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
Few lines on ethical hacking
The danger of ethical hacking
Few lines on ethical hacking
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: Few lines on ethical hacking
Introduction Modern society relies more on computers and the Internet now than ever before as a means to exchange information. Computer infrastructures are continually evolving and developing which has lead to an increase of reliance on technology, and an increasing amount of personal data being shared between computers and over the Internet. For these reasons it imperative to keep these infrastructures safe from those who do not belong or mean to cause harm, commonly called hackers. Hackers are people who gain unauthorized access to someone else’s computer. Hacking is wrong when financial or personal gain is achieved (Jamil and Khan 2011), but there are three types of hackers. ‘White Hats’ are hackers who use their computer skills for ethical reasons, ‘Black Hats’ use their skills in unethical or illegal ways and ‘Gray Hats’, also known as vigilantes or hacktivisits (Hackers 2009), their skills to investigate criminal activity but perform it in an illegal manner. Who is affected by computer hacking? Anyone with a computer, including smart phones, can be a victim of hacking. Examples of those who have been affected are big name companies (Target, Twitter, and Facebook), heads of government, (Angela Merkel), and unsuspecting members of the public (Trojan viruses or worms). One approach to increasing computer security is by ethically hacking. An “ethical hacker” is someone who hacks into computers in order to spot security vulnerabilities without the intent of causing harm. This essay will provide arguments for and against the use of ethical hacking to identify weaknesses in computer security. Ethical Hacking to Expose Security Flaws The main argument for ethical hacking is that companies are able to decrease their loss of sensitiv... ... middle of paper ... ...Hackers Types." Retrieved 15 November, 2013, from http://www.hackersonlineclub.com/hackers-types. Jamil, D. and M. N. A. Khan (2011). "Is Ethical Hacking Ethical?" International Journal of Engineering Science 3. Pashel, B. A. (2006). Teaching students to hack: ethical implications in teaching students to hack at the university level. Proceedings of the 3rd annual conference on Information security curriculum development, ACM. Saleem, S. A. (2006). Ethical hacking as a risk management technique. Proceedings of the 3rd annual conference on Information security curriculum development, ACM. Smith, B., W. Yurcik and D. Doss (2002). Ethical hacking: the security justification redux. Technology and Society, 2002.(ISTAS'02). 2002 International Symposium on, IEEE. Spafford, E. H. (1992). "Are computer hacker break-ins ethical?" Journal of Systems and Software 17(1): 41-47.
The use of hacking to identify weaknesses in computer security has become an increasingly controversial issue in recent years. Awareness of this issue is important, because our ever increasing reliance on technology means that breaches in computer security have the potential to have wide-ranging and devastating consequences to society, worldwide. This essay will begin by clearly defining the term ‘hacking’ and will examine the type of people who hack and for what reasons. There will then follow a discussion of the moral argument on hacking before examining a few brief examples. The essay will then conclude by arguing against the use of hacking as a means of identifying weaknesses in computer security.
In reality, most hackers are ordinary people with a great deal of curiosity, above-average skills with a computer, a good understanding of human nature, and plenty of time to kill. Hackers have no distinguishing characteristics. Your next-door neighbor could be a hacker, as could your niece or nephew, one of your co-workers, or even the kid who serves you coffee in the morning. Not all hackers are dangerous and out to destroy business or damage lives. The view of the general public toward hackers is mixed. A recent CNN-poll shows 33% of respondents labeling hackers as "useful," 17% seeing them "as a menace," and the majority (45%) seeing hackers as "both" useful and a menace (CNN, 1999).
Whitman, M., & Mattord, H. (2011). Reading & cases in information security: law & ethics. (2011 custom ed., p. 264). Boston, MA: Cengage Learning.
The documentary Rise of the Hackers, focuses on the rising criminal use of hacking and how it is effecting multiple areas of technology. The documentary describes simple and complicated situations concerning hacking, but there still questions that must be answered when it comes to hacking and crime. The main question is in trying to determine why a person would choose to commit computer hacking. There are various theories already present within the criminal justice system that may explain at a micro-level and macro-level. These theories would explain why offenders would commit the crimes, but it may not answer the full scope of the question. The Routine Activities Theory would help to explain why offenders offend, why victims are victimized,
This case study paper will examine the Hacking Into Harvard Case where actions executed by college students jeopardized their potential opportunities to further their education at selected universities. The purpose of this study is to look at the moral issue that raises concern; which is whether the college students unauthorized actions should qualify as unethical behavior amongst the business schools or should the actions of the students be justified by shifting the blame of unethical behavior to the arms of the business schools and their third party application software.
There are three areas of cyber conflict that hackers choose to think are the ethical issues, but are the most problematic.
The hacker subculture is a commonly misunderstood part of society, which has evolved in the last forty years to become vital to the modern way of life. Hackers have influenced common daily activities and governments around the world while providing protections against foreign threats. Hackers have also served a prominent role in promoting truth and openness in modern politics, exposing politicians true motives and aspirations. Many prominent members of the most successful businesses began as hackers or are closely associated with the hacker subculture. These hackers have used their prominence and influence to manipulate the views and interests of today’s society, and advance the acceptance of technology in modern lifestyles.
Hacking was a term established in the 1960s. This word is the concept of unauthorised intrusion of a computer or network with malicious intentions behind them. This includes any technical effort of manipulating or damaging the normal behaviour of network connections/systems or stealing information. In this generation, hacking has become evidently significant and the debate of hacking being considered ethical or unethical arises. Therefore, will hacking ever be justified? The justification (reasonableness) of hacking has become a disputation of mixed opinions and emotions amongst society. These opinions range from hacking being considered immoral due to it being illegal activity and the vast negative impact it has on people. This includes the affirmative opinions on hacking; such as hacking being considered ethical due to the “white hat” hackers.
In information technology field, issue regarding to ethics and professionalism had been given name as cyber ethics. According to ikeepsafe (n.d.), cyber ethics is the discipline of using ethical behaviors and acknowledging moral duties to online environment and digital media. This issue includes hacking, phishing, copyright, downloading, cyber bullying, etc. The issue discussed in this paper, is the most problematic and troublesome - Hack.
The term “hacker” has been in use since the early 1980’s due to mass media usage to describe computer criminals. The use of this term is vastly used by the general population and most are not aware that there are different meanings to the word. People within the computing community especially within the programming subculture emphasize the use of the term “crackers” for computer security intruders (cyber criminals). Early hackers rarely used their skills for financial gain as a motivation for their criminal behavior in that time cybercrime was infantile and largely seen as a practical joke or game by those who committed it. Bob Thomas created the first credited computer worm n...
The issue with tackling the ethical hacker scenario is that the event is almost entirely action based. There is no end to give meaning to the action and there is no finalized result or indication that it impacted happiness, which many ethical theories depend on. Namely consequentialism, utilitarianism and ethical egotism require an end result in one form or another. There is also no purpose in committing the hackings which makes applying moral theories that deal with motivation and intent, ethical egotism and aspects of virtue ethics, increasingly more difficult to do effectively. Therefore moral theories that apply almost exclusively to the action itself will be utilized in this argument.
Harvey, Brian. A. Computer Hacking and Ethics. Ed. Paul Goodman, P.G., a.k.a. Electrical Engineering and Computer Science.
In the early years of computers and computerized technology, computer engineers had to believe that their contribution to the development of computer technology would produce positive impacts on the people that would use it. During the infancy of computer technology, ethical issues concerning computer technology were almost nonexistent because computers back then were not as multifaceted as they are today. However, ethical issues relating to computer technology and cyber technology is undeniable in today’s society. Computer technology plays a crucial role in all aspects of our daily lives. Different forms of computer technology provide unique functionalities that allow people to perform daily activities effectively and efficiently. In modern society, we use computer and cyber technology to communicate with friends and family via social networking sites, participate in business transactions, and get current news. Different tasks require unique technological feature in computer technology to function properly. Although, unique technological features increase people’s proficiency in accomplishing various tasks, unique technological features in computer and cyber technology increase security vulnerabilities. In many cases, the security vulnerabilities in computer technology are exploited by cybercriminals to invade people’s privacy, and steal people’s identity. We know that computers have no moral compass; they cannot make moral decisions for themselves. Essentially, people make moral decisions that affect others positively or negatively depending on how they use computer technology. Some of the biggest ethical issues facing people in the computing environment include privacy concerns on the web and identity theft. Privacy concerns...
Since the creation and development of the Internet, hackers and intelligent software developers have been able to spread viruses that cause great harm to corporations and households. The Internet has been the gateway for hackers into their journey of obstruction. For example, through the loopholes of Microsoft’s IIS services on its server operating system packages, hackers have been able to open “backdoors” into some of the most complex intranet firewall protected networks of the world. Once the access has been made available, hackers have the opportunity to manipulate data, retrieve confidential data, and destroy systems containing critical data with the help of their developed viruses. The fact of the matter is, hackers and other cyber criminals cause great amounts of financial damage to corporations and other smaller scaled victims. The ethical question to consider when dealing with virus control is: Is it unethical to take extreme measures to avoid hacker attacks, even when we are taking away people’s autonomy and obstructing their privacy?
For betterment of technology and for good causes the resources are tested which is called as ethical hacking. Technically, Ethical hacking is focusing on securing and protecting IT system which is called as Penetration system or White hat hacking. White hat hacking has a major difference that ethical hacking is legal which involves the same tools , tricks and techniques that hacker use. After the target’s permission only the ethical hacking is performed. For securing the system in a better manner the intent of ethical hacking is to discover vulnerabilities from a hacker’s point of view. It allows for ongoing security improvement which is a part of an overall information risk management program. Claiming about the security