StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Advantages and disadvantages of having hackers or other systems intruders as your IT security guardians - Essay Example

Cite this document
Summary
‘Hacker’ is very commonly used term in computer technology and refers to wickedness, deceitful individual who is intended to steal some kind of information or data and burglarizes the business or personal computers…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.2% of users find it useful
Advantages and disadvantages of having hackers or other systems intruders as your IT security guardians
Read Text Preview

Extract of sample "Advantages and disadvantages of having hackers or other systems intruders as your IT security guardians"

?ADVANTAGES AND DISADVANTAGES OF HAVING HACKERS OR OTHER SYSTEMS INTRUDERS AS YOUR IT SECURITY GUARDIANS Advantages and disadvantages of having hackers or other systems intruders as your IT security guardians Author Author Affiliation Date Introduction ‘Hacker’ is very commonly used term in computer technology and refers to wickedness, deceitful individual who is intended to steal some kind of information or data and burglarizes the business or personal computers. Despite the fact that there are some benefits of engaging a hacker as a member of corporation’s information technology staff since a corporation that upholds a corporate website and domestic network is capable to take advantage of the experiences built by the hacker. In other words, it can be said that all the hackers are not bad a number of them get through the network safety in an effort to teach various users (Marsh, 2011). This paper is also about the assessment of some of the main aspects regarding the varied nature of hackers. The basic aim of this research is to discuss the advantages and disadvantages of having hackers or other systems intruders as our business IT security guardians. What do hackers know that you (or your other IT people) don't know? Computer hackers have been using the weaknesses of any corporate network or else communication systems that are exposed to them, in computer networks. Though the reason can be that number of people using internet for some reason have been rising more and more every year, this outlines that a hacker can well be among one of them. As a matter of this realism, numerous unofficial groups of hackers explicitly have shown information, on, how they go about contravention effectively into some corporate computer systems (ISA, 2005). For the assessment of a hacker that is engaged for good intention will typically concentrate on how technology could be utilized to improve business production while illicit hackers pay their significant concentration on how technology is competent to be perverted as well as controlled (Purewire, Inc., 2010) and (Kelton, 2010). As the subsequent production of IT networking, the wireless 802.11 standard LANs are as well the novel playing fields for hackers. However, the security actions such as effectual encryptions and validation for standard wireless LANs are yet mounting; on the other hand, hackers have access to the user-friendly tools that are able to open more and more complicated attacks that are very dangerous to the information resources of the organizations. In this scenario, a number of enterprises make the blunder of considering that they do not need to agonize regarding wireless safety if they are operating non-mission decisive systems by means of non-susceptible data and information all through their wireless communication LANs. Though, a small number of networks function as isles of computerization. The majority of them make their connection with the enterprise backbone at a number of points, and hackers are capable to utilize the wireless LAN like a start point to the whole network. Therefore, each entrance indicating that network is supposed to be protected. During the summer time of year 2002, a trade chain was stated to be operating its typical wireless LAN with no some structure of encryption. The seller replied through stating that its wireless LAN simply managed its inventory function, consequently encryption was not desirable. Though, the open links invites hackers to watch about on the network to probably acquire access into secret client records or else sensitive business details plus information (AirDefense, Inc. , 2003) and (Kelton, 2010). Policies should IT security consultants be allowed to break in pursuit of security threats or threateners? There are two types of hackers. First type is known as White hat and other is Black hat. White hat hackers are those persons who are hired for positive purposes and for the effective management of business as well as corporate operations whereas the black hat hackers are opposite in nature. White hat hackers are recognized as good persons. In addition, white hat hackers consider that clients require instruction as well as protection from data theft. White hat hackers generally participate in the areas of black hat hacking, however they do not spoil or break into the corporate data and information. In its place, they are responsible for informing the corporate management or IT security consultants that the business working network has been attacked, contravened as well as discuss with them how to resolve and rectify the problems. Moreover, employing a white hat hacker is useful for the business, for the reason that the hacker has an intellect of defense intended for naive clients or network security individuals. Furthermore, a white hat hacker yet is acquainted with the matters faced by safety, and a number of them participate in the safety “combats” that is presented on a variety of servers. These network protection and safety consultants work in night; however they are able to notice as well as defend company information from theft all through the daylight (Marsh, 2011). What policies should IT security consultants be allowed to break in pursuit of security threats or threateners? To hack and go inside the business network system, can take years, months or hours. In this scenario, hackers take what they require; consequently examining forensic data on the corporate network is somewhat that stimulates them. However, a hacker can take hours in recognizing another hacker’s diffusion technique. Thus, hiring a hacker as a worker as well helps corporations to establish procedures and servers that notice and keep the record of an ongoing safety contravene. In addition, hackers remain state-of-the-art as well as understand the newest information and tools in the field of hacking and cracking. Thus, they are able to recognize the newest safety break effort from reading the newest security dangers. Furthermore, these workers are very important for the websites and networks that hold some sophisticated and sensitive client data and information. For example financial, medical and credit corporations can promote from a knowledgeable security advisors. Thus, a white hat hacker can be very helpful for the organizations in implementing security policies (Marsh, 2011) and (AirDefense, Inc. , 2003). Would you give a different answer to this question if national security were involved than if it were a matter of purely corporate security? As discussed above white hat hackers are helpful for business and for national security. I will prefer to hire some high level hackers in order to offer high class defense as well as protection for our national security network. These hackers will detect security holes and breach points in our national network. In this scenario the security management agencies can be able to effectively alleviate them. This class of hackers is as well used for taking some valuable information and data from some other network in order to handle or deal with some national security related issue. This paper has discussed some advantages and disadvantages of using hackers as IT security guardians. Normally, hackers are considered bad people who create problems for others. But this paper has shown a hacker can be used for the positive intentions. White hat hackers can play a major role in defining and implementing security policies for an organization as well as national level. References AirDefense, Inc. . (2003). Wireless LAN Security – What Hackers Know That You Don’t . Retrieved February 11, 2011, from http://www.scribd.com/doc/2096959/What-Hackers-Know-That-You-Dont ISA. (2005, May). What hackers know that you don't. Retrieved February 13, 2011, from http://www.calcems.com/isala/chart/chart505.pdf Kelton, J. (2010). Protecting Your Information Assets -What Hackers Know That You Don’t. Retrieved February 11, 2011, from http://www.altiusit.com/files/articles/whathackersknowthatyoudont.pdf Marsh, J. (2011). Benefits of hiring a retired hacker to protect your network . Retrieved February 11, 2011, from http://www.helium.com/items/1744984-benefits-of-hiring-a-retired-hacker-to-protect-your-network Purewire, Inc. (2010). WHAT HACKERS KNOW THAT YOU DON’T:WEB 2.0 WEAKNESSES AND OPPORTUNITIES. Retrieved February 12, 2011, from http://www.softwaresecuritysolutions.com/PDF/purewire-white-papers/PW-WhatHackersKnow-FINAL.pdf Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Advantages and disadvantages of having hackers or other systems Essay”, n.d.)
Retrieved from https://studentshare.org/information-technology/1406840-advantages-and-disadvantages-of-having-hackers-or
(Advantages and Disadvantages of Having Hackers or Other Systems Essay)
https://studentshare.org/information-technology/1406840-advantages-and-disadvantages-of-having-hackers-or.
“Advantages and Disadvantages of Having Hackers or Other Systems Essay”, n.d. https://studentshare.org/information-technology/1406840-advantages-and-disadvantages-of-having-hackers-or.
  • Cited: 0 times

CHECK THESE SAMPLES OF Advantages and disadvantages of having hackers or other systems intruders as your IT security guardians

Information and Systems Security

The paper “Information and Systems security” seeks to evaluate Network security as one of the most highly debated topics in the present-day world.... Network security has many dimensions.... hellip; The author states that Network security has become a very essential part of each and every network present on this planet- be it the Internet which we use or the LANs (Local Area Networks) and MANs (Metro Area Networks)....
6 Pages (1500 words) Assignment

Methods Employed by Organization to Discourage Hackers

In fact, numerous hackers who once used their power to smash into systems now put that information and cleverness to use by creating more comprehensive security events.... Not all hackers try to investigate prohibited computer systems.... The bad guys or black hottest go through systems or multiply virus and the good guys boost defense systems and expand potent virus defense software (Holt, 2010).... Computer network gives them a way to associate with other people with their same interest....
5 Pages (1250 words) Assignment

Ethical versus Unethical Hacking

hellip; Hacking is a popular term today for all the wrong reasons, which include cybercrime, system intrusion, and security breaches.... However, the term's definition has two sides: the good side, which entails gaining knowledge about systems for purposes of enhancing security, and the bad side, which involves gaining illegal access to systems so as to steal or damage information.... As such, the relevance of hacking is something that not only considers an individual hacker but entire corporations, or national security apparatus....
10 Pages (2500 words) Research Paper

Hacking and Hackers

This paper "Hacking and Hackers" gives a brief description of network hacking techniques, various types of biometrics that can be integrated into the network security features, and the recent trends in network security involving biometrics for battling the attacks of the network hackers.... However, with the new advancements in the field of information technology, maximizing information security has also become more and more difficult as the result of more organized intrusion attempts by hackers....
8 Pages (2000 words) Literature review

Information Security Practice In The Company Activity

The paper "Information security Practice In The Company Activity" discusses guarding electronic resources against the intrusion threats as an issue related to the business imperative.... Organizations should have the capability to inspect traffic passing through open ports and inform the security administrators about any suspected malicious traffic.... In this context, a detailed methodology for analyzing the concept of network intrusion in the area of security policies is studied along with the domains where collaborative Intrusion detection and prevention systems (IDPS) can be implemented....
60 Pages (15000 words) Dissertation

Computer Hacking

hellip; The author states that a number of ill-informed individuals have related the term of 'hacking' with the practices of cybercrime that has resulted in misunderstandings regarding the domain of hacking that plays a vital role in maximizing security in the computing field, and thus, this paper will involve efforts to argue over the importance of hacking.... Nowadays, experts and professionals use the term 'hacking' or 'hacker' to describe an individual who causes threats, risks, and damages in the computer security that is against the actual definition of the term hacking, as well as its real usage....
14 Pages (3500 words) Dissertation

Advantages and Disadvantages of Hacking

There are various forms of advantages and disadvantages of hacking (Engebretson, 2013 p.... For years this act has been considered illegal but many organisations do it today for personal security… The individual who is consistently involved in hacking activities and has accepted hacking as philosophy and lifestyle of their choice is referred to as a hacker.... For years this act has been considered illegal but many organizations do it today for personal security reasons....
2 Pages (500 words) Essay

Security and Enterprise Systems

… The paper “security and Enterprise Systems” is an affecting variant of term paper on information technology.... As expected, security and other processes have become more demanding with this evolution.... The paper “security and Enterprise Systems” is an affecting variant of term paper on information technology.... As expected, security and other processes have become more demanding with this evolution....
17 Pages (4250 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us