Got a tricky question? Receive an answer from students like you! Try us!

Ethical Hacking - Essay Example

Only on StudentShare
College
Author : rowedannie
Essay
Miscellaneous
Pages 2 (502 words)

Summary

HACKER noun 1.A person who enjoys learning the details of computer systems and how to stretch their capabilities-as opposed to most users of computers, who prefer to learn only the minimum amount necessary. 2. One who programs enthusiastically or who enjoys programming rather than just theorizing about programming (Raymond, 1991).

Extract of sample
Ethical Hacking

Even mundane day to day tasks rely on the use of computers. Technology is evolving at an unprecedented rate and as a result the products that reach the market are engineered more for ease of use rather than secure computing. With the increased numbers and expanding knowledge of ill-intentioned crackers, combined with the growing number of system vulnerabilities and other unknowns, organizations (universities, corporate companies, NGOs, hospitals etc) need to be more proactive in securing their sensitive networks and data. More and more companies now believe in the quote: "To catch a thief, think like a thief" and hiring ethical hackers to ensure information system security.
For a long time, the term Ethical Hacking has been termed to be an oxymoron. This is mainly because of the misappropriate information imparted by misinformed or more appropriately, 'lesser informed' people.
Since a long time, zealous and intelligent information system professionals who can get around a computer issue through innovation have categorized themselves into two categories: Black Hat Society (Crackers) and White Hat Society (Hackers). ...
Download paper

Related Essays

Leaks and Hacks. When Is It Illegal To Get Hacked?
The term is also used to describe variation of a program or mechanism to give the user entrance to computer features that otherwise would be inaccessible like the DIY circuit bending. Hacking has been considered a serious crime especially when one hacks in to a government. There are instances when some get involved in what is termed as "ethical hacking"; this is company's strategy to determine their security weaknesses or target for intruders. Even so, the ethical hacker may get in trouble with the law, it is therefore necessary that some one gets the Get out of jail Free Card (GOOJFC) which…
13 pages (3263 words)
Ethical Decisionmaking and High Technology
Activities and behaviors causing these losses vary and include criminal activities such as hacking into systems, fraud and theft (Kreie and Cronan, 1999). Monetary losses to businesses are estimated to be in excess of billions of dollars annually and, too often, these misuses are carried out by the company's own employees. Reportedly, up to 80% of bandwidth use at some workplaces is due to non-work related electronic exchange of materials (Conlin, 1997). Accordingly, most businesses monitor how their employees use the Internet. This means that employers know, or can easily determine, what Web…
5 pages (1255 words)
Changes in Technology and Criminal Law
Nonetheless, custom software is elusive and not taxable. Different stats have developed specific laws that deal with the taxability of computer software transactions.…
10 pages (2510 words)
Hacking: A Modern Dilemma that Calls for Modern Solutions
This paper shall dwell and tackle the different issues that confront the Internet community today as regards the hacking problem. The discussion will take into account some of the problems caused by hackers and the different analysis and evaluation given to these. Various literatures from books, journals, news articles and web sites that contribute to the bulk of knowledge regarding hackers shall be used.…
8 pages (2008 words)
Security Manager: Ethical and Social Responsibilities
Data thefts, embezzling on the Net and identity thefts are not uncommon, forcing IT heads to consider data protection. And since thefts from within an organisation are greater threats than from outside, access control is one of the key areas of concern for the IT manager. Therefore, the dependence on security solutions is becoming greater. In this context, the security manager is responsible for not only protecting data but also acting responsibly. Being the sole controller of access, managers have the advantage of accessing any information. Therefore, being aware of their ethical and social…
15 pages (3765 words)
Software System Development
This pejorative form of the noun "hack" is even used among users of the positive sense of "hacker".…
5 pages (1255 words)
ethical hacking
[Use this space to record some of your own thoughts/ideas about the lab and why it went well or perhaps not so well.] For example, “the lab did not go so well as rather than read the lab description and objectives, I jumped straight in at task x and therefore found that I had to continually ask the lecturer questions that has been explained at the start of the lab material. In hindsight I should have read the lab and made sure that I knew exactly what I was doing before starting the lab.”…
8 pages (2008 words)