StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

The Ethical Hacking Issues - Research Proposal Example

Cite this document
Summary
The paper "The Ethical Hacking Issues" highlights that there is a need for future research to offer an adequate analysis of the way ethical hackers will implement effective risk management plans, which will enable Internet users or businesses to protect their data from hacking activities…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.2% of users find it useful
The Ethical Hacking Issues
Read Text Preview

Extract of sample "The Ethical Hacking Issues"

? Ethical Hacking Lecturer: The researcher provided a brief introduction of the ethical hacking issues and the way cybercrimes has increased due to rapid technological advancement. The author included the project goals that reveal the purposes of the research project and what it will accomplish. It included literature materials in order to examine the way the previous scholars have argued about ethical hacking issues. The core hypothesis of the project was to examine the extent of risks arising from hacking: to risks triggers; thus determining effective solutions for risk management. The researcher employed both qualitative and quantitative research design methods of attacking a computer network. In the conclusion part, the summary was included that summed up the research work. The researcher recommended that there is a need for future research to offer adequate analysis on the way ethical hackers will implement effective risk management plan, which will enable Internet users or businesses to protect their data from hacking activities. INTRODUCTION Ethical hacking as a risk management technique is the use of programming skills in determining vulnerabilities in the computer system. There are varied types of ethical hackers including the White Hat, Black Hat and Grey Hat; thus, both focus on building a risk management program effective for eliminating vulnerabilities. The rapid advancement of technology has brought many constructive and significant solutions to the life of people. New areas of research have tremendously increased in e-commerce, electronic activities and information sharing areas. However, with the increased technology advancement, there have been a growing number of cybercrimes and criminal hacking activities. Businesses and other Internet users are nowadays scared of computer experts who will offer risk management through penetrating into their web server to offer adequate security. Therefore, there is a need for computer science students to advance their ethical hacking techniques in order to fight against the increasing problems of criminal hacking. Project Goals The project attempts to offer a comprehensive risks management plan effective for eliminating hacking activities in varied organizations. It identifies the risks resulting from hacking and offer effecting hacking methods that hackers will employ to manage organizational risks. It analyses the process of ethical hackings and also attempt to find out the pros or cons arising from ethical hacking. LITERATURE REVIEW This chapter will employ varied literature materials in order to examine the way the previous scholars have argued about ethical hacking issues. Tiller (2005) offer varied methodologies and unwritten convention that ethical hackers should employ in order to offer the maximum value to companies that want to manage organizational risks. The author reveals the technical aspects of penetration testing in order to address the engagement rules necessary for successful technical tests. Jahankhani (2010) also reveals the way cybercrimes has become one of the biggest problems in many industries across the globe; thus, reveals varied aspects including implementation, investigative techniques and criminal intelligence in fighting cybercrimes. The author aimed to educate the academia members, public and private sectors, as well as, students on the way to overcome cybercrimes issues. Logan and Clarkson (2005) reveal the significant need to educate computer science students to hack; thus enabling them to become experts in managing risks or vulnerabilities arising from hacking activities. HYPOTHESIS Hacking will likely to pose risks such as exposing sensitive user data and risk user privacy; thus making information vulnerable to illegitimate use and manipulation. Therefore, it triggers theft of critical business information because important information may be lost in the process hacking. This is because hacking can convert computer into zombies; thus contributing to spamming and phishing activities. Therefore, the core hypothesis of the project is to examine the extent of risks arising from hacking: to risks triggers; thus determining effective solutions for risk management. RESEARCH METHODOLOGY AND DESIGN The researcher will employ both qualitative and quantitative research design methods of attacking a computer network. The hacking methodologies will describe the process that the ethical hacker will employ in a tacking the computer system, and the risks that may arise from employing varied hacking methodologies. QUALITATIVE RISK ANALYSIS The researcher will employ qualitative methodology to examine the process of ethical hackings and also attempt to find out the pros or cons arising from ethical hacking activities. This method offers a foundation for a focused quantitative analysis or implementation of a response plan. Risk Ranking The researcher will use qualitative risk analysis method in ranking the risks that may arise from ethical hacking. Risks can be categorized in different ways including risks from the project source, area impacted and risks arising in the project phase. Qualitative placing of risks in categories will enable the researcher to find the common cause of the risks surrounding the project. The overall risks ranking that may arise in the project may be determined through summing up the individual risks and the common risks causes surrounding the project such as inadequate project resources or financial risks. List of Prioritized Risks The researcher will list prioritized risks that may arise and these will include financial risks for developing the project, the cost of monitoring the project and the impacts that the project will pose. The impact may include loss of sensitive information, false sense of security and being given a snapshot of what is taking place. List of Risks for Additional Analysis and Management The additional risk may include project and business risks arising from ethical hacking services. Thus, the management aspects can include employing varied testing methods such as black, white and grey box testing. Black box testing exposes the project to less risk, less cost and it offer real world results. White box testing is more holistic ways of analyzing risks and it is effective, but Grey box testing balances the cost/time of the project. Therefore, customers understand the business challenges; thus developing strategies for mitigating the risks that they present. QUANTITATIVE RISK ANALYSIS Sensitivity Analysis Quantitative risk analysis will help the researcher to make significant decision of developing a new risk management plan within the budget limit. It is crucial to present a well-prepared quantitative risk analysis in order to soothe the needs of the management. Therefore, the chance of success for the project approval will be greatly increased by practicing due diligence of collecting enough corroborating data. Prioritized List of Quantified Risks It is vital to prioritize the list of quantified risks that will result in the process of developing a management risk place of ethical hacking. The research will conduct a risk assessment and vulnerability study in order to determine the risk factors that may arise in the process of quantitative risk analysis. The research can conduct a safeguard cost or benefit analysis through determining the risks that may arise from ethical hacking activities such as loss of organization sensitive information and the legal aspects that may be posed towards risk management process. Probabilistic Analysis of Project The researcher will carry out survey in order to determine the way Internet users are frequently attacked by hackers. This will en able them to determine the percentage of unauthorized access or misuse of websites; thus employing effective management tool for reducing vulnerabilities. SUMMARY AND CONCLUSION Recommendations for New Research There is need for future research on the ethical hacking because cybercrimes is still on the increase and many researchers have not provided effective analysis on the way one can minimize risks that rise due to increased cybercrimes issues. Therefore, the future research should further offer adequate analysis on the way ethical hackers will implement effective risk management plan that will enable Internet users to protect their information from hacking issues. Conclusion In conclusion, computer science students should advance their ethical hacking techniques in order to fight against the increasing problems of criminal hacking. The research purpose was offer a comprehensive risks management plan effective for eliminating hacking activities in varied organizations. The literature materials revealed the need for technical aspects of penetration testing in order to address the engagement rules necessary for successful technical tests. The core hypothesis of the project was to examine the extent of risks arising from hacking: to risks triggers; thus determining effective solutions for risk management. The researcher employed both qualitative and quantitative research design methods of attacking a computer network. Thus, there is a need for future research to offer adequate analysis on the way ethical hackers will implement effective risk management plan, which will enable Internet users or businesses to protect their data from hacking activities. References Jahankhani, H. (2010). Handbook of electronic security and digital forensics. New Jersey: World Scientific. Logan, P. Y., & Clarkson, A. (January 01, 2005). Teaching Students to Hack: Curriculum Issues in Information Security. Sigcse Bulletin, 37, 1, 157-161. Tiller, J. S. (2005). The ethical hack: A framework for business value penetration testing. Boca Raton, FL: Auerbach Publications. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Ethical Hacking the three shades White Hat, Black Hat, Gray Hat Research Proposal”, n.d.)
Ethical Hacking the three shades White Hat, Black Hat, Gray Hat Research Proposal. Retrieved from https://studentshare.org/information-technology/1471799-ethical-hacking-the-three-shades-white-hat-black
(Ethical Hacking the Three Shades White Hat, Black Hat, Gray Hat Research Proposal)
Ethical Hacking the Three Shades White Hat, Black Hat, Gray Hat Research Proposal. https://studentshare.org/information-technology/1471799-ethical-hacking-the-three-shades-white-hat-black.
“Ethical Hacking the Three Shades White Hat, Black Hat, Gray Hat Research Proposal”, n.d. https://studentshare.org/information-technology/1471799-ethical-hacking-the-three-shades-white-hat-black.
  • Cited: 0 times

CHECK THESE SAMPLES OF The Ethical Hacking Issues

What Is Ethical Business, Ethical Issues Surrounding the Banking Sector

It is evidently clear that all corporate entities are directly affected by the ethical and moral stance exhibited by individuals and any difference that may exist between personal ethics and business can be arguably perceived as being an indictment of that particular individual's stance since it implies that the individual exhibits some level of double standards.... The paper "What Is Ethical Business, Ethical issues Surrounding the Banking Sector" states that the love of money that is currently being witnessed in most business studies students is similar to that exhibited by numerous white-collar criminals with business degrees....
18 Pages (4500 words) Essay

Phenomenon of Ethical Hacking

This report "ethical hacking" discusses the term hacker that has more than one meaning in the industry of information technology, hacker is considered a computer operator who gives preferences to gaining additional and far stretched information about computer systems and the information.... uring the early days of hacking, the term hacker was referred to as a person who has great skills, so different terminologies were invented to differentiate between hackers who use this skill to conduct destructive activities and those who don't commit too much damage....
7 Pages (1750 words) Report

Hacking with Hacktivism

This essay "hacking with Hacktivism" is about the marriage of computer hacking and political activism.... It is a combination of grassroots political protest with computer hacking.... hacking is typically an ethical issue.... The popular theory of ethics is ethical relativism that suggests the need for universal moral rights and wrongs to allow hacking to be taken place.... 4 Hackers should be judged solely by their skills at hacking, rather than by race, class, age, gender, or position....
15 Pages (3750 words) Essay

Unethical Behavior at All Levels of Society

hacking and cracking, under no circumstances, can be considered ethical.... hacking people's accounts or accessing passwords is an invasion of privacy.... Businesses are developing ethics codes and this itself implies that hacking is unethical.... ackers engage in hacking for the sheer pleasure it provides and they remain committed to the skill of hacking.... However, hacking and cracking have, been and will always be destructive and anti-social (Best, 2006)....
6 Pages (1500 words) Research Paper

Hacking and Cracking

hacking started way back in the 19th century after the invention of telephones by Bell Company.... However, computer hacking that is currently widely known started one century later.... hacking was seen as a This means that the person performing hacking had to modify system operations to attain what they require or to perform unusual functions (Peterson and Bender, 2011).... Later in 1980s hacking and cracking where differentiated by the Massachusetts Institute of Technology (MIT)....
4 Pages (1000 words) Essay

Ethical versus Unethical Hacking

n this way, the following brief discussion has analyzed a litany of both primary and secondary texts in the attempt to provide a valid and fair overview of the issues at hand.... The paper "Ethical versus Unethical hacking" highlights that the boundary between ethical and unethical hacking is slim, and it calls for qualities such as trustworthiness to ensure that system administrators do not use sensitive information maliciously.... hacking is a popular term today for all the wrong reasons, which include cybercrime, system intrusion, and security breaches....
10 Pages (2500 words) Research Paper

Legal an Ethical Issues Facing IT Managers

As such, it is vital for computer-based environments to develop mechanisms to protect the ethical values of their workers.... The following essay 'Legal an Ethical issues Facing IT Managers' presents the issues of computer ethics which are a crucial topic in the information systems sector.... issues such as cyber-crimes, hacking and password thefts are on the increase in cyber work environments.... Cyber work environments allow breaching of personal ethical values when individuals have access to other people's information through hacking and cyber-crimes....
1 Pages (250 words) Essay

Ethical Issues in Banking

The paper ''Ethical issues in Banking'' is a wonderful example of Finance & Accountig report.... The paper ''Ethical issues in Banking'' is a wonderful example of Finance & Accountig report.... The paper ''Ethical issues in Banking'' is a wonderful example of Finance & Accountig report.... To handle money as a commodity, therefore, without ethical implications and effect is to overlook vital ethical issues, issues that are financed, promoted, and effectively created....
10 Pages (2500 words)
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us