Nobody downloaded yet

Ethical Hacking the three shades White Hat, Black Hat, Gray Hat - Research Paper Example

Comments (0) Cite this document
Summary
Ethical Hacking Table of Contents I. Abstract 3 II. Introduction 3 III. Literature Review 5 References 11 I. Abstract This paper undertakes a review of the literature relating to ethical hacking and its related concepts. It touches on aspects of hacking relating to distinctions among white hat, black hat, and gray hat hacking, and justifications for the existence of hacking and hackers tied to making systems more secure…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER91.3% of users find it useful
Ethical Hacking the three shades White Hat, Black Hat, Gray Hat
Read TextPreview

Extract of sample "Ethical Hacking the three shades White Hat, Black Hat, Gray Hat"

Download file to see previous pages 2010; Snyder, 2006; Mahmood et al., 2010; Smith et al., 2002; Pashel, 2006; Raether, 2008) II. Introduction Hacking has become the stuff of national security talk in the US and other countries recently, with the proliferation of news with regard to accusations that China is leading a concerted effort to hack into very critical systems owned by the US government as well as private enterprises around the world. Some of the most recent reports tie the concerted hacking efforts to the Chinese military, indicating that not only is the hacking sanctioned by government, but is being done with its active support, with the intent to gain from the vast intelligence that can be had from the hacking exercises. This recent spate of news has put hacking in a bad light. Clearly this kind of hacking is unethical, because of the intent to gain from illegally breaking into global information systems, and without the permission of the system owners. From the point of view of international law, this is unethical and clearly criminal (Sanger, Barboza and Perlroth, 2013; Navarro, 2013; Olson, 2012). On the other hand it is worthwhile to note that ethical hacking is offered as a course in some universities, as in the case of a course offering in Northumbria University, entitled Ethical Hacking for Computer Security Bsc. It is an honors course. The goal of the course is to be able to produce ethical hackers who are adept at penetrating into systems with the use of tools to hack into them, so that the weaknesses and flaws of those systems may be identified and strengthened/addressed appropriately (Northumbria University, 2010). This testifies to many things, among them being that ethical hacking is a mainstream, legitimate activity, rather than something that can be deemed as criminal. The intent here is to bolster security rather than to breach systems with malice and with an intent to commit crimes. This is reflected as much in the Oxford Dictionary definition of the term, which also underlines the growing importance of ethical hacking and ethical hackers to be able to make systems more secure (Oxford University Press, 2013). That ethical and unethical hacking both exist, as typified by the two contrasting examples above, is further reflected in the way these two types of hacking are immortalized in the literature, via the contrasting designation of black hat hacking representing the practice of unethical and criminal hacking, and white hat hacking, or ethical hacking. There is also gray hat hacking, which, as the term connotes, is part ethical and part unethical. This latter term also denotes a hacker who has had experience with doing hacking on both sides of the fence. The arguments against hacking in general point to the aspect of the debate with regard to whether hacking has any place at all in legal society. This line of thinking says that all hacking is potentially illegal. Those in favor of ethical hacking, on the other hand, admit as much, but then posits the example of the locksmith. If one is locked into a house, for instance, because one lost the keys to the door, then it makes sense to call a locksmith to create new ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Ethical Hacking the three shades White Hat, Black Hat, Gray Hat Research Paper”, n.d.)
Ethical Hacking the three shades White Hat, Black Hat, Gray Hat Research Paper. Retrieved from https://studentshare.org/information-technology/1471801-ethical-hacking-the-three-shades-white-hat-black
(Ethical Hacking the Three Shades White Hat, Black Hat, Gray Hat Research Paper)
Ethical Hacking the Three Shades White Hat, Black Hat, Gray Hat Research Paper. https://studentshare.org/information-technology/1471801-ethical-hacking-the-three-shades-white-hat-black.
“Ethical Hacking the Three Shades White Hat, Black Hat, Gray Hat Research Paper”, n.d. https://studentshare.org/information-technology/1471801-ethical-hacking-the-three-shades-white-hat-black.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Ethical Hacking the three shades White Hat, Black Hat, Gray Hat

Ethical Hacking

...Ethical Hacking 1. Threats There have been many cyber attacks in the past that have weighed heavily on the shoulders of the victims. Three of the many examples are described here. Black Hat Crackers worked to take advantage of computer systems, and Jonathan James has been a big name among black hat crackers. He was sentenced at the age of sixteen and told the press that all he did was for fun. One instance of his great hacking is installing a backdoor into a Defense Threat Reduction Agency server and hacking sensitive information and employees’ data. In June 2005, the computer...
5 Pages(1250 words)Research Paper

SECURITY ISSUES IN RED HAT ENTERPRISE LINUX

...? SECURITY ISSUES IN RED HAT ENTERPRISE LINUX Security is always a key concern for enterprise Information technology (IT) managers with a regular apprehension to keep the systems properly updated and configured to prevent unwarranted exploitation from outsiders. OpenSCAP implements an open Source of Security Content Automation Protocol (SCAP) framework for creation of uniform approach for maintains secure systems. A lot people are paying a lot attention on security matters particularly in governments to ensure their systems are well guarded and are not exposed to uncalled for bugs and exploits. With OpenSCAP, the open source community is leveraging a number of different components from the security standards ecosystem to enable... the...
68 Pages(17000 words)Dissertation

Analysis of Red Hat Linux Operating System

...?Linux is a free and open source operating system for computers, mobile phones, televisions, video game consoles, and so on. One distribution of Linux in particular, known as Red Hat, is a popular Unix-like version of Linux that allows users to enjoy all of the working components of their electronic devices under an open source license. The history of Red Hat is central to the history of Linux distributions emerging from the 1990s, including making milestones in the advancement of open source operating systems. For instance, Version 3.0.3 of Red Hat, released in 1996, introduced the Executable and Linkable file format into popular usage among Unix systems. Among other innovations, such as...
6 Pages(1500 words)Research Paper

HAT SIZE AND INTELLIGENCE

.... From the beginning, however, intelligence has been related with the brain. In the 1500s, Greek and Roman philosophers thought that the more efficient brain had “the right amount of the four humours, blood, phlegm, and black and yellow bile” (Deary, 2001: Chapter 3). In the 19th century as technology started developing, scientists have focused on one factor to determine a person’s intelligence: the size of the brain. To measure the size of the brain, scientists used the principles of craniology to estimate the figure. “Brains were weighted after people died, skulls were filled with lead shot or other handy materials to found out how big the brain was that once resided there, and, more often, the size of the head...
8 Pages(2000 words)Essay

Can Gray Hacking Be Justified

...of action. The results of all conditions are difficult to estimate, so how can we probably apply the imperative of the most happiness for the greatest number if we do not understand who will benefit the greatest every time is still a questions that begs for answers (Mill, 2007) Gray hat defines a cracker or as it is well understand, hacker who uses a security weakness in a computer system or product for them to show the weakness to the attention of the owners. Unlike a gray hat, a black hat acts without spiteful intention. The objective of a gray is to advance the network and security network. By exposing the...
4 Pages(1000 words)Research Paper

Ethical Hacking the three shades White Hat, Black Hat, Gray Hat

...was included that summed up the research work. The researcher recommended that there is a need for future research to offer adequate analysis on the way ethical hackers will implement effective risk management plan, which will enable Internet users or businesses to protect their data from hacking activities. INTRODUCTION Ethical hacking as a risk management technique is the use of programming skills in determining vulnerabilities in the computer system. There are varied types of ethical hackers including the White Hat, Black Hat and Grey Hat; thus, both focus on building...
4 Pages(1000 words)Research Proposal

Red Hat or Suse

...? Red Hat or Suse Comparison and Contrast: Red Hat or Suse Both SUSE and Red hat have a graphical installation manager but that’s all that is common with the two with their installation logic being totally different. Red hat installation is easier for a newcomer to understand and follow but when it comes to SUSE the going isn’t as easy since it requires a bit of knowledge of Linux as it is rich in the KDE-style installation manager . also the fact that some key applications in SUSE are not installed by default, one needs to be cautious at the time of installation not to miss them out. Another difference that comes out clearly is that Red hat comes with...
7 Pages(1750 words)Research Paper

Woman with Hat Painting

...Woman with Hat Painting A visual image of the artwork under consideration in this research is Woman with Hat Painting by an artist known as Henri Matisse; the Woman with Hat Painting, approximately 31-3/4” by 23-1/2” in dimensions is an abstracted portrait of Matisse’s wife (Matisse a). With the artist’s choice of portrait as a subject, use of energetic paint strokes, and combination of unusual colors, the painting stands out as a model of the essential characteristics of fauvism. Overall, Matisse has applied an active brushwork to depict his wives’ dress, skin, and feathered hat, together with the background of the portrait with weird vivid colors. The Woman with...
3 Pages(750 words)Essay

Goodbye Pork Pie Hat by Charles Mingus disscusion paper

...contains “a manner of phrasing and sonority that mirrors the Jazz musician’ individuality (73). Holding a similar view, Berndt (63) noted that Jazz music originated in the Southern United States among the African-American communities, combining European music and African music. According to Shipton (23) Jazz music started developing in 1880 during the Atlantic slave trade which brought Africans to the U.S. Shipton (34) holds that the Jazz music, therefore, early Jazz had rhythms that reflected the African speech pattern was characterized by the pentatonic scale which led to the blue notes that commonly characterize Jazz. Focusing on Jazz music, this paper provides an in-depth analysis of “Goodbye Porkpie Hat,” a historic...
3 Pages(750 words)Essay

Business Requirements-HR

4 Pages(1000 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Research Paper on topic Ethical Hacking the three shades White Hat, Black Hat, Gray Hat for FREE!

Contact Us