Nobody downloaded yet

Ethical v. unethical hacking - Research Paper Example

Comments (0) Cite this document
Summary
Instead, it exists as do so many actions throughout the world we live in. Ultimately, the ethical interpretation of whether hacking can be considered good or bad is measured in the same way that other actions can be…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER97.5% of users find it useful
Ethical v. unethical hacking
Read TextPreview

Extract of sample "Ethical v. unethical hacking"

Download file to see previous pages The revelations of individuals such as Julian Assange and Edward Snowden have underscored the pertinence and relevance of considering the potential for information to be compromised, hacked, and used by third parties that have never been given license or permission for such use. As such, the relevance of hacking is something that not only considers an individual hacker but entire corporations, or national security apparatus. For this very reason, the following plan will provide an overview for how information will be included, what will be discussed and what metrics will be utilized to measure and draw inference upon hacking and the differential, if any exists, between “ethical” and “unethical” hacking.
In this way, the following brief discussion has analyzed a litany of both primary and secondary texts in the attempt to provide a valid and fair overview into the issues at hand. Furthermore, by discussing and analyzing the different theoretical approaches that different authors have made, in determining ethics and/or the definitions/interpretation of hacking, the analysis has engaged in a diverse approach to the literature and sought to reflect this with respect to the representations and determinations that have been made.
In this evolved and highly digital era, cyber security is probably the most notable type of security individuals and companies ought to be concerned with. Businesses, governments, schools, banks, hospitals and virtually every modern institution that comes to mind keeps and organizes information it acquires electronically. Individuals also have a host of information stored electronically. This implies that highly sensitive information – from account and credit card numbers, to phone bills and medical records – is available to people who can decide to steal, manipulate, or share the information maliciously (Leeson & Coyne, 2005). Hacking is mostly ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Ethical v. unethical hacking Research Paper Example | Topics and Well Written Essays - 2500 words”, n.d.)
Ethical v. unethical hacking Research Paper Example | Topics and Well Written Essays - 2500 words. Retrieved from https://studentshare.org/information-technology/1648756-ethical-v-unethical-hacking
(Ethical V. Unethical Hacking Research Paper Example | Topics and Well Written Essays - 2500 Words)
Ethical V. Unethical Hacking Research Paper Example | Topics and Well Written Essays - 2500 Words. https://studentshare.org/information-technology/1648756-ethical-v-unethical-hacking.
“Ethical V. Unethical Hacking Research Paper Example | Topics and Well Written Essays - 2500 Words”, n.d. https://studentshare.org/information-technology/1648756-ethical-v-unethical-hacking.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Ethical v. unethical hacking

Ethical Hacking

...Ethical Hacking 1. Threats There have been many cyber attacks in the past that have weighed heavily on the shoulders of the victims. Three of the many examples are described here. Black Hat Crackers worked to take advantage of computer systems, and Jonathan James has been a big name among black hat crackers. He was sentenced at the age of sixteen and told the press that all he did was for fun. One instance of his great hacking is installing a backdoor into a Defense Threat Reduction Agency server and hacking sensitive information and employees’ data. In June 2005, the computer specialist, Michael Haephrati and his wife Ruth, who belonged to London, were caught sending...
5 Pages(1250 words)Research Paper

Systems Security/Ethical Hacking

...of the organization should not focus on Information technology only. Some of the sources of threats includes vandalism, sabotage, espionage, natural disasters, online frauds, phishing etc. however, cyber criminals can also compromise networks while data in transit. Some of the threats are non-ethical hacking, viruses, Trojan, malicious codes, and denial of service attacks. 1.5.1 Success Factors Critical success factors for the effective and successful application of security within Gold Star are: Complete and comprehensive security policy, security objective that aligns with Gold Star business objectives A methodology that is steady and aligns with Gold Star culture Comprehensively Visible Senior...
12 Pages(3000 words)Essay

Ethical hacking

...? 245CT: Ethical Hacking Word Count: 2,000 (8 pages) 245CT Ethical Hacking Lab Book work) Session 11 - Semester 2 Sur First Name: SID: Lab Day: Wednesday Lab Time: Lab: 11.00 – 13.00 AS236 & ASG22 This lab book constitutes 50% of your overall module mark for 245CT, so it is VERY IMPORTANT! Index 245CT: Ethical Hacking 1 1 245CT 2 Ethical Hacking 1 2 Lab Book (Coursework) 2 This lab book constitutes 50% of your overall module mark for 245CT, so it is VERY IMPORTANT! 2 Index 3 Coursework 4 Lab 2 - Essential TCP/IP tools 5 Note: Use right-click/Update Field/Update Entire Table/OK to refresh the index above...
8 Pages(2000 words)Coursework

Ethical Hacking Final Challenges

... then replace them with those which meet the required standards. It calls for us all to curb this menace of unethical behaviour and immorality in ICT. References Baase, S. (1997). A gift of fire: social, legal, and ethical issues in computing. Upper Saddle River, N.J.: Prentice Hall. Simpson, M. T. (2006). Hands on ethical hacking and network defense. Boston, MA: Thomson Course Technology. Simpson, Michael T. (2010-03-17). Hands-On Ethical Hacking and Network Defense (Pages 368 - 369). Delmar Learning. Kindle Edition.... ? ETHICAL HACKING Challenge The MD5 selected by the CA as the hashing algorithm for creating digital signatures has its own vulnerabilities. First, MD5 is unsecure given that it does not...
4 Pages(1000 words)Research Paper

Ethical Hacking

... not to compromise their systems. References Langley, N. (2005). Ethical hacking is challenging and lucrative but training is expensive. Computer Weekly, 44-44.  O'Boyle, E., J. (2002). An ethical decision-making process for computing professionals. Ethics and Information Technology,4(4), 267-267. Palmer, C. C. (2001). Ethical hacking. IBM Systems Journal, 40(3), 769-780.  Young, R., Zhang, L., & Prybutok, V. R. (2007). Hacking into the minds of hackers. Information Systems Management, 24(4), 281-287.... ? Ethical Hacking Ethical issues have been raised concerning the use of hackers to secure the network systems of companies, from other hackers with malicious intent. Some have argued that the...
5 Pages(1250 words)Research Paper

Ethical Hacking

...ETHICAL HACKING Ethical Hacking According to Raymond, the term 'Hacker' has a dual usage in the computer world. Originally, the term was defined as: HACKER noun 1.A person who enjoys learning the details of computer systems and how to stretch their capabilities-as opposed to most users of computers, who prefer to learn only the minimum amount necessary. 2. One who programs enthusiastically or who enjoys programming rather than just theorizing about programming (Raymond, 1991). From the above definition it is clear that, the original idea behind hacking has nothing malicious in its intent. According to me hacking is justified, provided...
2 Pages(500 words)Essay

Social Engineering (ethical hacking )

...Ethical Hacking – Part I Table of Contents Table of Contents Introduction 2 Literature Review 3 Analysis 5 Works Cited 8 Introduction Since its beginning in the year 1996 until today, the internet has been successful in establishing an enormous network of millions of computers across the seven continents. In addition, the internet has now not remained a single network (Erickson, pp. 23-25); however, has now become a platform of gathering different networks that allow individual computers to connect with them in a number of ways such as through dial-ups, gateways, ISPs, etc. In other words, only a computer and network connection are the two major requisites for entering into the world of internet that has...
8 Pages(2000 words)Essay

Ethical or Unethical Argument

...Ethical or Unethical Argument There are several ways of proving one’s own point when in the midst of an argument or reasoning regarding an issue. While some arguments must be backed up by supportive evidence and fact, others are a mere expression of one’s own opinion and views. However, one of the most important elements of an argument is basing your reasoning upon ethics. Unethical arguments or arguments which do not follow the course of reasoning should be avoided and should not be voiced adamantly (Vaughn, pp. 246-250). The question arises of how to distinguish between a good and ethical argument and a bad or unethical argument....
2 Pages(500 words)Essay

Ethical Hacking

...programs (as well as versions and patch levels) run on the target (IATAC, 2011, p.8). The tools then try to determine the indicators (patterns, attributes) of, or to take advantage of vulnerabilities that are in the system and to inform the administration of its findings (IATAC, 2011, p.8). Nearly all vulnerability assessment tools apply at least some intrusive “scanning” techniques that engage locating a probable vulnerability (frequently through passive scanning), then inserting either random data or fake attack data into the “interface” made or shown by that vulnerability, and then studying the results (IATAC, 2011, p.8). References Information Assurance Technology Analysis Center (IATAC). (2011). Vulnerability assessments....
2 Pages(500 words)Essay

Ethical hacking

... Press. McLaughlin, S., Podkuiko, D., Miadzvezhanka, S., Delozier, A., & McDaniel, P. (2010, December). Multi-vendor penetration testing in the advanced metering infrastructure. In Proceedings of the 26th Annual Computer Security Applications Conference (pp. 107- 116). ACM. Wilhelm, T. (2013). Professional Penetration Testing: Creating and Learning in a Hacking Lab (Vol. 1). Newnes.... [Penetration testing documentation] By Introduction The Xen show of virtual machines offered our understudies serverautonomy giving every learner control of a neighborhood arrangement and of a remarkable IP address on the "virtual" system for each one server so that people could work in groups, incorporating in separation taking in circumstances, and...
8 Pages(2000 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Research Paper on topic Ethical v. unethical hacking for FREE!

Contact Us