StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Can Gray Hacking Be Justified - Research Paper Example

Cite this document
Summary
This essay deals with the issue of a criminal activity, namely, hacking or cracking. This paper has also articulated Ethical Hacking from numerous perspectives, emphasizing that Ethical Hacking is not a solution for all network security problems. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.2% of users find it useful
Can Gray Hacking Be Justified
Read Text Preview

Extract of sample "Can Gray Hacking Be Justified"

?Can Gray Hacking be Justified? Institute Synopsis Organizations and other organs are encumbered with the inevitable responsibility of attempting to protect their systems and networks against numerous kinds of intrusive attacks. However, conventional techniques of deterrence, including intrusion detection to use tools, firewalls have their place in this war. There has occur the need professionals who are adept at take advantage of both the security bearing of an institution. These Ethical Hackers have a made a niche for themselves in the Defense in Depth continuum. There is not person, assemblage or institution, which is shielded against from probable attacks, and each may provide something of essential worth to establish criminal cracker. Originally, it must stressed that skills, which an Ethical Hacker may have power over, could be used in any situation where information is stored, exchanged or dispersed. Penetration trials then become more humdrum in business, government, commerce and in public/private sector. The primary element is to acknowledge that the Ethical Hacker may very well be helpful a more exhaustive landscape and susceptibilities in any scenery. In essence, what the Ethical Hacker engages in is done in synchronized. As a result, this assists to elucidate what issues a group or institution may be facing currently. Patrons of the Ethical are usually made aware of the present issues; this enables them to create a strategy for tackling not only the existing problems, but also they can create a strategy of attack for addressing future ones. Finally, the superlative for the Ethical Hacker is to be a provider to the organ of knowledge of network security (Harper, 2011). Hacking or cracking as it is known in some cliques, has become tantamount to this new gang of criminal activity, thus to be branded a hacker is better known in today’s community as being a cynical terminology. This was, nevertheless, not always the case, as it is originally reputed to be mark of reverence bestowed upon the one who exuded a high standard of professionalism about numerous computer-based themes. Unfavorable media publicity unfortunately tilted this perception blurred the line between one who was simply an intellectual seeker of computer knowledge and one who uses this understanding for criminal or selfish gains. Known as the ethical hacker, these persons are perceived almost as a mystery. The interconnectedness of the term ethical with hacking is known as being oxymoron, parallel to calling someone a frank offender. It would seem as although Ethical Hackers, however; may have established a place in our canon of defenses of network assets and that they are here to stay. The wagers today are much advanced and the playing ground encompasses every element of our society: be it be commerce and industry, national security, educational entities, and public/private organizations. The domain of the ethical hacker will grown into all these grounds and the insight derived from skills will have to be integrated into the organ of statistical and practical understanding utilized appropriately to shield informational assets(Harper et al, 2011). According to Harper et al (2011), the ideal for the Ethical Hacker is to be a contributor to the organ of knowledge of network security. With this in their mindset, it is essential that these persons follow a systematic tactic, in approaching their relevant network attacks. The concept of breaking into a customer’s network further must be regarded in light of the ultimate objective of mending it. Here, the Ethical Hacker is presented not one who is self-seeking, rather they must be perceived as being another spoke in the Defense in-Depth plan. The concept of utilitarianism that was initially devised by Jeremy Bethman in the eighteenth century, later to be fully developed by John Stewart Mill in the nineteenth century states that we should at all times act so as to create the greatest ratio of good to evil for everyone concerned with our choices. Utilitarianism with regard to many ethical hypotheses has many strengths and weaknesses. The main strong point for this hypothesis is that it is at all times seeking for the maximum good for the utmost number. This is an excellent strength. Since its a network strives to maximize pleasure for the greatest number. This is a reassurance that many will always benefit. The major weak point of utilitarianism is that it is highly hard to project the outcome of action. The results of all conditions are difficult to estimate, so how can we probably apply the imperative of the most happiness for the greatest number if we do not understand who will benefit the greatest every time is still a questions that begs for answers (Mill, 2007) Gray hat defines a cracker or as it is well understand, hacker who uses a security weakness in a computer system or product for them to show the weakness to the attention of the owners. Unlike a gray hat, a black hat acts without spiteful intention. The objective of a gray is to advance the network and security network. By exposing the susceptibility, the gray hat, however, may offer other hackers the chance to exploit it. This is different from the white who notifies system owners and merchants of the susceptibility with apparently exploiting it in public (Lemos, 2002). Conclusion This paper has articulated Ethical Hacking from numerous perspectives. Ethical Hacking is not a solution for all network security problems; however, it is an interesting tool that can be utilized to strengthen the Defense in Depth-standard. Each attack paradigm has a distinct context or essential hypothesis. In conclusion, it must be stressed that the Ethical Cracker is an educator who strives to inform not only the patrons, but also the security industry as a whole. Thus the security society must consolidate their efforts to prevent the opponents of our security network systems (Harper, 2011). References Harper. A., Harris.S., Ness. J., Eagle.C., Lenkey.G., T.W. (2011). Gray Hat Hacking the Ethical Handbook. New Jersey: McGraw Hill. Lemos. R. (2002, September 23). “The Thin Gray Line.” Retrieved from http://news.cnet.com/2009-1001_3-958129.html Mill. S.J. (2007). Utilitarianism. New York, NY: Oxford University Press. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Can Gray Hacking Be Justified Research Paper Example | Topics and Well Written Essays - 1000 words”, n.d.)
Retrieved from https://studentshare.org/law/1470785-can-gray-hacking-be-justified
(Can Gray Hacking Be Justified Research Paper Example | Topics and Well Written Essays - 1000 Words)
https://studentshare.org/law/1470785-can-gray-hacking-be-justified.
“Can Gray Hacking Be Justified Research Paper Example | Topics and Well Written Essays - 1000 Words”, n.d. https://studentshare.org/law/1470785-can-gray-hacking-be-justified.
  • Cited: 0 times

CHECK THESE SAMPLES OF Can Gray Hacking Be Justified

Gran Torino and Race Relations and Ethics

So, in a sense, what Walt ended up doing at the end of the movie was extremely justified.... hellip; The movie can teach people about how to act ethically in the face of difficult circumstances.... What happens to our brother or our sister is what happens to us, and we have to make sure that we do everything that we can to help those who are oppressed....
4 Pages (1000 words) Essay

Accounting Standards at Bank of China

This paper is based on the 2005 annual report of the Bank of China (BOC), the oldest and second biggest bank in the People's Republic of China.... The first part is a critical discussion of the institutional, external, and cultural influences on the bank's financial reporting systems.... hellip; The PROC (hereafter China) has been undergoing a transformation when the Communist Party decided to open up the country's economy to the world in 1978....
11 Pages (2750 words) Essay

Media Impact on People's Thoughts

Selective reporting, biased reporting, or the manner in which certain issues are highlighted while others are glossed over can elevate or diminish the significance of an issue in the mind of the public.... The reporter states that the media comprises many sources of information that is available to the public through a variety of sources including radio, television, books and the Internet....
8 Pages (2000 words) Essay

Support same-sex marriage or not support

The infamous debate of whether to allow or not to allow same sex marriages cannot be put to rest just yet, given the complexities that surround this question.... In the contemporary times, changing attitudes and world views have yielded varied opinions on this debate; some groups… The two main opposing forces that have conventionally expressed support and opposition for same sex marriages emanate from the secular political Interestingly, both sides have yielded substantively convincing reasons and justifications for their varied opinions and standpoints on this topic....
4 Pages (1000 words) Essay

Rana Plaza Factory Collapse

On April 24, 2013, Rana Plaza factory, situated in Savar District of Dhaka, Bangladesh, collapsed for unknown reasons, killing more than 1,021 factory workers in which bodies of many dead workers were decomposed; the main reason behind the higher death toll was caused by the presence of many factories in the Rana Plaza at the time of collapse; similarly, the absence of respect for human lives can be gauged by the fact that the same building was evacuated a few days as some reports highlighted cracks in the building; later on, the factory workers were ordered by the factory owners to return to their work (BBC News Asia, 2013)....
8 Pages (2000 words) Case Study

Why Businesses Should Act Ethically

The paper "Why Businesses Should Act Ethically" discusses that if unethical acts by executives of corporations are generally expected and widely tolerated by society, then this type of behavior can be easier justified by someone that has the opportunity to benefit from their unethical actions.... hellip; It is quite essential to state that leadership is the key to ethical behavioral successes in corporations and though no tactic can assure this outcome based on any defined timeline, a proactive solution such as this will create ever-narrowing parameters for corporate ethical practices (Bataille, 2003)....
9 Pages (2250 words) Assignment

Computer Crimes and Digital Investigations

he issues of computer crime have become high-status, especially those involving identity stealing, hacking, copyright infringement from child pornography, and child grooming (Duggal, “CyberCrime”).... nbsp; Unfortunately, like all previous inventions of mankind, Internet technology can be used for both good and evil purposes, that is, the internet has is both, bane and boon.... This offence can be pursued by further criminal actions which can lead to punishments....
12 Pages (3000 words) Essay

Management of Student Whose Standard of Practice are of Cause for Concern

The writer of this research will critically explore the management of a student or a learner whose standard of practice is of cause for concern.... Specifically, the paper focuses on describing the practice of mentoring as a decisive tool for such management.... hellip; Mentorship is a relationship between a person being mentored (mentee) and the person mentoring (mentor)....
10 Pages (2500 words) Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us