StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Managerial Applications of Technology (Ethical Hacking)2 - Assignment Example

Comments (0) Cite this document
Summary
As their description goes, ethical hackers are hackers who comply with the expectations of an organization, thus cannot breach their operation codes (Hafelee, 2004). This means that their actions can be ethical and still effective in that they secure an organization’s IT…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER92% of users find it useful
Managerial Applications of Technology (Ethical Hacking)2
Read TextPreview

Extract of sample "Managerial Applications of Technology (Ethical Hacking)2"

Managerial Applications of Technology (Ethical Hacking) As their goes, ethical hackers are hackers who comply with the expectations of an organization, thus cannot breach their operation codes (Hafelee, 2004). This means that their actions can be ethical and still effective in that they secure an organization’s IT system by detecting their faults and strengthening them. In securing their information systems, managers have to consider factors such as the sensitivity of the information (say like employees’ private data), who the information is being revealed to (the hacker), the potential reactions that may result if the information leaks, and finally the credibility of the parties entrusted with the provision of security. Hiring ethical hackers has some advantages such as one, a hacker will apply all their knowledge in succeeding to bypass the implemented security systems and upon succeeding, and the faults in the systems are discovered and secured. Again, it is safer to have a hacker working for an organization than against it (Saleem, 2006). This is so because in the second scenario, there are more chances of the organization being trespassed.
On the contrary, hiring ethical workers may be detrimental in that say in a banking institution, a hacker may discover a fault which they can use to get more money than they earn, and betray the organization by stealing from it. This means that in the event that an ethical worker ignores the ethics, then the organization’s information is placed at risks (Conran, 2014). However, despite all this, it is important that management hires ethical hackers to verify the security of their systems since this protects them from malicious (black) hackers. The ethical hackers should be vetted for their ethical backgrounds, or be acquired from credible organizations.
References
Conran, B. (2014). “Why Not to Hire an Ethical Hacker.” Security Magazine. Retrieved on 21 July, 2014 from http://www.securitymagazine.com/articles/85263-why-not-to-hire-an-ethical-hacker
Hafelee, D. (2004). “Three Different Shades of Ethical Hacking: Black, White and Gray.” SANS Institute. 1-24.
Saleem, S. (2006). “Ethical Hacking as a Risk Management Technique.” Argosy University Library. 201-203. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Managerial Applications of Technology (Ethical Hacking)2 Assignment”, n.d.)
Managerial Applications of Technology (Ethical Hacking)2 Assignment. Retrieved from https://studentshare.org/management/1653208-managerial-applications-of-technology-ethical-hacking2
(Managerial Applications of Technology (Ethical Hacking)2 Assignment)
Managerial Applications of Technology (Ethical Hacking)2 Assignment. https://studentshare.org/management/1653208-managerial-applications-of-technology-ethical-hacking2.
“Managerial Applications of Technology (Ethical Hacking)2 Assignment”, n.d. https://studentshare.org/management/1653208-managerial-applications-of-technology-ethical-hacking2.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Managerial Applications of Technology (Ethical Hacking)2

Ethical Hacking

...Ethical Hacking 1. Threats There have been many cyber attacks in the past that have weighed heavily on the shoulders of the victims. Three of the many examples are described here. Black Hat Crackers worked to take advantage of computer systems, and Jonathan James has been a big name among black hat crackers. He was sentenced at the age of sixteen and told the press that all he did was for fun. One instance of his great hacking is installing a backdoor into a Defense Threat Reduction Agency server and hacking sensitive information and employees’ data. In June 2005, the computer specialist, Michael Haephrati and his wife Ruth, who belonged to London, were caught sending...
5 Pages(1250 words)Research Paper

Ethical hacking

...? 245CT: Ethical Hacking Word Count: 2,000 (8 pages) 245CT Ethical Hacking Lab Book work) Session 11 - Semester 2 Sur First Name: SID: Lab Day: Wednesday Lab Time: Lab: 11.00 – 13.00 AS236 & ASG22 This lab book constitutes 50% of your overall module mark for 245CT, so it is VERY IMPORTANT! Index 245CT: Ethical Hacking 1 1 245CT 2 Ethical Hacking 1 2 Lab Book (Coursework) 2 This lab book constitutes 50% of your overall module mark for 245CT, so it is VERY IMPORTANT! 2 Index 3 Coursework 4 Lab 2 - Essential...
8 Pages(2000 words)Coursework

Managerial Applications of Technology - Final

...? Organizational Transformation and IT Applications Question You are an internal consultant assigned to support the IT department within a largefortune 500 company. The company has been struggling over the past several years and has recently embarked on a massive restructuring of the organization and the supporting technologies. What are some factors that you will need to consider in regard to IT adoption? What process will you follow in regard to adopting new technologies to support the restructured organization and what are the influencing factors that you must consider? Answer 1: Information Technology has become an integral part of activities that should be...
7 Pages(1750 words)Case Study

Ethical Hacking

... not to compromise their systems. References Langley, N. (2005). Ethical hacking is challenging and lucrative but training is expensive. Computer Weekly, 44-44.  O'Boyle, E., J. (2002). An ethical decision-making process for computing professionals. Ethics and Information Technology,4(4), 267-267. Palmer, C. C. (2001). Ethical hacking. IBM Systems Journal, 40(3), 769-780.  Young, R., Zhang, L., & Prybutok, V. R. (2007). Hacking into the minds of hackers. Information Systems Management, 24(4), 281-287.... ? Ethical Hacking Ethical issues have been raised concerning the use of hackers to secure the network systems of companies, from other hackers with malicious intent. Some have argued that the...
5 Pages(1250 words)Research Paper

Ethical Hacking

...ETHICAL HACKING Ethical Hacking According to Raymond, the term 'Hacker' has a dual usage in the computer world. Originally, the term was defined as: HACKER noun 1.A person who enjoys learning the details of computer systems and how to stretch their capabilities-as opposed to most users of computers, who prefer to learn only the minimum amount necessary. 2. One who programs enthusiastically or who enjoys programming rather than just theorizing about programming (Raymond, 1991). From the above definition it is clear that, the original idea behind hacking has nothing malicious in its intent. According to me hacking is...
2 Pages(500 words)Essay

Ethical Hacking

...programs (as well as versions and patch levels) run on the target (IATAC, 2011, p.8). The tools then try to determine the indicators (patterns, attributes) of, or to take advantage of vulnerabilities that are in the system and to inform the administration of its findings (IATAC, 2011, p.8). Nearly all vulnerability assessment tools apply at least some intrusive “scanning” techniques that engage locating a probable vulnerability (frequently through passive scanning), then inserting either random data or fake attack data into the “interface” made or shown by that vulnerability, and then studying the results (IATAC, 2011, p.8). References Information Assurance Technology Analysis Center (IATAC). (2011). Vulnerability...
2 Pages(500 words)Essay

Ethical hacking

... Press. McLaughlin, S., Podkuiko, D., Miadzvezhanka, S., Delozier, A., & McDaniel, P. (2010, December). Multi-vendor penetration testing in the advanced metering infrastructure. In Proceedings of the 26th Annual Computer Security Applications Conference (pp. 107- 116). ACM. Wilhelm, T. (2013). Professional Penetration Testing: Creating and Learning in a Hacking Lab (Vol. 1). Newnes.... : (1) giving mysql and ACID to help people examine the information caught, (2) having Snort sent email cautions in regards to specific sorts of endeavors, and (3) firewall setup utilizing iptables. The accomplishment of this methodology urged us to take a gander at applying this engineering to the educating of machine systems...
8 Pages(2000 words)Essay

Managerial Applications of Technology introducton 2

... have their offices at the reception. Additionally, the company has provided a friendly working environment. The company premises is maintained and continuously improved by a supportive workforce (Sounderpandian, 2007). References Boar, B. H. (2002). The Art of Strategic Planning for Information Technology. John Wiley & Sons. Sounderpandian, J. (2007). E-business Process Management: Technologies and Solutions. Idea Group Inc (IGI). Steiner, G. A. (2010). Strategic Planning. Simon and Schuster,.... STRATEGIC PLAN The operations manager in the organization has a role of ensuring the company has achieved its goals and expectations. Finding time to prepare the best IT strategic plans will result to the company achieving massive profits. It is the...
1 Pages(250 words)Assignment

Managerial Applications of Technology (Virtual Workforce) 2

...MANAGEMENT OF VIRTUAL WORKFORCE Management of virtual workforce There are a number of ways through which technology has influenced the utilization of remote workers. Through technology, organizations can be able to monitor the contribution and progress of remote employees. For instance, a business organization can choose to use an online portal where a remote worker’s job progress can be reviewed. Technology also helps in connecting the organization to their virtual worker for proper communication. This enables the virtual workers and those available physically to be able to work as a single unit (Hill, Ferris & Märtinson, 2003). Technology is also the backbone of virtual...
1 Pages(250 words)Assignment

Managerial Applications of Technology (Emerging IT Trends) 2

...Managerial Applications of Technology (Emerging Trends) The 21st century has seen technology go viral, and has become an integral part of every aspect of human living including the business, health, and social. In short, information technology is a mandatory part of life. In the business context, information technology is largely applied in different sectors such as production, management, marketing, supplies, and so on. In the contemporary age, most businesses are going online, that is, establishing online shops (websites), interacting with online clients, conducting online marketing, and conducting online transactions as well (High,...
1 Pages(250 words)Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Assignment on topic Managerial Applications of Technology (Ethical Hacking)2 for FREE!

Contact Us