StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Exploring The Dark Side. Review of hacker sites - Essay Example

Cite this document
Summary
Within the context of a network interconnected world where sensitive corporate data is stored, thereby potentially accessibly, on servers linked to the World Wide Web, security issues are a real and critical concern. Indeed, when questioning my immediate supervisor/manager on the reasons why the company did not open an e-commerce front, the response was "security concerns." There is a belief, at least as expressed my both my manager and several work colleagues, that data stored on servers is potentially accessible by hackers, with the implication being that establishing an e-commerce front would render the company highly vulnerable to what Schwartau (1994) termed Level Two Attacks…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91% of users find it useful
Exploring The Dark Side. Review of hacker sites
Read Text Preview

Extract of sample "Exploring The Dark Side. Review of hacker sites"

Download file to see previous pages

Indeed, as Gold (2001) argues, there is an overriding tendency to perceive of all hackers as intent on the accessing otherwise private information for the purpose of criminal use and profit. Certainly, a not insignificant percentage of hacks into corporate databases is motivated by precisely such an intent but an equally significant percentage is motivated by the intent to expose security flaws. The intent to expose, as Gold (2001) contends, is not accompanied by an underlying criminal or financial motivation but simply by the determination to prove that the security systems which companies have invested large amounts of money in are, indeed, flawed and easily penetrated by professional hackers.

Interestingly, the four sites mentioned appear to evidence Gold's (2001) argument. The technical information provided in these sites can be interpreted as hacking guidance information but, more significantly, it directs attention to existent security flaws and data vulnerability. In its announcement of a four-day hacker conference, the Cult of the Dead cow effectively evidences that hackers have a constructive role to play in the securitization of information. For example, the mentioned conference announcement is accompanied by a call for papers on network penetration, malware generation and, importantly, network security.

The implication here is that hackers are actively involved in the study of network security flaws, aspects of network vulnerability and information warfare strategies, as based on existent flawed security and suggest strategies for the resolution of these weaknesses and vulnerabilities. As may have been deduced from the preceding paragraph, Cult of the Dead Cow may be perceived of as a positive contribution to information assurance and the fact that this statement may be extended to embrace professional hacker communities per se, is established through a review of I Hack Stuff.

The latter site is extremely informative because it establishes the extent to which data and networks are vulnerable by illustrating how supposedly sensitive and extremely secure information, such as administrator login information, customer lists and websites' member databases, including passwords, may all be accessed through a google search. I Hack Stuff provides a long list of the google search terms that one needs to enter in order to access this information and upon experimenting with it, I discovered that the information is valid.

Certainly, the information which I Hack Stuff provides may be interpreted as an immediate and intolerable ethical violation insofar as it directs novices, or experimenters, towards the location of information which allows for the successful hacking of supposedly secure websites. Taken from another perspective, however, such information may be interpreted as a constructive contribution to data and information assurance. It exposes security flaws and

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Exploring The Dark Side. Review of hacker sites Essay”, n.d.)
Exploring The Dark Side. Review of hacker sites Essay. Retrieved from https://studentshare.org/miscellaneous/1521348-exploring-the-dark-side-review-of-hacker-sites
(Exploring The Dark Side. Review of Hacker Sites Essay)
Exploring The Dark Side. Review of Hacker Sites Essay. https://studentshare.org/miscellaneous/1521348-exploring-the-dark-side-review-of-hacker-sites.
“Exploring The Dark Side. Review of Hacker Sites Essay”, n.d. https://studentshare.org/miscellaneous/1521348-exploring-the-dark-side-review-of-hacker-sites.
  • Cited: 0 times

CHECK THESE SAMPLES OF Exploring The Dark Side. Review of hacker sites

Thinking Like a Hacker to Protect Your Network

This literature review "Thinking Like a hacker to Protect Your Network" presents the advancement of information technology that has brought forth the evolution of the types of threats and methods of attack used to penetrate an organization's private network.... The sure way to best ensure network security is by using the viewpoint of a hacker.... In order to better identify the system's weakness and be able to create effective defense mechanisms against hacking is by viewing the system from a hacker's perspective....
8 Pages (2000 words) Literature review

Enron and the Dark Side of Shareholder Value

The author of this literature review "Enron and the dark side of Shareholder Value" comments on the business failure of Enron.... As the text has it, besides having been marked by the terrorist attacks of September 11, 2001, was also the year that broke one of the largest corporate scandals....
6 Pages (1500 words) Literature review

The Dark Continent by Mark Mazower

As a sweeping overview of the most significant events that happened in European history in the 20th century, Mark Mazower's the dark Continent has made a mark in contextualizing the societal and political triumphs and upheavals that the world has known about the continent that is now.... As evidenced through the circumstantial hypocrisies and even ignorance to numerous bodies rotting in the European soil is to actually justify any similar action in the future and to side with the most radical of Machiavellisms (Vladanovi, 2005)....
4 Pages (1000 words) Book Report/Review

A Review of the Movie The Dark Knight Rises

The paper "A review of the Movie The Dark Knight Rises " discusses that the reviewer is speaking to a broad audience of film-goers....   This is a review of the movie the Dark Knight Rises by a critic from the British newspaper the Telegraph.... review communicates the ideas behind the movie and the manner in which the reviewer is evaluating it.... Generally, the review discusses the plot and theme of the movie.... The review evaluates the movie as an excellent and entertaining film....
1 Pages (250 words) Movie Review

Analysis of Taxi to the Dark Side Documentary by Alex Gibney

The paper "Analysis of Taxi to the dark side Documentary by Alex Gibney" discusses that 'conflict' is the underlying theme in Alex Gibney's 'Taxi to the dark side' and the main inspiration for his film was drawn from the article written by Tim Golden, a New York Times Reporter.... hellip; Alex Gibney's 'Taxi to the dark side' really comprises of the whole torture scenario that is shrouded in the homicide of an innocent rural man Dilawar who had saved money to buy a taxi of his own....
6 Pages (1500 words) Movie Review

SITE INVESTIGATION

As part of the Birmingham “Big City Plan”, our organization has worked on the site investigation of the City Centre Gardens area located at the rear of Birmingham Repertory Theatre and New Library of Birmingham, and fronting Cambridge Street and Brindley Drive.... This… The identification of this area includes purposes for new residential development in Birmingham and expansion of existing infrastructure to support the increased population....
8 Pages (2000 words) Book Report/Review

Dark side of Technology video

Michio Kaku is a futurist who specializes on theoretical physics and in his video ‘the dark side of Technology', he looks at the pitfalls that come with the development of technology.... This is another area where Michio Kaku cites as a pitfall of the dark side of Technology Video Clip Review the dark side of Technology Video Clip Review Michio Kaku is a futurist who specializes on theoretical physics and in his video ‘the dark side of Technology', he looks at the pitfalls that come with the development of technology....
2 Pages (500 words) Movie Review

Hacking and Hackers

A hacker is a person who makes use of advanced programming skills and techniques to break illegally into any specific computer system in order to expose the security flaws (Ciampa, 2009).... This paper "Hacking and Hackers" gives a brief description of network hacking techniques, various types of biometrics that can be integrated into the network security features, and the recent trends in network security involving biometrics for battling the attacks of the network hackers....
8 Pages (2000 words) Literature review
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us