Preview

The Need for Ethical Hackers

Good Essays
Open Document
Open Document
711 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
The Need for Ethical Hackers
Ethical Hacking

Today’s society is solely based and dependent on computer based systems. With the advent of computer technology, we have acquired many good things like online banking, online commerce, emails etc. Along with the advancements in technology comes the relentless pursuit to prevent criminal hacking. Criminal hacking affects big business as well as the individual. The modern ethical hacker is a person who attempts to penetrate a secured computer system in effort to learn how to further protect or repair weaknesses in a company’s already secure system. “According to the Sixth Annual Enterprise IT Security Survey released Monday, 67% of large companies with 5,000 or more employees reported one successful intrusion or more this year, as opposed to 41% in 2009.” (Messmer)
Hacking is to deliberately acquire data without permission from another’s computer, computer system or network. Not every hacker has a malicious intent; this is where the ethical hacker comes into view. The hacker seems to come from every age group and all walks of life. They are no longer just the computer geek type. In my opinion, there are more malignant hackers than ethical hackers in today’s society. The maliciousness of hacking is going to become worse in future generations. The main issue is with mass production and production schedules. Everyone wants to be the first to have their new super high tech software hit the newsstands. With this come the many vulnerabilities that a speedy or badly written software produces. (Zetter and Gowan) This definitely creates some serious software security issues businesses and the individual consumer. Our government provides strict penalties for the virulent hacker; however, this does not satiate the need to break into a computer system and steal personal information, vandalize web pages or perform DOA’s (denial of service attacks). The reality is that the hacker can steal your password or account numbers from your personal computer or they

You May Also Find These Documents Helpful

  • Better Essays

    Hacker

    • 1123 Words
    • 5 Pages

    The advancement of information technology spans a lot of areas of our lives. Information technology has made a huge difference in industry, agriculture and services. This in turn boosts up the productivity of the society. However, the development of computer technology also leads to many security problems in our modern society. There has emerged a group of computer savvy people who seeks and exploits weaknesses in a computer system or computer network. Their motivation has put many questions on debating table. On the one hand, many people contend that a hacker is a dangerous person who will probably destroy the whole world’s computer system. On the other hand, others argue that hackers are not dangerous and not causing harm. This essay will discuss the two sides of the coin with regard to hackers with relevant examples.…

    • 1123 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Cyber Ethics

    • 1006 Words
    • 5 Pages

    The chapter 12 narrative by Joseph Menn, “Hackers Live by Own Code”, establishes the claim that hackers have several ways to justify their actions. In order to illustrate this claim Menn uses the example of Mary Ann Davidson. It all started when Davison, the chief security officer for Oracle Corp., received a fax from a hacker in the Middle East stating that he was able to pilfer information from corporations such as Boeing Co., Ford Motor Co. and the CIA (Lawrence Hinman, 463). It is no surprise that once Davidson was aware of this she took immediate action and contacted the hacker. However, what was surprising is that after she contacted the hacker, Davidson described him as a “nice guy” (Hinman, 463). The significance of this example is that Menn is emphasizing the point that despite public opinion hackers are just like any ordinary person.…

    • 1006 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    It530

    • 681 Words
    • 3 Pages

    1. In recent years, the concept of “ethical” hacking has grown in importance as more companies consider…

    • 681 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Hacktivism Ethics

    • 7214 Words
    • 29 Pages

    M. Manion and A. Goodrum, "Terrorism or Civil Disobedience: Toward a Hacktivist Ethic," in ACM SIGCAS, vol. 30, 2000, pp. 14-19.…

    • 7214 Words
    • 29 Pages
    Powerful Essays
  • Powerful Essays

    In presenting this project, in partial fulfillment of the requirements for graduate degree from the University of Central Arkansas, I agree that the Library of this University shall make it freely available for inspections. I further agree that permission for extensive copying for scholarly purposes may be granted by the professor who supervised my thesis work, or, in the professors absence, by the Chair of the Department or the Dean of the Graduate School. It is understood, that due recognition shall be given to me and to the University of Central Arkansas in any scholarly use which may be made of any material in my project.…

    • 5250 Words
    • 21 Pages
    Powerful Essays
  • Better Essays

    Ethical Hacking

    • 2948 Words
    • 12 Pages

    Ethical hacking also known as penetration testing or white-hat hacking, involves the same tools, tricks, and techniques that hackers use, but with one major difference that Ethical hacking is legal. Ethical hacking is performed with the target’s permission. The intent of ethical hacking is to discover vulnerabilities from a hacker’s viewpoint so systems can be better secured. Its part of an overall information risk management program that allows for ongoing security improvements. Ethical hacking can also ensure that vendors’ claims about the security of their products are legitimate.…

    • 2948 Words
    • 12 Pages
    Better Essays
  • Good Essays

    Cause Network

    • 571 Words
    • 3 Pages

    Hacking and the study of computer insecurity play an important role in the protection of assets. No computer system or network achieves perfect security; even a system switched off with its hard drive removed sunken in a lead case in the bottom of a deep pool in an underground facility lacks security, as it guarantees integrity and confidentiality but completely sacrifices availability. As a security professional, you must understand the risks a network faces; you must, in essence, know how to bring the network down, to steal the data you want, and to falsify important information. With this information, you can begin to eliminate threats, leaving only those unknown to you and those that pose little to no real risk.…

    • 571 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    I found that Steven Levy makes some very bold claims. I will address those in next week’s Journal. This week, he mentions a long list of people and computers that ends up reading like a computing industry “Hall of Fame.” Many of these have contributed greatly to the way our computers work, how small and how powerful they have become.…

    • 2040 Words
    • 9 Pages
    Powerful Essays
  • Powerful Essays

    Ethical Hacking

    • 1100 Words
    • 5 Pages

    “If you know yourself but not the enemy, for every victory gained, you will suffer defeat.” “If you know the enemy and know yourself, you need not fear the result of a hundred battles.”…

    • 1100 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    Ethical Hacking

    • 3757 Words
    • 24 Pages

    Av. Dr. Carlos Bacelar, 968 – Escr. 1 – A – 4764-901 V. N. Famalicão…

    • 3757 Words
    • 24 Pages
    Powerful Essays
  • Powerful Essays

    Ethical Hacking

    • 1563 Words
    • 7 Pages

    Lesson 1: Introduction to Ethical Hacking | Problem Definition -Why Security? Essential Terminologies Elements of Security The Security, Functionality and Ease of se Triangle Case Study What does a Malicious Hacker do? Types of Hacker Attacks Hacktivism Hacker Classes Security News - Suicide Hacker Ethical Hacker Classes What do Ethical Hackers…

    • 1563 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Hacking

    • 1006 Words
    • 5 Pages

    Since a large number of hackers are self-taught prodigies, some corporations actually employ computer hackers as part of their technical support staff. These individuals use their skills to find flaws in the company’s security system so that they can be repaired quickly. In many cases, this type of computer hacking helps prevent identity theft and other serious computer-related crimes.…

    • 1006 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    ETHICAL HACKING

    • 263 Words
    • 5 Pages

    ETHICAL HACKING WORKSHOP PRESENTED BY mail us @ techhackiter@soauniversity.ac.in soa.techhackclub@gmail.com WARNING ALL INFORMATION PROVIDED IS ONLY FOR EDUCATIONAL PURPOSE. USE IT AT YOUR OWN RISK . WHO AM I ?? SUMIT LAKRA CISE(Certified Information Security Expert) Mob. No.:+919778178861 E-Mail: edvindeddy@gmail.com : fb.com/aexle : #Sumit_Lakra WHY IS SECURITY NEEDED? WHAT IS ETHICAL HACKING? HACKERS TERMS • Hacking - showing computer expertise • Cracking - breaching security on software or systems • Phreaking -…

    • 263 Words
    • 5 Pages
    Satisfactory Essays
  • Powerful Essays

    Manufacturing Audit Risk

    • 1585 Words
    • 7 Pages

    As Information Systems become more complex and business organizations become better prepared at protecting these systems so has the means in which attacks on these systems evolved. Many new issues have emerged and are changing the way in which or world views hackers and the chaos that these individuals can cause. The purpose of this section is to discuss some of the most visual and controversial of these issues. Finding solutions to avoid these attacks are what drives the need for security and security systems to constantly evolve and adapt to new threats and avoid being overrun and or shut down due to malicious actions of hackers who only wish…

    • 1585 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    Computer Fraud Act Of 1984

    • 2247 Words
    • 9 Pages

    Due to the advance technology of the Internet, the government, private industry and the everyday computer user have fears of their data or private information being comprised by a criminal hacker. C.C. Palmer, who manages the Network Security and Cryptography department at the IBM. Thomas J. Watson Research Center writes, “They are afraid that some hacker will break into their Web server and replace their logo with pornography, read their e-mail, steal their credit card number from an on-line shopping site, or implant software that will secretly transmit their organization’s secrets to the open Internet”. This hacking is not only widespread, but is being executed so flawlessly that the attackers compromise a system, steal everything…

    • 2247 Words
    • 9 Pages
    Powerful Essays