Thursday, May 14, 2020

Hacking Can Not Be Ethical - 1681 Words

Hacking cannot be considered ethical due to the fact that it damages a company s reputation. Hackers have no care in the world about the negatives that happen to you. They may not have anything against you but what you stand for. Erickson was the owner of a website known for political debates was hacked and his page on which he spent thousands of dollars on was hacked by Anonymous and became malicious. â€Å"Erickson spent $1,500 to rebuild his site with enhanced security measures. He also spent a considerable amount of time with Google’s appeals process to get his site relisted-- a process that took 3 months.† (KAVILANZ, PARIJA. Hacked by Anonymous. CNNMoney. Cable News Network, 29 May 2013. Web. 20 Mar. 2015.) When you are targeted by cyber terrorists they don t aim to just make a statement. They are there to hurt you. They demoralize the things you treasure and make all your prized possessions worthless. To build a website is not a cheap and easy process. Without pri or knowledge of web development you need to hire a web developer in order to do the work for you which can in turn cost you thousands of dollars. Erickson then had to rehire web devs and network analysts to get his entire web page restructured with better security. No one can say for sure who will be next. Many of these attacks can be very random and seemingly pointless, however, these hacker groups are still out there in the world doing what they seem to do best. Anonymous as you can note is one of the topShow MoreRelatedEthical Ethics And Ethical Hacking968 Words   |  4 Pagesdevelopment and issue is ethical hacking. To understand ethical hacking one must be able to define what it means to be a hacker. â€Å"A hacker is an individual who intends to gain unauthorized access to a computer system† (Laudon Traver, 2015). Oxford Dictionaries defines an ethical hacker as â€Å"a person who hacks into a computer network in order to test or evaluate its security, rather than with malicious or criminal intent† (Ethical Hacker, n.d.). In other words, an ethical hacker aims to discover ifRead MoreHacking And Its Effect On Human Behavior Essay1608 Words   |  7 PagesHacking in computer networking is the desire to manipulate the normal behaviour of a network connection or a connected system, a hacker is the person who is instigating the hack. In today’s society, we generally refer to any malicious programming attack over the internet or a network to be hacking. Hacking originated between the 1950s and 60s by M.I.T engineers, they originally were meant for learning and experiment purposes and usually took place at the ‘model train club’. However, these attacksRead MoreCybercrime And Internet Hacking And Its Effect On The Security Of The Internet1386 Words   |  6 Pagesinternet hacking has been an ongoing issue in contemporary life. â€Å"Internet hacking is the practice of modifying or altering computer software and hardware t o accomplish a goal considered to be outside of the creator’s original objective.† (Merriam-Webster). Any individual, business, or even government with a computer is not safe from these computer criminals. So, the main question is: How do we fix this cybercrime that does millions of dollars in damage, and should we implement â€Å"ethical hacking† to improveRead MoreEthical Hacking1028 Words   |  5 Pagesinformation systems; it seems that the Ethical Hacking is a better way. Therefore, whether to teach or not teach the Ethical Hacking as a course in Tertiary education has become an interesting argument. In this article will analysis the ethical, legal, and ethical implications of this issue. In order to discuss the ethical, legal, and social implications of this issue, one has to understand the definition of Ethical Hacking. The Word Spy states that Ethical hacking is a computer hacker who attemptsRead MoreEthics : Ethical Hacking Gaining Access1695 Words   |  7 PagesEthical Hacking Gaining Access Name Institution Ethical Hacking Gaining Access Introduction Ethical hacking is the testing of access to a system, also known as white hacking. The process entails similar tools, methods, and techniques that most hackers employ though with a legal aspect to it. The goal of hacking is done with the permission of the intended target with a goal to show varied areas of weaknesses from the hacker’s perspective. It is part of information risk management allowingRead MoreEssay on Ethical Computer Hacking972 Words   |  4 Pagescertain virus someone else is writing, or safeguarding a local banks network to make sure that virus cannot access the banks database. Hacking can be ethical by providing the Internet world with a tightened sense of security by detecting and preventing security flaws before it is too late. There are a many types of hacks, and hackers in the cyber world. A hack can be any modification done to virtually anything, to make it do something better, or something completely different. Many hackers are hackersRead MoreEthical Hacking : A Breach Of Security1457 Words   |  6 Pagesthe company been able to find the vulnerabilities in the network. This is where ethical hacking comes into the program. Before delving into ethical hacking we must first understand what hacking really is. As defined by dictionary.com hacking means to modify a computer program or electronic device in a skillful or clever way: or to break into a network, computer, file, etc., usually with malicious intent.[1] Hacking is performed by a person or group of people know as hackers. In the computer securityRead MoreLab 2 Performing A Vulnerability Assessment Worksheet Essay648 Words   |  3 Pagesis a graphical interface for Nmap, a port scanning tool that can quickly identify hosts and detect what operating system and services are running on them, and all without privileged access. Zenmap, and similar tools, are typically used during the scanning and vulnerability phase of the ethicalcan hacking process. 2. Which application be used to perform a vulnerability assessment scan in the reconnaissance phase of the ethical hacking process? . OpenVAS (Greenbone Security Assistant). VulnerabilityRead MoreUsing The Command, Arp -s1543 Words   |  7 Pageswe can add entries to this list by using the command , arp –s . In cases , where your network configuration does not change often, it is entirely feasible to make a listing of static ARP entries deploy them to clients via an automated script. This will ensure that devices will always rely on their local ARP cache rather than , relying on ARP requests replies . Monitoring ARP Traffic with a Third Party Program :- The last option for defending against ARP cache poisoning , is a reactive approachRead MoreNetwork Infrastructure Attacks Against Network Infrastructures Essay1227 Words   |  5 Pagesvulnerabilities simultaneously can prove to be dangerous for computer system. Non technical attack: Exploits that involve manipulating people- end users and even yourself are the greatest vulnerability within any computer or network infrastructure. Humans are trusting by nature, which can lead to social engineering exploits. Social engineering is defined as the exploitation of the trusting nature of human beings to gain information for malicious purposes. There is an example of hacking which is physical. For

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.