Saturday, May 23, 2020

Ethical Hacking A Breach Of Security - 1457 Words

Every day in the news we hear or read about another company that has had a breach of security in their network. These breaches lead to large amounts of stolen or compromised information as well as the loss of services within that company. In many of these cases the breach could probably been prevented had the company been able to find the vulnerabilities in the network. This is where ethical hacking comes into the program. Before delving into ethical hacking we must first understand what hacking really is. As defined by dictionary.com hacking means to modify a computer program or electronic device in a skillful or clever way: or to break into a network, computer, file, etc., usually with malicious intent.[1] Hacking is performed by a person or group of people know as hackers. In the computer security context, a hacker is someone who seeks and exploits weaknesses in a computer system or computer network. Hackers may be motivated by a multitude of reasons, such as profit, protest, challenge, enjoyment, or to evaluate those weaknesses to assist in removing them. The subculture that has evolved around hackers is often referred to as the computer underground and is now a known community.[2] There are several variations of hackers and all of them are referred to by a color of hat. We will start with the â€Å"White Hat†. These are generally the ethical hackers someone who for non-malicious reasons will break into their own security system for testing purposes. This classificationShow MoreRelatedEthical Ethics And Ethical Hacking968 Words   |  4 Pagesdevelopment and issue is ethical hacking. To understand ethical hacking one must be able to define what it means to be a hacker. â€Å"A hacker is an individual who intends to gain unauthorized access to a computer system† (Laudon Traver, 2015). Oxford Dictionaries defines an ethical hacker as â€Å"a person who hacks into a computer network in order to test or evaluate its security, rather than with malicious or criminal intent† (Ethical Hacker, n.d.). In other words, an ethical hacker aims to discover ifRead MoreHacking And Its Effect On Human Behavior Essay1608 Words   |  7 PagesHacking in com puter networking is the desire to manipulate the normal behaviour of a network connection or a connected system, a hacker is the person who is instigating the hack. In today’s society, we generally refer to any malicious programming attack over the internet or a network to be hacking. Hacking originated between the 1950s and 60s by M.I.T engineers, they originally were meant for learning and experiment purposes and usually took place at the ‘model train club’. However, these attacksRead MoreHacking Can Not Be Ethical1681 Words   |  7 PagesHacking cannot be considered ethical due to the fact that it damages a company s reputation. Hackers have no care in the world about the negatives that happen to you. They may not have anything against you but what you stand for. Erickson was the owner of a website known for political debates was hacked and his page on which he spent thousands of dollars on was hacked by Anonymous and became malicious. â€Å"Erickson spent $1,500 to rebuild his site with enhanced security measures. He also spent a considerableRead MoreHacking Is The Responsibility Of The Computer System920 Words   |  4 Pagessystem to provide adequate security to keep hackers at bay are completely wrong. Neither their argument nor their perspective holds ground. Before we look into the reasons behind why they are wrong, it is important to first comprehend in detail about hacking and hackers. So what is hacking? The term hacking was first promoted by the famous MIT between 1950s and 1960s. It all started as a fun experiment in a lab, but it led to something completely different today. Hacking is a term used to describeRead MoreCardholder s Information At Citigroup Hacked Essay785 Words   |  4 Pagesassignment of the MBA 520 Leadership Business Ethics in the Global Environment class. In this paper I will â€Å"apply ethical reasoning and create solutions to case study†. The emphasis of the Cardholder’s Information at Citigroup Hacked case study is managing technology and innovation. Citigroup Breach On May 10, 2011, Citigroup, a 200-year-old U.S. financial institution, discovered a breach in their credit card information systems (Lawrence Weber, 2014). Upon the discovery, Citigroup acted immediatelyRead MoreSecurity Threats Are Caused By Hackers And Viruses1561 Words   |  7 PagesSecurity threats are caused by hackers and viruses. Hackers use what they know to break into computers and computer networks just because they know how. There are several types of hackers to include black-cat hackers, crackers, cyber terrorists, hactivists, script kiddies or script bunnies, and white-hat hackers. Black-cat hackers break into computer systems and might steal or destroy information. Crackers intend on breaking the law when hacking. Cyberterrorists use the internet to hurt people orRead MoreEthical, Social, And Political Issues Of E Commerce Essay1069 Words   |  5 Pagesof Business (JHJ) MIS 677 ? E-Commerce ? Reference Chapter - Chapter 8: Ethical, Social, and Political Issues in E-Commerce For Part I read the article provided titled ?Petco Settles with FTC over Cyber Security Gaffe? and answer the following two questions: Did Petco behave ethically in the handling of this data security vulnerability? Justify your answer. Petco behaved ethically in handling the data security vulnerability issues they had been notified about. The key issue about dataRead MoreThe Security Breaches Of The Target Store Corporation Essay1306 Words   |  6 Pagessummarize the security breaches of the Target Store Corporation over the previous year and make recommendations in the form of information technology security best practices to strengthen the University’s infrastructure. Summarize Major Security Breaches The Target Corporation was exploited in December 2013 and then again in 2015. These breaches included customer’s personal identifying information and retailer’s data. This credit card data breach is a prime example of weak security and infrastructureRead MoreEssay on The CyberCrime of Hacking558 Words   |  3 PagesIt’s recommended that Homeland Security should practice constant and consistent training to create awareness on specific security procedures, disaster response plans and other issues like visual awareness reminders such as the posters in their laboratories and other places. These procedures will keep the employees on toes such that they have the right information concerning procedures to deal with cybercrime and hence be proactive rather than being reactive to incidents. Training has to be done onRead MoreHacking Is A Fast Paced Adrenaline Crazed Job991 Words   |  4 PagesHacking is a very fast paced adrenaline crazed job, whether you re doing i t legally or doing it illegally. Hopefully if you are hacking you have permission from the system or network owner/owners. Or if you have earned your CEH which is a Certified Ethical Hacker. Becoming a Certified Ethical Hacker is a good career choice because with technology changing everyday, people need someone that can protect their company from the dangers of unethical hacking. Technology provides an easier but riskier

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.