This website uses cookies to ensure you have the best experience. Learn more

Ethical Hacking And Ethical Hackers Essay

1703 words - 7 pages

ETHICAL HACKINGIntroductionThe word "ethical" is defined as "relating to morals, especially as concerning human conduct" and "hacking" can be explained as "gaining illegal entry into a computer system, with the intent to alter, steal, or destroy data." These may sound like a contradiction in terms, however, many organizations now has to adopt this method to find out how secure is their networks are.In the past decade, computer and networking technology has seen enormous growth, which bring many good things e.g.: electronic commerce, easy access to vast stores of reference material, collaborative computing, e-mail, and etc. However, this growth has not come without a price, a new methodology in crime has been created: criminal hackers.The term "hacker "could have originated at M.I.T. as students' jargon for classmates who labored nights in the computer lab. In the beginning, hackers are not so dangerous at all. They just stole computer time from the university. However, in the early 1980s, hackers became a group of criminals who steal information from other peoples' computer.Basically, everyone who has a site on the net are afraid that some criminal hacker will break into their Web server and conduct some unethical activities e.g. deliberately damage the files, replace their logo with pornography, read their e-mail, steal their credit card number from an on-line shopping site, or implant software that will secretly transmit their organization's secrets to the open Internet. With these concerns and others, the ethical hacker or the ethical hacking services can help.Ethical HackerWho is ethical hacker? Logophilia ( defined ethical hacker as "A computer hacker who attempts to infiltrate a secure computer system in an effort to learn the system's weaknesses so that they can be repaired." they are also called or known as "samurai" or perhaps, "white hat hacker".Ethical hackers typically have very strong programming and computer networking skills and have years of experience in the computer and networking business. They are also adept at installing and maintaining systems that use the more popular operating systems e.g. Windows, Unix and etc. However, besides excellence skills, their attitude is very much important. First and foremost, they must be completely trustworthy as while testing the security of a client's systems, the ethical hacker will be exposed to information about the client that should remain secret e.g. trade secret. It is also essential that a good ethical hacker must be a person that has more drive and patience than most people.Eventually, ethical hackers may come from three sources: malicious hackers, bright computer science graduates, and individuals from a systems or administration background. Out of these three sources, the malicious hackers is the type of ethical hacker that have higher risk as this is the people who has been using his skills for malicious intent, then grows out...

Find Another Essay On Ethical Hacking and Ethical Hackers

Is Ethical Hacking the Answer to Ensuring the Safety of Company’s Computer Systems?

1445 words - 6 pages to cause harm, commonly called hackers. Hackers are people who gain unauthorized access to someone else’s computer. Hacking is wrong when financial or personal gain is achieved (Jamil and Khan 2011), but there are three types of hackers. ‘White Hats’ are hackers who use their computer skills for ethical reasons, ‘Black Hats’ use their skills in unethical or illegal ways and ‘Gray Hats’, also known as vigilantes or hacktivisits (Hackers 2009

Hacking and Hackers persuasive essay - English - Essay

845 words - 4 pages Nick Fulbright Mrs. Schambers CPLA IV 2018-1-18 Ethical Hacking and the Differences Between White Hat and Black Hat Hackers The state of online security is poor, and there is slow progress toward increasing its protection.Ethical hacking, also known as white hat hackers, are in the good side of hacking and help The work of ethical hackers is to find bugs and fix them. They beta test companies’ software in order to access and find information

Cyber Hacking and Types of Hackers

984 words - 4 pages could have taken anything. No one quite knows. So after that incident, the FED should and will take great measures to protect itself from cyber attacks. Let’s get an overview of what the Federal Reserve has to deal with: The history of cyber hacking and the many different types of hacking. A hacker is a person who looks to reveal problems in a computer system or network. Hackers might be motivated to do what they do because they could make a

Ethics and ethical behaviour

1309 words - 5 pages ABSTRACTThis paper examines the four philosophical viewpoints that underpin an understanding of what constitutes ethical behaviour. It then covers the methods that an organisation can use to promote and maintain high ethical standards within a business environment.Ethics can be seen as a set of principles that govern what is considered 'right' and 'wrong' in regards to ones conduct (Schermerhorn et al, 2004.) Therefore ethical behaviour is that

Ethical Leadership and Diversity

878 words - 4 pages diversity in the workforce nowadays. Leaders and administrators of both public and private organizations through their influence are responsible to promote and manage diversity in an ethical manner. Throughout this semester—as a class—we discussed why and how diversity is important, and how we can manage diversity in successful and productive approach. My aim in this paper is to clarify what—I believe—ought to do as an ethical leader toward promoting

Ethical and Moral Philosophies

1276 words - 5 pages Running head: ETHICAL AND MORAL PHILOSOPHIESETHICAL AND MORAL PHILOSOPHIESEthical and Moral PhilosophiesName:Institution:Date:Ethical and Moral PhilosophiesDefine and Discuss Philosophies' Application to BusinessBusiness philosophy refers to the application of theoretic framework to determine the manner in which a business entity deals with various forms of operation. It refers to the formation and operation of a corporate entity in areas that

IMC and ethical concerns

856 words - 3 pages IMC and Ethical Concerns With the constant advances in technology, the business world has become global. Companies compete with the business across the street as well as the business halfway around the globe. Organizations must be innovative to not only thrive but also just to survive. They must be aware of the internal and external factors both locally and globally that can affect their business. Internal Factor and External Factors Internal

Ethical and Legal Preparations

583 words - 2 pages gain entry in order for it to be considered a burglary. Investigations must be ethical. An investigator must be professional and compliant when investigating these crimes. Ethical and Legal Preparations Ethics is a big part of investigating homicides and burglaries. Homicide is a horrible crime and should be treated as such. If an investigator is investigating a homicide that was committed by a homosexual lover

Technology and Ethical Changes

2298 words - 9 pages In this paper I will discuss how Information technology has brought about significant societal ethical changes. Users of technology in society and business today need to be increasingly aware of the need for the ethical use of technology. Information technology (IT) users need a code of ethics developed, so that they can navigate through the ethical issues they confront while using information technology. When ethical violations occur

Ethical And Legal Obligations

1694 words - 7 pages Ethical and Legal Obligations Ethical and legal obligations apply to all members of society. As one in society, the obligation to act in an ethical, law abiding manner on a daily basis is vital to the integrity of daily life. Many professions have their own code of ethics. Financial reporting is not exempt from such ethical and legal standards. One’s lively hood depends on decisions made in the business world. Business transactions are

Ethical Traditions and Realism

1033 words - 5 pages Ethical traditions are varying perspectives from which historical and current events are viewed and analyzed with a focus on interactions between actors. According to Terry Nardin, ethical traditions have three basic attributes as well as a relation between ethical tradition and ethical judgment. With these characteristics in mind, the potential for change within a tradition will be addressed. Finally, this paper will look at how the Realist

Similar Essays

Ethical Hacking Essay

812 words - 4 pages black hat hackers would use. Is there really such thing as "ethical hacking"? How would you be sure that the hacker is being ethical? There is controversy around ethical hacking. Many people oppose the term ethical hacking. They compare ethical hacking to ethical crime and claim that there cannot be such thing as ethical crime or ethical hacking. However, I believe ethical hacking should exist. "An ethical hacker is usually employed by an

Is Ethical Hacking Truly Ethical? Essay

2751 words - 11 pages Hackers, Anyway?." U.S. News & World Report 126.23 1999: 53. Academic Search Premier. Web. 1 Mar. 2011. Krapp, Peter. "Terror and Play, or What Was Hacktivism?." Grey Room 21 2005: 70-93. Academic Search Premier. Web. 15 Mar. 2011. Palmer, Charles. "Ethical Hacking." IBM Systems Journal 40.3 (2001): 769-780. Print. Quarantiello, Laura E. Cyber Crime: How to protect yourself from computer criminals. Lake Geneva: Limelight Books. 1997. Print

Ethical Hacking: The Different Types Of Hacking

1061 words - 4 pages location using various forms of hacking tools available on the internet. There is a form of “hacking” that exists today that is both legal and ethical. This form of hacking is referred to as, “Ethical Hacking.” Ethical hacking is doing legally what malicious hackers do: break in. (Simpson, 2010). Ethical hacking, when compared to traditional hacking, is legally and morally accepted because one must pass a series of rigorous exams and background

Why Do Companies Need Ethical Hacking?

1411 words - 6 pages WHY DO COMPANIES NEED ETHICAL HACKERS? The rapid technological change has brought with it a number of issues. One of the issues that it has brought is the issue of increased cybercrime conducted by black hats. Black hats target almost everyone, but we will mainly focus on attacks which occur in organizations. Hackers take advantage of the fact that more and more organizations are turning to the internet to interact with their customers