This website uses cookies to ensure you have the best experience. Learn more

Hacking As A Means Of Identifying Weaknesses In Computer Security

1651 words - 7 pages

The use of hacking can be very beneficial as a means of identifying weaknesses in computer security. Nowadays, numerous companies and governments use this technique to assess the level of security of their systems and determine if any valuable information is at risk of being accessed unlawfully. Ethical hackers are employed to identify potential threats on a single computer or a whole network of computers. The found potential exploits are later patched thus decreasing the chance of a breach in the system and increasing its overall security and reliability.
In the context of computer security, a hacker is someone who seeks and exploits weaknesses in a computer network or a computer system. Hackers may be motivated by a number of reasons ranging from protest to profit. An ethical hacker is a computer expert who attacks the security of a certain system on behalf of its owners seeking for potential vulnerabilities a malicious hacker could abuse. To test system security, ethical hackers use the same techniques as their less principled counterparts but report problems instead of taking advantage of them. Such hackers are sometimes called “white hat” hacker whereas malicious hackers go by the name “black hat” (Rouse, 2007). These terms represent an analogy coming from old Western movies where the good guy wore a white hat and the bad guy wore a black one.
There are more than a few techniques which could be used to test a system’s security level. While penetration testing concentrates on attacking computer and software systems using a set of penetration techniques, ethical hacking, which will likely include such things, is under no such restrictions. A full-scale ethical hack (Knight, 2009) might include emailing staff to ask for password details, going through employees’ rubbish or even breaking and entering. All these would, however, take place with the explicit consent of the target. To try to replicate some of the destructive methods a real attack might employ, ethical hackers arrange for cloned test systems or organise a hack late at night while systems are less critical. This is a main difference between the approaches taken by white hat and black hat hackers. A malicious hacker would, in this instance, target the live system at its peak usage time with the aim to cause as much damage as possible.
One of the first instances of an ethical hack technique being used was a security evaluation conducted by the United States Air Force of the Multics ("Multiplexed Information and Computing Service") operating system for "potential use as a two-level (secret/top secret) system." (Palmer, 2001). Their evaluation found that while Multics was "significantly better than other conventional systems," it also had "vulnerabilities in hardware security, software security and procedural security" that could be uncovered with a relatively low level of effort. The Air Force performed the tests under a guideline of realism, so that the experiment results would...

Find Another Essay On Hacking as a Means of Identifying Weaknesses in Computer Security

Art Expression as a Means of Therapy in Correctional Settings

1923 words - 8 pages -therapy is a means to wellness, behavioral change and, most importantly, life change. ***incorporate into conclusion*** In the end, it is hard to decide who is right and who is wrong about what art can and cannot do for people in prison. Cynicism is too easy an option. Why should we care if a solution is soft, so long as it works? After all, the punitive practices of the past have not been successful in tackling crime or rehabilitating criminals

The internet as a means of learning

634 words - 3 pages new millennium is its use in research. Don't know the meaning of a word in you textbook or a new phrase you heard, go onto the internet and find out what it means. It has become as simple as learning A B C. The internet has grown so popular in the last decade that teachers have started using it in school to support the traditional style of teaching from books. Research done on the internet allows us access to the newest information and up-to-date

Sex as a Means of Agency

1243 words - 5 pages Sex as a Means of Agency “A woman’s harder to conquer than any beast, than fire, and no panther is quite so ferocious.” (Aristophanes 1058) Life for an Athenian woman was marked by her daily occupation to the household and its occupants. This was the sphere of life where she was able to exert the most power and maintain a certain degree of agency. Her domestic duties included attendance to her husband, and his sexual needs. In the

Communication as a Means of Stability

1355 words - 5 pages Communication as a Means of Stability As demonstrated throughout various Native American texts, communication tends to be the Native’s greatest challenge in that they are unable to develop successful relationships with the outside world. Ultimately, broken treaties have become the unfortunate model for miscommunication between the European Americans and the Natives. Granted the white culture and the Natives share very few of the same

A History of Hacking

1697 words - 7 pages Hackers have a very rich history, despite being most commonly linked to the latest outburst of technology. They've helped excel many of the everyday gadgets a majority of the population owns and uses today. Not only have they established a very well known name today when it comes to computers, but nearly every piece of technology we know today can be linked back to them. They have advanced greatly in both their knowledge of computers as well as

Computer crimes need to be prevented and halted through increased computer network security measures as well as tougher laws and enforcement of those laws in cyberspace

3335 words - 13 pages or gasoline, or when a 'computer virus'--a program capable of altering or erasing computer memory--is introduced into a computer system. As subjects of crime, computers represent the electronic environment in which frauds are programmed and executed; an example is the transfer of money balances in accounts to perpetrators' accounts for withdrawal. Computers are instruments of crime when used to plan or control such criminal acts as complex

Computer Security in business

665 words - 3 pages put the use of computer systems to the limit. There are three main uses of computers in healthcare institutions: (a) collect data faster, (b) store data for future use, and (c) share data to parties other than the institution and the patient.Protection of health information in healthcare industry needs a combination of policies and security programs.Policies are used as to determine the people who can access data under specified situations. The US

Storytelling as a Means of Survival in Yann Martel's Life of Pi

636 words - 3 pages From Novel to Film: Storytelling as a means of survival in Life of Pi As Frank Herbert once said, “how often it is that the angry man rages denial of what his inner self is telling him.” In Yann Martel’s, Life of PI, the inner beast of Pi Patel, with the use of storytelling, is fabricated and given to the reader as a tiger. By the end, the novel leaves the reader with an appreciation of storytelling as being a means of survival, and the movie of

Laptops in Classrooms as a Means of Learning Hindrance and Distraction

1583 words - 6 pages , optimized and distributed. This means that technology advancing towards easier, faster and widely available devices for people. Laptops can perform some educational tasks; however, advances to technology have prevented students to use laptops as an effective learning tool in class. One advancement that hinders learning would be Wi-Fi networks that provide internet access in classrooms. The University of Western Ontario offers “Western wireless” cards

Science vs. Nature as a Means of Obtaining Perfection in The Birthmark by Nathaniel Hawthorne

1135 words - 5 pages himself, and as a result of his low self-esteem and lack of confidence, he was utterly convinced that he must have a flawless wife in order to compensate. These insecurities caused him to develop a bit of a complex, eventually turning him into a self-serving individual whose only goal was to make his wife perfect for his own sake (Cutajar). With all of that being said, he did truly love his wife, and in his own bizarre way he wanted her to be perfect

Hacking as a secure satisfying career

767 words - 3 pages For years the question has arisen, 'Is hacking legal?' Now there is ananswer found within many corporations throughout the world, and it isdefinitely, yes. Hackers used to be just people that cause havoc on anotherperson's computer or a network of computers to gain access to secretinformation or private agreements and the like. Today hackers are beinghired by major companies to test their software and hardware for 'holes'(glitches) in the setup

Similar Essays

The Use Of Hacking To Identify Weaknesses In Computer Security

1740 words - 7 pages of people who hack and for what reasons. There will then follow a discussion of the moral argument on hacking before examining a few brief examples. The essay will then conclude by arguing against the use of hacking as a means of identifying weaknesses in computer security. What is it to ‘hack’? Hacking has two primary definitions; the first refers to the enthusiastic and skilful use of computers to solve problems (Techterms, 2013); the second

A Snapshot Of Computer Hacking Essay

1272 words - 5 pages sentenced to two years probation, 250 hours of community service. He is also ordered to pay Bell Atlantic $5,000 in damages. Two hackers in China are sentenced to death after being found guilty of breaking into a banks computer network. They stole $260,00 yaun. As you can see, there have been numerous accounts of computer hacking and cracking throughout the years. I could go on for another four pages to list them all. I tried to point out the

Rule Of Law In Cyberspace As A Means And Way To Cyber Security

1066 words - 5 pages basic instrument to ensure public order, order on the state level and also on international level. The “rule of law" is the authority and influence of law in society, esp. when viewed as a constraint on individual and institutional behaviour; (hence) the principle whereby all members of a society (including those in government) are considered equally subject to publicly disclosed legal codes and processes. 2 Therefore the rule of law is the basic

Identifying And Preventing Weaknesses In Software Programs

1758 words - 8 pages Test case similarity based fuzzing Information technology is growing rapidly. Along with the rapid advancements, a large number of software security violations are taking place, which are causing an overwhelming impact on the organizations and the individuals. In the past few years many methods have been proposed to identify and prevent weaknesses in software programs. “Fuzzing was first proposed by Miller et.al in the year 1990 to detect