This website uses cookies to ensure you have the best experience. Learn more

Is Ethical Hacking The Answer To Ensuring The Safety Of Company’s Computer Systems?

1445 words - 6 pages

Introduction
Modern society relies more on computers and the Internet now than ever before as a means to exchange information. Computer infrastructures are continually evolving and developing which has lead to an increase of reliance on technology, and an increasing amount of personal data being shared between computers and over the Internet. For these reasons it imperative to keep these infrastructures safe from those who do not belong or mean to cause harm, commonly called hackers. Hackers are people who gain unauthorized access to someone else’s computer. Hacking is wrong when financial or personal gain is achieved (Jamil and Khan 2011), but there are three types of hackers. ‘White Hats’ are hackers who use their computer skills for ethical reasons, ‘Black Hats’ use their skills in unethical or illegal ways and ‘Gray Hats’, also known as vigilantes or hacktivisits (Hackers 2009), their skills to investigate criminal activity but perform it in an illegal manner.
Who is affected by computer hacking?
Anyone with a computer, including smart phones, can be a victim of hacking. Examples of those who have been affected are big name companies (Target, Twitter, and Facebook), heads of government, (Angela Merkel), and unsuspecting members of the public (Trojan viruses or worms). One approach to increasing computer security is by ethically hacking. An “ethical hacker” is someone who hacks into computers in order to spot security vulnerabilities without the intent of causing harm. This essay will provide arguments for and against the use of ethical hacking to identify weaknesses in computer security.
Ethical Hacking to Expose Security Flaws
The main argument for ethical hacking is that companies are able to decrease their loss of sensitive information by learning where weak spots are in the security of their computer systems. When a company learns what their security weaknesses are and are able to fix the problems, it will prevent the company from losing income, save the company money and time they may have to spend in fixing cyber attacks, save a company’s reputation, and will save the company from losing valuable company secrets or client data. This is imperative to keeping a company in business. Ethical hackers who are hired to find these security weaknesses look for missing security patches, common passwords and user names amongst company employees, sensitive information stored incorrectly, weak passwords, and insecure workstations (Compton 2010). Corporations may keep their security updated but when the human factor of security is included to the equation, it can be impossible to maintain security. All it takes is for one employee to write their password down, allowing it to get in the wrong hands, or to use ‘password’ as their password, and it provides easy opportunities for Black Hats to cause harm to a company’s computer system.
Those against ethical hacking say that exposing security flaws should not be encouraged and not every company can...

Find Another Essay On Is Ethical Hacking the Answer to Ensuring the Safety of Company’s Computer Systems?

Is Ethical Hacking Truly Ethical? Essay

2751 words - 11 pages access to computers to test their software code. “Even now, there is a big wrench at the AI Lab titled, “the seventh-floor master key” to be used in case anyone dares to lock up one of the more fancy terminals” (Schell, “The Hacking of America: Who’s Doing It, Why, and How” 44). One of the ways in which hackers are ensuring the freedom to information across the Internet is through the Open Source movement. Open Source means that whenever a

the benefit of hacking Essay

1491 words - 6 pages to do their work. Examples of some of the work done by Blue Hats consist of finding holes within their company’s software, upgrade their programs, and hunting down the Black Hats. As you can see hacking is a skill, and if you want to put it more violently a weapon, that can be used for both good and evil. Another example of a skill being used for good and evil is the ability to run. If you can run fast you can take something and run to safety

The Art of Hacking

1237 words - 5 pages around the world within the systems they get into just to get what they wish. On the other hand hackers are an essential help when we are in trouble and someone needs to find info inside a cellphone to try and help if someone is missing. There are two kinds of hackers; the most familiar is described as a criminal, dangerous and devious. The other kind is not as familiar and behaves in more ethical ways. Background A hacker is defined as a

'The Physics of Stopping,' is an answer to whether or not the statement "safety is not related to how fast you travel, but how quickly you stop," is true

801 words - 3 pages The Physics of StoppingIn some ways the statement "safety is not related to how fast you travel, but how quickly you stop" is true, but in another it is untrue in regard to the physics of stopping. If safety is related to how quickly you stop, then it is also related to how fast you travel, because how quickly you stop is directly related to how fast you are travelling.A moving object has momentum, any moving object with a mass has momentum

Ombudsman's Contribution to the Task of Ensuring that Government Decision-Making is Conducted in a Defensible Way

973 words - 4 pages Ombudsman's Contribution to the Task of Ensuring that Government Decision-Making is Conducted in a Defensible Way The Parliamentary Commissioner for Adminstration (PCA) was set up under the Parliamentary Commissioner Act 1967 as a result of the Crichel Down affair in 1954. It was thought that pre-existing judicial and parliamentary remedies did not provide adequate redress for members of the public who suffered as a result

A Snapshot of Computer Hacking

1272 words - 5 pages their systems. Taking them from what may lead to a lifetime of crime, and changing them into ethical hackers. Ethical hackers also know as White Hats, are professionals that write codes to check the integrity of programs on behalf of the owners. The first computer hackers surfaced from MIT. (Focus Editors). The term hacking was borrowed from members of a model train club, who reconfigured the switches and rails to make the trains go faster. A

Motivation Theory: Ensuring Success of the Workplace

5261 words - 21 pages Motivation Theory: Ensuring Success of the Workplace Since the beginning of mankind, leaders have risen to take charge of societies and make decisions. These decisions often meant the difference between having food and going hungry, having shelter or being left outside, and sometimes the difference between life and death. As society has progressed, we have seen great technological advances such as television, computers, cars, and

The Answer Is No

1150 words - 5 pages The Answer Is No From centuries to centuries the role of women has been predominantly subordinate to the role of men. Men have been known to be superior in both physical and mental levels. They are also most likely to have an "upper hand" in situations based on their gender. An example of such situation is taken place in "The Answer Is No", written by Naguib Mahfouz. This story has a considerable amount of sexual politics. On

The United Nations Is the Answer To The Worlds Problems

626 words - 3 pages The United Nations Is the Answer To The Worlds Problems The issue of whether or not the United Nations should be disbanded is a complex two-sided answer. Some may say that no the United Nations should remain in society because of all the good the organization has done for the world such as UNICEF. Others may argue that the United Nations have done more harm than good, like the fact that your voting rights in the International Monetary Fund

The Answer To Foreclosure

1041 words - 4 pages to fix through various approaches. The ugly problem still remains despite many efforts. Everyone wants answers, congress, people who’ve been forced out of their homes, people who’ve had to see people forced out of their home, and the rest of America. So what is the answer? The answer to foreclosure and many problems that are developing also in the credit unions can be answered two ways. One in which is quite simply, give money back

Prison and the Alternatives: Is Incarceration the Answer to Crime?

2143 words - 9 pages Prison and the Alternatives: Is Incarceration the Answer to Crime?How well do our prisons reform prisoners? What are the alternatives to prison? What is the best, most cost-effective way of protecting the public? These are some of the questions raised by individuals who are legitimately concerned not only with where their tax dollars are going, but also with what is being done to break the cycle of crime within their representative communities

Similar Essays

Ethical Hacking: The Different Types Of Hacking

1061 words - 4 pages checks to become certified and maintain their status, effectively use methods of hacking that is recognized by the industry, and provide awareness of current security issues within a network. To become an Ethical Hacker, one must pass a series of exams designed to test the candidates’ knowledge of computer network protocols. “The International Council of Electronic Commerce Consultants (EC-Council) has developed a certification designation called

The Use Of Hacking To Identify Weaknesses In Computer Security

1740 words - 7 pages Introduction The use of hacking to identify weaknesses in computer security has become an increasingly controversial issue in recent years. Awareness of this issue is important, because our ever increasing reliance on technology means that breaches in computer security have the potential to have wide-ranging and devastating consequences to society, worldwide. This essay will begin by clearly defining the term ‘hacking’ and will examine the type

The Vulnerability Of Computerised Accounting Information Systems To Computer Crime

1509 words - 6 pages are Internet illegal obtain and destroy program, unauthorised access and theft valuable information, and theft money by altering computer record. All in all, the best way to protect accounting information system far away from computer crime is to increase the system security.Bibliography:Bagranoff, N.A. , Simkin, M.G.. & Moscove, S.A. 2001, Core Concepts of Accounting Information systems, 7th edition, John Wiley& Sons Inc

The Vulnerability Of Computerised Accounting Information Systems To Computer Crime

1916 words - 8 pages The vulnerability of computerised accounting information systems to computer crimeAbstractWith the information technology development day-by-day, Computerised Accounting Information System (CAIS) plays an increasingly significant role in the successful operation of today's business. CAIS has been used more and more broadly and had as much impact on organisations, however the computer crime is also an important issue related to CAIS. As the