Preview

Ethical Hacking

Good Essays
Open Document
Open Document
1018 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Ethical Hacking
Almost 90 percent of our society now depends on complex computer based system. With the increasingly use of computer and explosive growth of the Internet has brought many good things: electronic commerce, online banking, e-mail, video conferencing etc. The improvement of systems security to prevent criminal hacker has become an important concern to society. There are many ways to protect those information systems; it seems that the Ethical Hacking is a better way. Therefore, whether to teach or not teach the "Ethical Hacking" as a course in Tertiary education has become an interesting argument. In this article will analysis the ethical, legal, and ethical implications of this issue.

In order to discuss the ethical, legal, and social implications of this issue, one has to understand the definition of Ethical Hacking. The Word Spy states that "Ethical hacking is a computer hacker who attempts to infiltrate a secure computer system in an effort to learn the system 's weaknesses so that they can be repaired" (The Word Spy, 2003). The question arises here is whether Ethical Hacking is ethical or unethical.

The "Computer Ethics" states in part that all information belongs to everyone and there should be no boundaries or restraints to prevent disclosure of this information (Johnson, 1994). From most hacker 's perspective, freedom of information includes the right to source codes and the programs themselves. This freedom also includes the right to access information stored on a computer network. At times, hackers argue that the freedom of information doctrine gives them the right to have unrestricted access to computer accounts, passwords and email. At this point, the ethical position of hacking has become "system cracking" (Granger, 1994). When the information of the system has become free to everyone, there is no such thing of private property, and there is also no privacy concerns. Teaching someone to be an ethical hacker would seem as teaching someone to break

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Lab 7 Ethical Hacking

    • 293 Words
    • 2 Pages

    In this lab, you used AVG AntiVirus Business Edition to identify the viruses, worms, Trojans,…

    • 293 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Take a trip down memory lane with these top cyber films. Designed for computer buffs, these movies range from spy thrillers to cyber crime movies. They were selected based on their excellent plot lines and portrayals of technology. Unlike typical movies, these films use computers the way they are actually used in real life with a few exceptions.…

    • 598 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Nt1310 Final Exam

    • 393 Words
    • 2 Pages

    Computer Hacking in 1960’s up to 1970’s – an individual working with computers who were technically gifted and skilled it was defined by computer ethicist Duncan Langford (1995).…

    • 393 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    It530

    • 681 Words
    • 3 Pages

    1. In recent years, the concept of “ethical” hacking has grown in importance as more companies consider…

    • 681 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Hacking is when a highly technical skilled individual or a group pass their way into a computer network or program without permission. This ends up in important data being stolen by the hacker which is illegal.…

    • 769 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Kingpin Ananlytical Essay

    • 377 Words
    • 2 Pages

    Introduction: Below I will present an argument that that shows the computer hacking by Max Butler, the main character, demonstrated in the book Kingpin by Kevin Poulsen, was unethical in nature. Max’s actions illustrate computer crime defined as, “any incident involving an intentional act where a victim suffered or could have suffered a loss, and a perpetrator made or could have made a gain and is associated with computers” (Parker, 1976). Max utilized his hacking skills in a malicious manner to victimize individuals by taking their personal property.…

    • 377 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    In presenting this project, in partial fulfillment of the requirements for graduate degree from the University of Central Arkansas, I agree that the Library of this University shall make it freely available for inspections. I further agree that permission for extensive copying for scholarly purposes may be granted by the professor who supervised my thesis work, or, in the professors absence, by the Chair of the Department or the Dean of the Graduate School. It is understood, that due recognition shall be given to me and to the University of Central Arkansas in any scholarly use which may be made of any material in my project.…

    • 5250 Words
    • 21 Pages
    Powerful Essays
  • Satisfactory Essays

    Ethical Hacking Lab

    • 445 Words
    • 2 Pages

    4. Enter the following command to view the pcap file in hexadecimal format (-x) using absolute, instead of relative, TCP sequence numbers (-S).…

    • 445 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Digital Crime

    • 5203 Words
    • 21 Pages

    Computers are used for many different types of personal and work related activities. Getting on the Internet and researching a topic for a college paper, researching types of flat screen televisions and their various prices, or what about getting on the computer and playing games, or using computers to watch movies and chat with friends and family. From a work standpoint, computers assist in processing orders, calculating and tracking numbers, manufacturing vehicles, sending email, and literally millions of other computer related activities. But, what if computers were used to copy Microsoft’s Office software applications and sell them at 60% cost on the black market? What if computers were used to login to accounts that weren’t the owners and take unauthorized data to sell for identify theft purposes? What if computers were used to hack into databases and “borrowed” data that then provided “insider information” that endowed an unprecedented stock gain for Members of the Board of Directors? These examples would mean that computers were being used for cyber-crimes. There are four primary categories of these types of cyber-crimes that will be the focus of this research paper.…

    • 5203 Words
    • 21 Pages
    Powerful Essays
  • Satisfactory Essays

    Ethc

    • 724 Words
    • 3 Pages

    Ethics and Information Technology Ethics in IT-Configured Societies Information Flow, Privacy & Surveillance Digital Intellectual Property Digital Order Professional Ethics in Computing…

    • 724 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Hacking

    • 681 Words
    • 3 Pages

    3. What application and tools can be used to perform this initial reconnaissance and probing step?…

    • 681 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Computer technology brought upon many unexpected ethical, social and political issues. Society has yet to learn a lot about how to deal with technology and its after-effects on ethical principles. When discussing about ethics, we need to go over the importance of computers and be able to answer question like: What is the reason for addressing the impact of computers on ethics? In his article “What is computer ethics?” Dr. James H. Moore analyzed and elaborated the very question. He addressed important questions like why are computers important, how are they different from other technology, what are some of the problems and challenges that are associated with computer ethics, and why is the field of computer ethics highly important.…

    • 642 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Computer and Web Ethics

    • 1530 Words
    • 7 Pages

    With the freedom of the computer has come a multitude of new ethical issues. Computer ethics is a set of moral principles that systematize the use of computers and supervise the behavior of a group or individual. This essay will tell how computer ethics came about. We will discuss the “Ten Commandments of Computer Ethics.” Having the use of a computer for business, academic, or just for social reasons entitles you to know and follow these ethics. Do you apply computer ethics when spending time on the internet? At the end of this essay ask yourself this question again and give an honest answer. If your answer is no then correct the issue and apply them now. Ethics in computing are social-justice issues, commerce, computer abuse, speech issues, intellectual property, basics, privacy, and risks. We will discuss each of these issues in this essay. By the end of this essay you will have the knowledge of computer and web ethics to apply to your daily use of a computer.…

    • 1530 Words
    • 7 Pages
    Good Essays
  • Satisfactory Essays

    List TWO (administrative) steps that the ethical hacker need to do before committing the hacking. (4%)…

    • 421 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Abstract: In work environment, ethics is the common rules or approach for all professionals need to obey in order to achieve a great environment in an organization. Most of people think that ethics and morals is something that share the same meaning but actually they are not. The morals are towards the personal character, while ethics stress a social system in which those morals are applied. In other words, ethics point to standards or codes of behaviours expected by the group to which the individual belongs. The ethics might be national ethics, social ethics, company ethics, professional ethics, or even family ethics. So while a person’s moral code is usually unchanging, the ethics of he or she practices can be others to depend on. This paper is written based on data collection from many sources such as webs, articles, and books. So, this paper will provide an overview on the importance of ethics among the IT professionals. Furthermore, it will be explaining the beneficial of applying ethics to IT professionals in order to achieve a good relationship among the workers or team members in an organization.…

    • 3986 Words
    • 16 Pages
    Powerful Essays