Preview

Write an Essay Discussing the Pros and Cons of Hiring Known Hackers to Test the Security of a System.

Good Essays
Open Document
Open Document
923 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Write an Essay Discussing the Pros and Cons of Hiring Known Hackers to Test the Security of a System.
Topic 1: Write an essay discussing the pros and cons of hiring known hackers to test the security of a system.
Nowaday, hacker is someone makes the technology's life to be more interesting. The term hacker has evolved over the years and been growing. For years there existed a fuzzy distinction between good and bad computer hackers, or we also call them white hat and black hat hackers. Whether they are good or bad, we can't negate they don't have any influence on the development of technology. Hiring known hackers to test the security of a system is an example of this idea.
Some companies have the great database which stores information about back hat hackers. It's made and developed by white hatters. These hackers break into systems and report holes that company engineers quickly seal. Companies need to have appropriate way to choose hackers to hire. Another positive aspect to hiring reformed hackers as security consultants is that staying up with the latest security exploits and countermeasures is a full time job. In most companies, the IT staff has an acceptable level of security knowledge, but they must focus most of their attention on the day to day responsibilities of keeping the network up and running. A good security consultant focuses almost solely on security and consequently has a level of security knowledge that goes far beyond that of most other IT professionals.
The risks of hiring so-called good hackers can be minimized by following several basic rules, but the use of hackers with criminal records is not common. With security of a system, hiring hackers will break the rule, go into and test, but there is a notable amount of back doors already compromising the systems after they finish. Controlled from remote locations by hackers, or malicious hacker takes over computers on the Internet and causes them to flood a target site with demands for data and other small tasks can happen when hackers know about the weakness of your system. Someone has the

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Scott Ramon Seguro Mescudi, mostly known by his stage name Kid Cudi, was born on January 30, 1984 in Cleveland, Ohio. Kid Cudi’s family was placed in the lower class in the area of Shaker Heights with three other siblings, by his mother, Elsie, who was an elementary school teacher. At the age of 11, Kid Cudi’s father, Lindberg, a house painter and a World War II veteran died at the age of 67 in 1995 due to his long battle with cancer. The death of his father has played major part in his life of why who is he is today, his character, and how thinks of life. But with each tragedy that occurs in our lives, there is always a sign of hope for the affected individual, which helped spurred Kid Cudi’s creativity. This was noticed when his mother caught…

    • 203 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Final Exam

    • 393 Words
    • 2 Pages

    2. Who is the computer ethicist that defines computer hacker as an individual working with computers who was technically gifted and skilled?…

    • 393 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    In the television program “American Greed - Hackers : Operation Get Rich or Die Tryin’ “they explain the the reason most folks get into criminal hacking is because of credit and attention and not well thought out long term plans. The program also show how the team adapted to evade law enforcement measures by not being flashy and making spaced out recreational purchases such as cars and using cash when need be.…

    • 339 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    It530

    • 681 Words
    • 3 Pages

    as well as the ethical dilemmas inherent in hiring a hacker as a security consultant.…

    • 681 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Hacking is when a highly technical skilled individual or a group pass their way into a computer network or program without permission. This ends up in important data being stolen by the hacker which is illegal.…

    • 769 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Crt 205 Final Project

    • 2361 Words
    • 10 Pages

    | |author. If none exist, explain how you |However, hacking is a process use be Information Technology (IT) |…

    • 2361 Words
    • 10 Pages
    Satisfactory Essays
  • Good Essays

    Testbacksecurity

    • 2284 Words
    • 10 Pages

    Expert hackers are extremely talented individuals who usually devote lots of time and energy to attempting to break into other people’s information systems.…

    • 2284 Words
    • 10 Pages
    Good Essays
  • Satisfactory Essays

    Tim J. Watts goes more into the dark side of the “hacker” community by bringing up the constant back in forth between computer security officers and the so called hackers. This article, being written this year is able to reflect on the events of September 11, 2001 and new homeland security measures. He represents this viewpoint of a dangerous hacker in his definition: “While some hackers are harmless, others break into systems with the intent to steal information or to do destruction to the system. Hackers performing the latter pose a serious threat to the economic future of the United States” (Watts). Tim Watt outright blames the hacker community of accessing information that should be private. Only looking and reflecting on the serious threat…

    • 154 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Computer Memory Hacking

    • 820 Words
    • 2 Pages

    Who Are Hackers ­ A Hacker 's Tools Of The Trade | Hackers | FRONTLINE | PBS. (n.d.).…

    • 820 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    ARTICLE SUMMARY

    • 1028 Words
    • 7 Pages

    Some hackers are skillful computer operators, but others are younger inexperienced people who experienced hackers refer to as ____.…

    • 1028 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Hacker: An individual who enjoys breaking systems or software without causing harm, presumably with the intent to better understand and improve security.…

    • 413 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Causes Of Identity Theft

    • 1108 Words
    • 5 Pages

    Hackers are people who hack into other people’s computers or electronic devices so they can take control over their things. A book titled Net Crimes and Misdemeanors written by J. A. Hitchcock takes us through many different aspects of how people take and control our things. She explains to us “When you’re connected to the internet, your computer is part of a worldwide network and anyone can try to connect to your system. The best way to describe it is by contrasting it to your television, a one-way communication mechanism” (Hitchcock 237). Hackers can reach any personal information located on an individual’s computer. Any accounts or credit card numbers in the system, they can get ahold of. We use many internet softwares today that can help prevent hackers, but not all the time. Hackers are extremely knowledgeable with computers and can find their way in. Hitchcock also gives us a little background information on when many viruses and softwares were introduced. She states, “…there was a good enough market for a security suite that included a personal firewall and antivirus capability. They were right. When NIS was introduced in December 1999, the U.S. retail market for internet security software grew more than 140 percent” (Hitchcock 236). Throughout the years, many software updates came out to help protect people and their information. The problem is that the more…

    • 1108 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Hackers: A hacker is someone who finds weaknesses in a computer or computer network, enters, and modifies or/and steals data this could slow down performance very much or even completely halt it.…

    • 555 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Hacktivism Ethics

    • 7214 Words
    • 29 Pages

    E. Spafford, "Are Computer Hacker Break-ins Ethical?," in Computers and Ethics in the Cyberage, D. M. Hester and P. J. Ford, Eds. Upper Saddle River, New Jersey: Prentice Hall, 2001, pp. 332-344.…

    • 7214 Words
    • 29 Pages
    Powerful Essays
  • Good Essays

    Yet, many fail to fully understand the threat landscape that lies behind the lucrative business of hacking and why the number of hackers is increasing every day.…

    • 720 Words
    • 3 Pages
    Good Essays