Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

A hacker is an individual with technical skills and creative savvy who is willing to push the limits of technology in order to discover the boundaries and weaknesses of a computer or networked system in order to gain unauthorized access to that system. The use of the term hacker often means that the individual is willing to cross ethical boundaries in order to test and gain access to a system. An ethical hacker is an individual hired by an organization to break into the selected organization's information systems but to do so in a principled manner. Ethical hackers use the same methods and techniques used by traditional hackers with one difference, the ethical hacker is someone who is trusted by the organization to discover vulnerabilities or weaknesses in a system and then report these issues back to the organization so that the issues can be fixed. For example, a bank might hire an ethical hacker to test the security of their banking system. If the ethical hacker discovers a method to steal money from the bank undetected, the ethical hacker will report this information and not use it to their advantage.

Ten years ago, the term ethical hacker was viewed as an informal term used by management. It was used to describe individuals that were willing to cross traditional ethical boundaries in order to protect systems from those outside individuals that are not concerned with ethical issues. The primary concern is that an ethical hacker has to be willing to push the ethical boundary to match those conditions that would be used by a traditional hacker. Some security experts state that the term ethical hacker is a misnomer. An ethical hacker seems to imply the same contradiction that we might find in attempting to define an ethical thief.

Using the module readings and the Argosy University online library resources, research perspectives regarding ethical hacking.

Respond to the following:

a) Can the actions of a hacker be ethical and still be effective? Why or why not?

b) What ethical issues does management need to consider when attempting to secure information systems?

c) What are some possible benefits of hiring ethical hackers?

d) What are some possible detriments to hiring ethical hackers?

e) Should management hire ethical hackers to verify the security of their information systems?

f) Give reasons and examples in support of your responses.

Write your initial response in approximately 300 words. Apply APA standards to citation of sources.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M9785768

Have any Question?


Related Questions in Computer Engineering

Discuss why a financial services organization would benefit

Discuss why a financial services organization would benefit from using one framework over another (COSO, COBIT,) -- choose a framework or frameworks that in your opinion would be most ideally suited for such an organizat ...

A small sports club keeps information about its members and

A small sports club keeps information about its members and the fees they pay. The secretary wants to be able to record when members pay and print a report similar to that in the figure below. last n me - first_narne - p ...

What to do sort an array of single digit positive integers

What to do: Sort an array of single digit positive integers in LC-3 assembler - program will prompt user to enter a single digit integer. Non-negative values are accepted, with a zero entered to terminate input - the pro ...

Question suppose that in a divide and conquer algorithm we

Question : Suppose that, in a divide and conquer algorithm, we divide an instance of size n of a problem into 16 sub instances of size n/4 and the dividing takes O(1) time (you may ignore this step). Then we combine the ...

The second programming project involves writing a program

The second programming project involves writing a program that accepts an arithmetic expression of unsigned integers in postfix notation and builds the arithmetic expression tree that represents that expression. From tha ...

What is an example of a repetitive and specific task in

What is an example of a repetitive and specific task in which you use descriptive statistics on a daily basis. What is an example of how you consciously or subconsciously rely on the presence of descriptive statistics in ...

List of fruitspapayakiwifruitzapote List of fruits: papaya kiwifruit zapote blanco

List of fruits: papaya kiwifruit zapote blanco huckleberry banana fig lime xigua vanilla yiessas tamarind umkolo quince apple imbu elderberry juneberry mango strawberry nectarine date cherry orange watermelon grape raspb ...

Discuss the role of insurance in healthcare delivery and

Discuss the role of insurance in healthcare delivery and productivity

Whats the difference between a bigfile tablespace and a

What's the difference between a Bigfile tablespace and a Smallfile tablespace? Explain which you would use for your database and why.

Question you have been hired as a security specialist by a

Question: You have been hired as a security specialist by a company to provide methods and recommendations to create a more secure environment for company data. Write a 1- to 2-page recommendation paper outlining methods ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As