Wednesday, December 18, 2019

Ethical Hacking And Information Security Essay - 2390 Words

Ethical Hacking and Information Security Merriam-Webster defines Hacker as, a person who secretly gets access to a computer system in order to get information, cause damage. But what if I told you that having a hacker is necessary? Ethical Hacking is paramount to the security of our Information Technologies (IT). The task of testing your computers and network for security vulnerabilities and plugging the vulnerabilities you find before the opposition gets a chance to exploit them. Without having the ability to do what devious personnel can do inside your IT, you will never fully understand the holes in your security. It all began in the 1960s at MIT, origin of the term â€Å"hacker†, but the science dates back to 1903 to the first ever documented hacking of an electronic device. In 1932, Marian Rejewski hacked the German Enigma Machine. The Enigma machine was an electromechanical device, equipped with a 26-letter keyboard and 26 lamps, relating to the letters of the alphabet. Inside was a set of wired drums (rotors and a reflector) that jumbled the input. The Enigma used a plug-board to swap pairs of letters, and the encryption varied from one key press to the next. For two operators to communicate, both Enigma machines had to be set up in the same way. The large number of possibilities for setting the rotors and the plug-board combined to form an exponential number of configurations, and the settings were changed daily, so the machine code had to be broken each day. Marian’sShow MoreRelatedEthical Ethics And Ethical Hacking968 Words   |  4 Pagesdevelopment and issue is ethical hacking. To understand ethical hacking one must be able to define what it means to be a hacker. â€Å"A hacker is an individual who intends to gain unauthorized access to a computer system† (Laudon Traver, 2015). Oxford Dictionaries defines an ethical hacker as â€Å"a person who hacks into a computer network in order to test or evaluate its security, rather than with malicious or criminal intent† (Ethical Hacker, n.d.). In other words, an ethical hacker aims to discover ifRead MoreHacking And Its Effect On Human Behavior Essay1608 Words   |  7 PagesHacking in computer networking is the desire to manipulate the normal behaviour of a network connection or a connected system, a hacker is the person who is instigating the hack. In today’s society, we generally refer to any malicious programming attack over the internet or a network to be hacking. Hacking originated between the 1950s and 60s by M.I.T engineers, they originally were meant for learning and experi ment purposes and usually took place at the ‘model train club’. However, these attacksRead MoreEthical Hacking1028 Words   |  5 PagesThe improvement of systems security to prevent criminal hacker has become an important concern to society. There are many ways to protect those information systems; it seems that the Ethical Hacking is a better way. Therefore, whether to teach or not teach the Ethical Hacking as a course in Tertiary education has become an interesting argument. In this article will analysis the ethical, legal, and ethical implications of this issue. In order to discuss the ethical, legal, and social implicationsRead MoreChallenges Faced By Computer Network Security1501 Words   |  7 PagesAbstract- The rapid development in computer network technology leads to the security challenges faced by it at every step of its growth. Three main threats facing computer network security include: hackers, computer virus and denial of service attack. Safety factors of the network are mainly: resources sharing, data communication, computer virus and TCP/IP protocol security flaws. A safety network system should include at least three kinds of measures: legal measures, technical measures and reviewRead MoreCybercrime And Internet Hacking And Its Effect On The Security Of The Internet1386 Words   |  6 Pagesinternet hacking has been an ongoing issue in contemporary life. â€Å"Internet hacking is the practice of modifying or altering computer software and hardware to accomplish a goal considered to be outside of the creator’s original objective.† (Merriam-Webster). Any individual, business, or even government with a computer is not safe from these computer criminals. So, the main question is: How do we fix this cybercrime that does millions of dollars in damage, and should we implement â€Å"ethical hacking† to improveRead MoreHacking Can Not Be Ethical1681 Words   |  7 PagesHacking cannot be considered ethical due to the fact that it damages a company s reputation. Hackers have no care in the world about the negatives that happen to you. They may not have anything against you but what you stand for. Erickson wa s the owner of a website known for political debates was hacked and his page on which he spent thousands of dollars on was hacked by Anonymous and became malicious. â€Å"Erickson spent $1,500 to rebuild his site with enhanced security measures. He also spent a considerableRead MoreEthical Hacking : A Breach Of Security1457 Words   |  6 Pageshas had a breach of security in their network. These breaches lead to large amounts of stolen or compromised information as well as the loss of services within that company. In many of these cases the breach could probably been prevented had the company been able to find the vulnerabilities in the network. This is where ethical hacking comes into the program. Before delving into ethical hacking we must first understand what hacking really is. As defined by dictionary.com hacking means to modify aRead MoreEthics : Ethical Hacking Gaining Access1695 Words   |  7 PagesEthical Hacking Gaining Access Name Institution Ethical Hacking Gaining Access Introduction Ethical hacking is the testing of access to a system, also known as white hacking. The process entails similar tools, methods, and techniques that most hackers employ though with a legal aspect to it. The goal of hacking is done with the permission of the intended target with a goal to show varied areas of weaknesses from the hacker’s perspective. It is part of information risk management allowingRead MoreNetwork Infrastructure Attacks Against Network Infrastructures Essay1227 Words   |  5 Pagesa major security issue separately. But, resolving all vulnerabilities simultaneously can prove to be dangerous for computer system. Non technical attack: Exploits that involve manipulating people- end users and even yourself are the greatest vulnerability within any computer or network infrastructure. Humans are trusting by nature, which can lead to social engineering exploits. Social engineering is defined as the exploitation of the trusting nature of human beings to gain information for maliciousRead MoreUsing The Command, Arp -s1543 Words   |  7 Pagesperiodically running full system anti-malware scans. †¢ Socially Engineered Attacks :- Some cyber attackers try to trick you into handing over private information through misdirection: socially engineered attacks do not use any malicious software. Phishing is a type of socially engineered attack that tricks you into entering personal information like social security numbers, credit card numbers account passwords by sending a link through an email that claims to be from a legitimate service , but redirects

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.