What are the ethical dilemmas involved

Assignment Help HR Management
Reference no: EM131847330

Thinking Like the Enemy David and Barry Kaufman, the founders of the Intense School, recently added several security courses, including the five-day "Professional Hacking Boot Camp" and "Social Engineering in Two Days." Information technology departments must know how to protect organizational information. Therefore, organizations must teach their IT personnel how to protect their systems, especially in light of the many new government regulations, such as the Health Insurance Portability and Accountability Act (HIPPA), that demand secure systems. The concept of sending IT professionals to a hacking school seems counterintuitive; it is somewhat similar to sending accountants to an Embezzling 101 course.

The Intense School does not strive to breed the next generation of hackers, however, but to teach its students how to be "ethical" hackers: to use their skills to build better locks, and to understand the minds of those who would attempt to crack them. The main philosophy of the security courses at the Intense School is simply "To know thy enemy." In fact, one of the teachers at the Intense School is none other than Kevin Mitnick, the famous hacker who was imprisoned from 1995 to 2000. Teaching security from the hacker's perspective, as Mitnick does, is more difficult than teaching hacking itself.

A hacker just needs to know one way into a system, David Kaufman noted, but a security professional needs to know all of the system's vulnerabilities. The two courses analyze those vulnerabilities from different perspectives. The hacking course, which costs $3,500, teaches ways to protect against the mischief typically associated with hackers: worming through computer systems through vulnerabilities that are susceptible to technical, or computer-based, attacks. Mitnick's $1,950 social engineering course, by contrast, teaches the more frightening art of worming through the vulnerabilities of the people using and maintaining systems-getting passwords and access through duplicity, not technology.

People that take this class, or read Mitnick's book, The Art of Deception, never again think of passwords or the trash bin the same way. So how does the Intense School teach hacking? With sessions on dumpster diving (the unsavory practice of looking for passwords and other bits of information on discarded papers), with field trips to case target systems, and with practice runs at the company's in-house "target range," a network of computers set up to thwart and educate students.

One feature of the Intense School that raises a few questions is that the school does not check on morals at the door: Anyone paying the tuition can attend the school. Given the potential danger that an unchecked graduate of a hacking school could represent, it is surprising that the FBI does not collect the names of the graduates. But perhaps it gets them anyhow-several governmental agencies have sent students to the school.

Questions

1. How could an organization benefit from attending one of the courses offered at the Intense School?

2. What are the two primary lines of security defense and how can organizational employees use the information taught by the Intense School when drafting an information security plan?

3. Determine the differences between the two primary courses offered at the Intense School, "Professional Hacking Boot Camp" and "Social Engineering in Two Days." Which course is more important for organizational employees to attend?

4. If your employer sent you to take a course at the Intense School, which one would you choose and why?

5. What are the ethical dilemmas involved with having such a course offered by a private company?

Reference no: EM131847330

Questions Cloud

Describe two methods for minimizing clustering : Describe two methods for minimizing clustering. Name four advantages of a chained hash table over open addressing.
Explain the biological predisposition theory : Explain the biological predisposition theory for the development of alcoholism. How might social/cultural influences interact with a biological predisposition
What objectives should be sought in design of hash function : What objectives should be sought in the design of a hash function? Name three techniques often built into hash functions.
What is the percent strength of juice in the first : In the first solution pour 67mL of juice b and 29mL of juice. What is the percent strength of each juice in the first solution?
What are the ethical dilemmas involved : How could an organization benefit from attending one of the courses offered at the Intense School?
Propose resolution to the social and criminal justice issue : Propose the resolution to the social and criminal justice issue. Identify a clear thesis statement to address your chosen criminal and social justice issue
What operations are available for an abstract table : What operations are available for an abstract table? What operations are usually easier for a list than for a table?
Discuss the principal- agent problems : If mergers and acquisitions quite often end up providing a competitive disadvantage, why do so many of them take place? Given the poor track record.
Administering anti migraine medication : What are the key lifespan considerations for an adult when administering anti migraine medication?

Reviews

Write a Review

HR Management Questions & Answers

  Improve problem solving capabilities within organization

Types of teams as to their effectiveness that will improve problem solving capabilities within organizations.

  Influence tactics help in reducing organizations politics

Explain the different types of influence tactics that will be of a help “if adopted” in reducing the organizational politics.

  Report on citigroup''s hr service level agreement

Human Resources or Human Resource Management deals with HR Service Level Agreement. HR Service Level Agreement is an agreement made between the employer and the employee, which states that the employee would work under any client and sometimes any ti..

  A project report on hrm

Human Resource Management as the name suggests, it is a management discipline which deals with the human i.e. the workforce aspect of organizations. Need and practices of HRM are inevitable in present scenario of extreme competition where "Talent War..

  Hrp: recruitment and selection

Recruitment and Selection is the initial ladder of any Human Resource Planning process and contains an immense significance for any organisation.

  A project report on study of statutory complainces

Statutory compliance and its immense knowledge are crucial to be understood in an organization. It contains all the forms, procedures and acts applicable in a company.

  Operant conditioning and Reinforcement

Operant conditioning is a learning process where behaviour is controlled by its consequences. In this process an individual's behaviour can be modified through the use of positive or negative reinforcement.

  Effectiveness of training programs in achieving customers an

The main motive for conducting this research is to provide broad range of research of the literature and their reviews related to training and development and assisting the employees in providing customers satisfaction.

  A critical analysis of hr processes and practices in fedex c

FedEx is illustrious for its novel HR processes and practices that have greatly accounted for its success.

  Integrating culture and diversity in decision making

People in the organization are known as Google where they share common goals and have common vision.

  Impact of employee attrition on people management in organis

Talent management implies recognizing a person's inherent skills, traits, personality and offering him a matching job.

  Labour dissonance at maruti suzuki india limited: a case stu

This Case Study focuses on various issues related to Labour Unrest at Maruti Suzuki India Limited.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd