What ethical issues does management require to consider

Assignment Help Computer Engineering
Reference no: EM13470592

A hacker is an individual with technical skills and creative savvy who is willing to push the limits of technology in order to discover the boundaries and weaknesses of a computer or networked system in order to gain unauthorized access to that system. The use of the term hacker often means that the individual is willing to cross ethical boundaries in order to test and gain access to a system. An ethical hacker is an individual hired by an organization to break into the selected organization's information systems but to do so in a principled manner. Ethical hackers use the same methods and techniques used by traditional hackers with one difference, the ethical hacker is someone who is trusted by the organization to discover vulnerabilities or weaknesses in a system and then report these issues back to the organization so that the issues can be fixed. For example, a bank might hire an ethical hacker to test the security of their banking system. If the ethical hacker discovers a method to steal money from the bank undetected, the ethical hacker will report this information and not use it to their advantage.

Ten years ago, the term ethical hacker was viewed as an informal term used by management. It was used to describe individuals that were willing to cross traditional ethical boundaries in order to protect systems from those outside individuals that are not concerned with ethical issues. The primary concern is that an ethical hacker has to be willing to push the ethical boundary to match those conditions that would be used by a traditional hacker. Some security experts state that the term ethical hacker is a misnomer. An ethical hacker seems to imply the same contradiction that we might find in attempting to define an ethical thief.

Using the module readings and the Argosy University online library resources, research perspectives regarding ethical hacking.

Respond to the following:

a) Can the actions of a hacker be ethical and still be effective? Why or why not?

b) What ethical issues does management need to consider when attempting to secure information systems?

c) What are some possible benefits of hiring ethical hackers?

d) What are some possible detriments to hiring ethical hackers?

e) Should management hire ethical hackers to verify the security of their information systems?

f) Give reasons and examples in support of your responses.

Write your initial response in approximately 300 words. Apply APA standards to citation of sources.

Reference no: EM13470592

Questions Cloud

It is desired to decrease width of confidence interval : suppose 1000 2100 is a 95 confidence interval for mu . to make more useful inferences from the data it is desired to
Using resources in your library or online present two : some business and political leaders argue that offshoring is dangerous because it can move jobs from developed
Compare and contrast permutations and distinguishable : compare and contrast permutations and distinguishable permutations.state the fundamental counting principle and explain
A coin is flipped 6 times variable x represents number of : suppose you selected a random sample of n 29 measurements from a normal distribution. compare the standard normal z
What ethical issues does management require to consider : a hacker is an individual with technical skills and creative savvy who is willing to push the limits of technology in
Determine the following probabilities for the stand normal : find the following probabilities for the stand normal random variable fora. pzgt1.23b. pzlt-1.27c. p0.31lez2.68d.
A mean of 38 minutes and standard deviation of 5 minutes : a teacher has determined that the amount of time a student spends working on homework during seminar is a normal random
Get generate random sample of 180 numbers between 1 and 60 : obtain generate a random sample of 180 numbers between 1 and 60. you may use a calculator excel or a table of random
What ethical social and political issues arise with the use : information is data that is framed in a specific context. in this sense information is contextual data that has a level

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd