Write review about the article

Assignment Help Software Engineering
Reference no: EM132058909

Write review about the article with references.

In the world of cyber security and operating as a white or grey that will always bring in the role of ethics. Ethics can help us decide between operating with the best intentions or worst.

We may want to run a vulnerability scan at our place of work to see what we can do to help, although this is done with the best intentions it could also break something. We are in the ethical right but in the real wrong. Ethical behavior in gathering information should be strictly outlined before any work is done. This is imperative for the engineer's success and the company's success.

Each scanning and enumerating item can cause damage or raise red flags to any production network. If the network is being monitored, it may drive the network engineer crazy if they think something happened, or it might disable a port that is currently in use or cause a switch to go into catastrophic failure.

There are plenty of risks to be had without consent. Consent is the easiest way to ensure that you have integrity in your work. Before a vulnerability assessment can be done, it would be advantageous have the user sign an agreement removing all penalty from the assessment in the event something goes wrong. In the course text book Walker explicity outlines that scenario and how it protects the firm and engineer.

Ethical behavior is doing something with good intentions and unethical is doing something with malicious intentions. With permissions a normally malicious action can lead to the greater good, while a normally malicious action with good intentions without permission is bad. That is the grey area. Perceived intention to a action driven by good could create issues.

That is why it is always imperative to have permission before doing anything. There can always be consequences to unethical behavior. Being unethical means you are breaking some sort of code. Depending on scenario, consequences could be your name being tarnished, your business being tarnished, people losing their jobs, you losing your job or your job losing clients.

For example, if you work for a managed service provider and you decide it would be good to run a vulnerability assessment on a client server without permission, it could hurt the reputation of your employer and cause the client to lose trust in the operation.

This impacts people other than just yourself. You should always think of the consequences of your actions prior to making any major decision. We can learn from Eve in the garden of Eden.

When the devil offered her the fruit in the garden she did not think it through. She did not think of the consequences that were on-hand and what impact it could have on those around her (Adam). She was able to be manipulated into making those poor decisions.

Everyday we as humans live with the original sin, I know that as humans we make mistakes but we can mitigate some of those Walker, M. (2017). CEH Certified Ethical Hacker All-in-One Exam Guide, Second Edition, 3rd Edition. McGraw-Hill/Osborne.

Verified Expert

Ethical and moral aspects of white and grey hats are some of the issues discussed in this article. Typical questions like how they do judge the behaviour of the person in general in cyber security context and what can be interfered and how consent contributes to smooth testing etc discussed. The article is reviewed.

Reference no: EM132058909

Questions Cloud

What is expected value : If the four numbers come up in the order you picked, then you win $2,500. What is your expected value?
Tenancy towards conservatism : In statistical thinking there is a tenancy towards conservatism. The investigators, enthusiastic to obtain positive results
What is the general journal entry to liquidate : All is subject to FICA Social Security (6.2%), What is the general journal entry to liquidate the liabilities accrued in parts (a) and (b) on January 22
Describe the importance for maintaining an ethical culture : The CEO has assigned you the responsibility of educating the leaders within the organization of the importance of maintaining an ethical culture.
Write review about the article : You should always think of the consequences of your actions prior to making any major decision. We can learn from Eve in the garden of Eden
Contract to dig holes for government installation : Dig Co has a big contract to dig holes for a government installation.
Violate the principles of free trade : However, countries like US also give subsidy to companies and farmers, are their economies really 'free'? How should we view subsidy in economy after all?
What would be the effect on the company overall net income : What would be the effect on the company's overall net operating income of dropping product S85U? Should the product be dropped? Show your work
Theory of comparative advantage : In international economics, the foundation of free trade is based on the theory of comparative advantage. For example, (an unrealistic and simple one)

Reviews

inf2058909

9/12/2018 12:38:59 AM

I got a superb essay from Experts mind. The topic was bit difficult and it was really harder for me to solve it by myself as the expert did it and gave me top-notch solution. Also, I want to appreciate the time and research that went in to my assignment. Thanks for your help !

Write a Review

Software Engineering Questions & Answers

  Research report on software design

Write a Research Report on software design and answer diffrent type of questions related to design. Report contain diffrent basic questions related to software design.

  A case study in c to java conversion and extensibility

A Case Study in C to Java Conversion and Extensibility

  Create a structural model

Structural modeling is a different view of the same system that you analyzed from a functional perspective. This model shows how data is organized within the system.

  Write an report on a significant software security

Write an report on a significant software security

  Development of a small software system

Analysis, design and development of a small software system.

  Systems analysis and design requirements

Systems Analysis and Design requirements

  Create a complete limited entry decision table

Create a complete limited entry decision table

  Explain flow boundaries map

Explain flow boundaries map the dfd into a software architecture using transform mapping.

  Frame diagrams

Prepare a frame diagram for the software systems.

  Identified systems and elements of the sap system

Identify computing devices, which could be used to support Your Improved Process

  Design a wireframe prototype

Design a wireframe prototype to meet the needs of the personas and requirements.

  Explain the characteristics of visual studio 2005

Explain the characteristics of Visual Studio 2005.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd