What ethical issues does management require to consider

Assignment Help Computer Engineering
Reference no: EM13470592

A hacker is an individual with technical skills and creative savvy who is willing to push the limits of technology in order to discover the boundaries and weaknesses of a computer or networked system in order to gain unauthorized access to that system. The use of the term hacker often means that the individual is willing to cross ethical boundaries in order to test and gain access to a system. An ethical hacker is an individual hired by an organization to break into the selected organization's information systems but to do so in a principled manner. Ethical hackers use the same methods and techniques used by traditional hackers with one difference, the ethical hacker is someone who is trusted by the organization to discover vulnerabilities or weaknesses in a system and then report these issues back to the organization so that the issues can be fixed. For example, a bank might hire an ethical hacker to test the security of their banking system. If the ethical hacker discovers a method to steal money from the bank undetected, the ethical hacker will report this information and not use it to their advantage.

Ten years ago, the term ethical hacker was viewed as an informal term used by management. It was used to describe individuals that were willing to cross traditional ethical boundaries in order to protect systems from those outside individuals that are not concerned with ethical issues. The primary concern is that an ethical hacker has to be willing to push the ethical boundary to match those conditions that would be used by a traditional hacker. Some security experts state that the term ethical hacker is a misnomer. An ethical hacker seems to imply the same contradiction that we might find in attempting to define an ethical thief.

Using the module readings and the Argosy University online library resources, research perspectives regarding ethical hacking.

Respond to the following:

a) Can the actions of a hacker be ethical and still be effective? Why or why not?

b) What ethical issues does management need to consider when attempting to secure information systems?

c) What are some possible benefits of hiring ethical hackers?

d) What are some possible detriments to hiring ethical hackers?

e) Should management hire ethical hackers to verify the security of their information systems?

f) Give reasons and examples in support of your responses.

Write your initial response in approximately 300 words. Apply APA standards to citation of sources.

Reference no: EM13470592

Questions Cloud

It is desired to decrease width of confidence interval : suppose 1000 2100 is a 95 confidence interval for mu . to make more useful inferences from the data it is desired to
Using resources in your library or online present two : some business and political leaders argue that offshoring is dangerous because it can move jobs from developed
Compare and contrast permutations and distinguishable : compare and contrast permutations and distinguishable permutations.state the fundamental counting principle and explain
A coin is flipped 6 times variable x represents number of : suppose you selected a random sample of n 29 measurements from a normal distribution. compare the standard normal z
What ethical issues does management require to consider : a hacker is an individual with technical skills and creative savvy who is willing to push the limits of technology in
Determine the following probabilities for the stand normal : find the following probabilities for the stand normal random variable fora. pzgt1.23b. pzlt-1.27c. p0.31lez2.68d.
A mean of 38 minutes and standard deviation of 5 minutes : a teacher has determined that the amount of time a student spends working on homework during seminar is a normal random
Get generate random sample of 180 numbers between 1 and 60 : obtain generate a random sample of 180 numbers between 1 and 60. you may use a calculator excel or a table of random
What ethical social and political issues arise with the use : information is data that is framed in a specific context. in this sense information is contextual data that has a level

Reviews

Write a Review

Computer Engineering Questions & Answers

  Find that exist two elements in s whose sum is exactly x

Since the Computer Science department at Brown believes in doing every- thing through a well defined algorithm, you have to supply these poor guys an algorithm for doing the task, and one that is asymptotically efficient! So, here goes your exact ..

  Programmatic access to a database through the Internet

Programmatic access to a database through the Internet

  Write a paper explaining the business uses of cloud

write a paper explaining the business uses of cloud computing and web 2.0. your paper should be 3-5 pages in length

  What is the role of the world trade organization

define the basic forms of conducting international business (export/import, licensing/franchising, contract manufacturing/outsourcing, joint ventures/alliances, and direct investment), and basic international business strategies (multinternationa..

  What are the some elements of budgets and estimates

Budgets are actually price estimates tied to detailed distribution of revenues. Dissimilar conservative monetary statements, revenue and defeat and cash flow statements.

  Write shell script that display names of all directory files

Write a shell script that displays the names of all directory files, but no other types of files, in the working directory.

  Public vs. private or regulated vs. non regulated indust

Explain the differences in the information policy for a small organization vs. a large one? Whether you think an information policy may be different in a public vs. private or the regulated vs. non regulated industry?

  What is output when the following code fragment is executed

What is the output when the following code fragment is executed?

  Tere was a study released in june 2008 by transportation

our response must be 200 words in length for each questions. you are required to use at least your textbook as source

  Question1 define defense in depth and explain the different

question1. define defense in depth and explain the different layers.2. what is leading security principle in

  Choose two of the security features you recognize and write

third-party assurance providers such as bbbonline inc. and truste sell their services to businesses that want to

  Describe the strengths and weaknesses of the information

Prepare a paper identifying and describing how information systems are used to support the business processes in an organization. You can describe the business processes within your current employer or an organization with which you are familiar. ..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd