What ethical issues does management require to consider

Assignment Help Computer Engineering
Reference no: EM13470592

A hacker is an individual with technical skills and creative savvy who is willing to push the limits of technology in order to discover the boundaries and weaknesses of a computer or networked system in order to gain unauthorized access to that system. The use of the term hacker often means that the individual is willing to cross ethical boundaries in order to test and gain access to a system. An ethical hacker is an individual hired by an organization to break into the selected organization's information systems but to do so in a principled manner. Ethical hackers use the same methods and techniques used by traditional hackers with one difference, the ethical hacker is someone who is trusted by the organization to discover vulnerabilities or weaknesses in a system and then report these issues back to the organization so that the issues can be fixed. For example, a bank might hire an ethical hacker to test the security of their banking system. If the ethical hacker discovers a method to steal money from the bank undetected, the ethical hacker will report this information and not use it to their advantage.

Ten years ago, the term ethical hacker was viewed as an informal term used by management. It was used to describe individuals that were willing to cross traditional ethical boundaries in order to protect systems from those outside individuals that are not concerned with ethical issues. The primary concern is that an ethical hacker has to be willing to push the ethical boundary to match those conditions that would be used by a traditional hacker. Some security experts state that the term ethical hacker is a misnomer. An ethical hacker seems to imply the same contradiction that we might find in attempting to define an ethical thief.

Using the module readings and the Argosy University online library resources, research perspectives regarding ethical hacking.

Respond to the following:

a) Can the actions of a hacker be ethical and still be effective? Why or why not?

b) What ethical issues does management need to consider when attempting to secure information systems?

c) What are some possible benefits of hiring ethical hackers?

d) What are some possible detriments to hiring ethical hackers?

e) Should management hire ethical hackers to verify the security of their information systems?

f) Give reasons and examples in support of your responses.

Write your initial response in approximately 300 words. Apply APA standards to citation of sources.

Reference no: EM13470592

Questions Cloud

It is desired to decrease width of confidence interval : suppose 1000 2100 is a 95 confidence interval for mu . to make more useful inferences from the data it is desired to
Using resources in your library or online present two : some business and political leaders argue that offshoring is dangerous because it can move jobs from developed
Compare and contrast permutations and distinguishable : compare and contrast permutations and distinguishable permutations.state the fundamental counting principle and explain
A coin is flipped 6 times variable x represents number of : suppose you selected a random sample of n 29 measurements from a normal distribution. compare the standard normal z
What ethical issues does management require to consider : a hacker is an individual with technical skills and creative savvy who is willing to push the limits of technology in
Determine the following probabilities for the stand normal : find the following probabilities for the stand normal random variable fora. pzgt1.23b. pzlt-1.27c. p0.31lez2.68d.
A mean of 38 minutes and standard deviation of 5 minutes : a teacher has determined that the amount of time a student spends working on homework during seminar is a normal random
Get generate random sample of 180 numbers between 1 and 60 : obtain generate a random sample of 180 numbers between 1 and 60. you may use a calculator excel or a table of random
What ethical social and political issues arise with the use : information is data that is framed in a specific context. in this sense information is contextual data that has a level

Reviews

Write a Review

Computer Engineering Questions & Answers

  Write a program to solve linear system

Consider the matrix A in its LU decomposed form denoted by Alu. Given a matrix Alu and a vector b as an input: write a program to solve linear system Ax = b. You have to solve using Lg=b and Ux=g euations.

  Get the cylinder class from the base circle class

Get the cylinder class from the base circle class

  Questionfirst national banks president congratulates you on

questionfirst national banks president congratulates you on successfully managing her network addressing issues. she

  Define the way for creating work breakdown structure

Define the way for creating work breakdown structure Use a hypothetical project to illustrate your understanding of the WBS.

  Explain why you think the impact will or will not occur

Based on this description, the group should develop an analysis of the impacts such a development would have on one of the following: corporate sales and marketing, manufacturing, or management consulting.

  Question1 add following 16-bit 2s complement numbers

question1 add following 16-bit 2s complement numbers represented in hex assume word size of computer is 16 bits - fe59

  What is the capacity of the drive

Given the instruction set for MARIE in this chapter, decipher the following MARIE machine language instructions. (Write the assembly language equivalent.)

  Outline a plan for the development of an addressing and

write a three to four 3-4 page paper in which you1 outline a plan for the development of an addressing and naming model

  What is the role of the world trade organization

define the basic forms of conducting international business (export/import, licensing/franchising, contract manufacturing/outsourcing, joint ventures/alliances, and direct investment), and basic international business strategies (multinternationa..

  Preliminary project plan for an important internal project

You have been hired by the Client to provide a preliminary Project Plan for an important internal project. Client staff support the project and have secured Board approval for MIT Consulting to take the project to the next phase.

  Solve the problem using python programming

Solve the problem using PYTHON Programming

  Recognize five potential risks for new project

Recognize five potential risks for new project, being sure to write some negative and positive risks. Give a detailed description of each risk and propose strategies for addressing risk.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd