Write review about article - ethical nature of scanning

Assignment Help Software Engineering
Reference no: EM132058938

Write review about this article with references.

I agree with the SANS Institute that the ethical nature of scanning is not clear-cut or black and white. The SANS Institute states, "While scanning is widely held to be a malicious activity, professionals use the technique regularly to diagnose network problems and to detect vulnerabilities on their own network.

The legitimacy of a port scan is often determined by the circumstances surrounding the incident in an attempt to establish intent," (Jamieson, 2001). This of course leaves a great many grey areas that can be found between the black and white areas. The consequences from being caught scanning hosts on a network can range from a slap on the wrist to being fired for perceived misconduct. The SANS Institute states, "The evaluation of the intent behind a scan is at best an imperfect science.

This makes dealing with scanning in policies difficult and creating laws regarding it nearly impossible," (Jamieson, 2001). Behavior deemed unethical, of course, gets the heavier repercussions and depending on the scope of the intent could have a higher range of consequences, from being fired to doing jail time.

There are many biblical points that can be made about a person who might consider when weighing the pros and cons of a potentially hazardous scan. First we have to remember what Colossians tells us, "Whatever you do, work heartily, as for the Lord and not for men," (Colossians 3:23, ESV). If the scan is necessary and there is a question as to there being a vulnerability then maybe the proper starting point is bring it up to those in charge of managing the system before taking matters into one's own hands.

Another verse I like is in Proverbs, "Whoever conceals his transgressions will not prosper, but he who confesses and forsakes them will obtain mercy," (Proverbs 28:13, ESV) which I feel fits since running scans without permission from the company or at least the IT department could seem a bit shady and if a person then found a vulnerability she would be required to make the decision to take that information now to the company or IT department since that is the right thing to do or go down the path of a not so ethical hacker and thus "not prosper."

To further drive this point home, since we hope for the best in people and we ourselves are learning more about and how to be ethical hackers, another Proverbs verse that pertains to us and reminds us to be our best says, "Better is a poor man who walks in his integrity than a rich man who is crooked in his ways," (Proverbs 28:6, ESV). We have to ask ourselves what is our integrity worth and understand our integrity is priceless.

My father likes to say it is better to be safe than sorry and I am an advocate for prepare for the worst and pray for the best. These put in my mind to take all the precautions to help keep my family and me safe by not doing anything that might jeopardize that. Jamieson, S. (2001). The Ethics and Legality of Port Scanning.

Verified Expert

Port scanning and ethics and legalities contained in that is the article reviewed here. The inherent principles of ethics and underlying legal aspects are discussed here. Further there is focus on the biblical symphony of the issues relevant to the context. References provided.

Reference no: EM132058938

Questions Cloud

Estimate the median income of females in the us : The U.S. Census Bureau needs to estimate the median income of females in the U.S., they collect incomes from 3500 females.
What is the sales volume variance and sales price variance : Master Budget: Price=$300; Sales Volume=6,000; Unit VC=$100; Fixed Costs=$250,000. What is the Sales Volume Variance and Sales Price Variance
What options do you have if your assumptions are not met : If you are comparing counts of two unrelated nominal variables with a chi-square test, what remaining assumption you need to check before continuing?
How much was invested at the beginning : An investment allows for end-of-year payments that grow by 3% per payment for 20 years, how much was invested at the beginning
Write review about article - ethical nature of scanning : Write review about this article with references - professionals use the technique regularly to diagnose network problems and to detect vulnerabilities
Discuss governmental entities at all levels of government : Grants originate from governmental entities at all levels of government, from foundations and from companies. Governmental entities apply for grants.
Compute the number of each product sold : Tress Enterprises manufactures shampoo and conditioner. Last year, Tress sold 120,000 bottles of product. Compute the number of each product sold
Prepare a budgeted income statement for the month of may : Kelley and Wright, Attorneys, have the following budgeted items for the month of May: Prepare a budgeted income statement for the month of May
What information do regression coefficients give : What information do regression coefficients give?

Reviews

inf2058938

9/3/2018 3:30:07 AM

This assignment is about Software Engineering and experts did really well and justified the assignment. I am very thank full to them as I got grade A and the solution with no plagiarism..

Write a Review

Software Engineering Questions & Answers

  Research report on software design

Write a Research Report on software design and answer diffrent type of questions related to design. Report contain diffrent basic questions related to software design.

  A case study in c to java conversion and extensibility

A Case Study in C to Java Conversion and Extensibility

  Create a structural model

Structural modeling is a different view of the same system that you analyzed from a functional perspective. This model shows how data is organized within the system.

  Write an report on a significant software security

Write an report on a significant software security

  Development of a small software system

Analysis, design and development of a small software system.

  Systems analysis and design requirements

Systems Analysis and Design requirements

  Create a complete limited entry decision table

Create a complete limited entry decision table

  Explain flow boundaries map

Explain flow boundaries map the dfd into a software architecture using transform mapping.

  Frame diagrams

Prepare a frame diagram for the software systems.

  Identified systems and elements of the sap system

Identify computing devices, which could be used to support Your Improved Process

  Design a wireframe prototype

Design a wireframe prototype to meet the needs of the personas and requirements.

  Explain the characteristics of visual studio 2005

Explain the characteristics of Visual Studio 2005.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd