Itc506 It Ethics: Ethical Hacking Assessment Answers
Essay1
Penetration testing is also known as ethical hacking. Distinguish white, grey and black hat hackers, from the professional, ethical hacker. In your answer state the extent to which ethical hackers might be the same as or different to white hat hackers.
Essay2
Privacy is currently the most important issue raised by Information and Communication Technology. Discuss the reasons and objections related to this position.
Answer:
Essay 1: Introduction:
Hacking is known as weakness in the computer systems and network for the purpose of exploiting the weakness to gain access. Hacking is considered as using the computers for the purpose of committing fraudulent acts such as Fraud, Privacy, invasion, stealing the personal data, etc. this essay covers the topic related to Penetration Testing V/S Ethical Hacking, difference in White, Grey, and black hat hackers, and lastly essay is concluded with brief conclusion.
Penetration Testing V/S Ethical Hacking:
Generally, it is considered that penetration hacking is very similar to ethical hacking, and sometimes these terms are used interchangeably, but some differences are there which we should observe.
Penetration testing is the term which is specific in nature and it only focus on discovering the vulnerabilities, risks, and target environment for the purpose of securing the system and taking control of the system. In other words, this testing targets the defense system of respective organization which also includes computer system and infrastructure.
On the other hand, Ethical hacking is considered as term which is extensive in nature, and mainly covers all techniques related to hacking and also other attack techniques which are associated with computer. This system of Hacking also ensures that the security related to target system and also discover the security flaws and vulnerabilities. This system is beyond the hacking system but it also safeguards the security for future purpose. Therefore, we can say that penetration testing is the part of ethical hacking (Infosec, 2016; Baloch, 2013).
Difference in white, grey, and black Hat hackers:
Generally, Hackers are differentiated on the basis of Hat such as White hat, Grey hat and Black hat. These terms are derived from old spaghetti westerns because in these bad guys wears black cowboy hat and good guys wear a white hat. For the purpose of determining type of hacker two main factors are considered and these factors are motivations and whether such hackers are breaking the law. These hackers are defined below:
Black hat hackers- Like other hackers black hat hackers have wide knowledge related to break down the computer networks and also bypassing the protocols related to security. They are responsible for malware, and malware is the method through which they can access these systems. The primary objective of black hat hackers is personal or monetary gain, but they also get involved in cyber espionage, protest or sometimes they are just get addicted to the thrill of cybercrime.
These types of hackers getting their feet wet by spreading the malware, and they also want to get experience of hackers who are aiming to steal data mainly information related to financial transactions, information which is personal in nature, and also login credentials. It must be noted that these hackers not only steal data but they also modify or destroy the data as well (Kovacs, 2015).
On the basis of ethic theories, it is clear that these types of hackers are not ethical because their motivations are malicious. They are considered unethical because they are influenced with the feeling of revenge and power.
White hat hackers- these hackers use their knowledge for good purposes and not for any evil purpose, and these hackers are also known as ethical hackers. These hackers are also paid employees or contractors, who are working for companies and they are also known as security specialists and they are trying to find holes in specialization through their hacking. These hackers use same methods as black hat hackers but there is one exception that is they do all these activities with the permission of owner because of which this process becomes completely legal. For the purpose of ethical hacking even several courses, training, conferences and certifications are organized by companies.
On the basis of ethical theories this type of hacking is ethical in nature because their motivations are not malicious, and they are driven by honorable motivations.
Grey Hat Hackers- in life several situations occurred which are not considered as black or white, but they are actually known as grey areas. Grey hat hackers are considered as mixture of both black hat and white hat hackers. In actual, these types of hackers search the vulnerabilities in the system without the permission or knowledge of the owner. In case any issue is found then they will report such issue to the owner and also charge fees for fixing such issue. If owner does not reply than these hackers sometimes post the exploit online for the purpose of world to see.
Generally, intentions of these types of hackers are not wrong they just want to get some benefits from their findings. They do not exploit any vulnerability, but still this type of hacking is considered as not legal because permission is not received by hacker from owner and he just try to attack the system (Hoffman, 2013).
Conclusion:
After considering above facts it is clear that there is various type of hacking and hackers are there. This essay also state the difference and similarities between the penetration test and ethical hacking in which it is found that penetration test is the part of ethical hacking.
Essay 2: Introduction:
Now, this era is known as information age and it can be described as the era where economic activities are mainly based on the information. These changes occurred because of development and use of technology.
All these developments also brings new ethical and juridical problems, and these problems are specially related to various rights of person such as right to access information or right of privacy. These rights are usually threatened the free flow of information and also the protection of owner’s economic interest in case of intellectual property.
In this essay, the main topic of discussion is an ethical issue which is related to right to privacy of the individual which is threatened by the use of technology. Lastly this essay is concluded with brief conclusion (Edewor, 2011).
Ethics and Privacy:
Generally, ethical actions of persons are considered those actions which are performed as per the criteria of those actions which are defined as good actions. It basically defined the good and bad actions of individual. As per the Spinello the main purpose of ethics is to help us behave in honorable manner and attain those basic goods that make us more fully human.
On the other hand, Privacy is defined as those conditions which are considered as exclusion from publicity. Usually, this concept is defined as natural right of the person, and it must be noted that this natural right provides the foundation for the legal right. Therefore, this right to privacy is protected under the private law.
Ethical Implications:
Although it is true that technology play major role in gathering, storage, retrieval and dissemination of information, but the ethical impact of technology relates to the accessibility, inaccessibility and the manipulation of information. These impacts result in possibility of wider as well as simultaneous access of information. Because through implications it becomes very easy to access information related to any person which is private in nature. It is also possible that person is excluded from the information which is necessary and kept in electronic format by using the different security measures such as password protection.
Manipulation of information through technology refers to the integration of information such as merging of the documents, repackaging such as translations of the information and also integration of textual and graphical formats, and it also includes possible alteration of information such as changing the images.
While processing the information through the use technology cannot be considered as ethically neutral. Generally, people refer the use of technology as a value laden process, and even it is determined that ontological status of any document is changed because of technology with accompanying ethical implications. Through these it is specifically known as the manipulation of information by use of technology (Hartman, 2017).
As per Brown, on other side of coin it is correct that various ethical problems are caused because of the use of technology and it is necessary for us to rethink our moral values. Therefore, it is clear that various usages of technology impact the privacy of people which actually manifests the variety of areas.
For the purpose of handling and processing the different categories of information such as private and personal information, and in case of professional information the information deals with following ethical issues:
- It is necessary to decide the category of personal and private information which professional wants to gather, and it must be noted that this questions is very important for entrepreneurs.
- It is necessary that information must be treated with confidential terms, and this issue refers for the information which is obtained through interview. This section also analyse whether it is fair to use such information for any other survey (Britz, 2017).
Conclusion:
In this essay, the main point of discussion is ethical implications related to right of privacy, and after considering all above facts it is clear that use of technology while processing any information will poses important questions and this right is directly relates with the right to freedom and human autonomy.
References:
Britz, J. J. Technology As A Threat To Privacy: Ethical Challenges to the Information Profession. Retrieved on 4th June 2017 from: https://web.simmons.edu/~chen/nit/NIT%2796/96-025-Britz.html.
Hartman, P. L. Technology and Ethics: Privacy in the Workplace. Retrieved on 4th June 2017 from: https://www3.nd.edu/~rbarger/privacyintheworkplace.html.
Edewor, N. Ethics and Social Issues Related to Information Communication
Technology (ICT). Retrieved on 4th June 2017 from: https://www.irma-international.org/viewtitle/43777/.
Victoria parliament. Security and Privacy Issues Relating To Technology AndThe Law. Retrieved on 4th June 2017 from: https://www.parliament.vic.gov.au/images/stories/committees/lawrefrom/technology/barisic_paper.pdf.
Baloch, R. (2013). Ethical Hacking Vs Penetration Testing. Retrieved on 4th June 2017 from: https://www.rafayhackingarticles.net/2012/10/ethical-hacking-vs-penetration-testing.html.
Infosec. Ethical Hacking vs. Penetration Testing. Retrieved on 4th June 2017 from: https://resources.infosecinstitute.com/ethical-hacking-vs-penetration-testing/#gref.
Kovacs, N. (2015). What is the Difference Between Black, White and Grey Hat Hackers. Retrieved on 4th June 2017 from: https://community.norton.com/en/blogs/norton-protection-blog/what-difference-between-black-white-and-grey-hat-hackers.
Hoffman, C. (2013). Retrieved on 4th June 2017 from: https://www.howtogeek.com/157460/hacker-hat-colors-explained-black-hats-white-hats-and-gray-hats/.
Buy Itc506 It Ethics: Ethical Hacking Assessment Answers Online
Talk to our expert to get the help with Itc506 It Ethics: Ethical Hacking Assessment Answers to complete your assessment on time and boost your grades now
The main aim/motive of the management assignment help services is to get connect with a greater number of students, and effectively help, and support them in getting completing their assignments the students also get find this a wonderful opportunity where they could effectively learn more about their topics, as the experts also have the best team members with them in which all the members effectively support each other to get complete their diploma assignments. They complete the assessments of the students in an appropriate manner and deliver them back to the students before the due date of the assignment so that the students could timely submit this, and can score higher marks. The experts of the assignment help services at urgenthomework.com are so much skilled, capable, talented, and experienced in their field of programming homework help writing assignments, so, for this, they can effectively write the best economics assignment help services.