Ethical Hacking
Joshua J Hernandez
Park University
Ethical Hacking
Over the years technology has advanced just as Moore’s Law has predicted. Not only does the technology double every year in a compounding way, but those who understand these concepts grow as well. These talented individuals can be looked at from several different viewpoints and depending on who that person may be could in fact determine whether it is a positive viewpoint or a negative one. In this paper I will prove why it is necessary to have Ethical Hackers in today’s security models and how they have come a long way to improve how our information systems operate in a more secure manner.
Hacker’s for years have been able to do things that the normal individuals have never even thought of pursuing and for several different reasons. There are several different types of hackers out there, but they all have one thing in common and that is their knowledge of Information System exploits and vulnerabilities. The constant issues highlighted by the media always reporting some type of cybercrime, a study showing that nearly 90% of attacks happen on the inside (Durant, 2007). The biggest key is that of understanding the hacker’s true intention and determining whether or not it was ethical or malicious. This leads us to first understand what an ethical hacker is and help determine their purpose is a positive venture when wanting to run your organization in a more secure manner.
The term “White Hat” has been slang term that often refers to an ethical hacker, who tends to be a computer security expert. These types of hackers have been known to specialize in penetration testing and help to ensure the security of an organization’s information system. This is unlike other type of hacker’s such as the “BLACK HAT” and the “GREY HAT”. Ethical hackers also carry several other specialized skills such as strong programming skills, networking skills and have been in vetted in the information technology industry for years. One of the more critical traits that all hackers tend to have is patience and has been known to work on difficult tasks outside of normal working hours. Most successful or savvy computer professionals often keep up with new technologies even if they are unfamiliar with such technologies they will take the time to research them to fully understand it. Keeping up with these technologies can not only be time consuming for ethical hackers but understanding the criminal’s that use them in malicious ways can be a lot for one person to manage. With all of these qualities being said, the most important quality that could change a hiring manager’s consideration for selecting a person is trust and a clean background. The best candidates tend to carry not only a clean history, but a higher level of clearance than most generic computer professionals do not require. The difference could range in a background investigation from a Secret clearance to a Top Secret clearance when determining the depth of an investigation. (IBM JOURNAL, VOL 40)
Hacking in general is wrong for any one person to have some sort of gain whether it is financial or personal. Ethical hacking is often performed by trusted “White Hats” to determine an organization’s vulnerabilities in their internal information systems. Most companies will utilize an outside contractor or even a fulltime employee to ensure that their systems are secure as vulnerabilities are announced. The concept of ethical hacking is still considered hacking due to the end result of an information system being compromised, penetrated, and potentially crashed. This type of hacking becomes ethical because it is used to increase the safety of not only the organization, but to reduce the risk of the users within it. It is fairly understood that it takes a criminal to catch a criminal these days. With this type of reasoning if a grey hat hacker can possibly break into a system then most certainly a “Black Hat”
Correctional Health Care Increasing Staff Motivation and Satisfaction MGMT 591: Leadership and Organizational Behavior Professor Brett Gordon December 17, 2012 The organization that will be the topic of discussion in my final project paper is Georgia Health Sciences Universities (GHSU), Georgia Correctional Healthcare (GCHC) division. GHSU is both a hospital and teaching institution based in Augusta, Georgia. GHSU was founded in 1828. Georgia Health Sciences University is home to…
companies use shady accounting practices to enflate revenue or hide losses, the public can’t get an accurate picture of what they are investing in. The public demanded that something be done, so in 2002 the U.S. govt passed the Sabex-Oxly act. For my term paper I will examine some the corporate scandals that led to the creation of the act. Deragulation was lobbied for hard on wall street during the Bush Presidency. The public was lead to believe that loosing the rules on corporate practices would lead…
Learning activity Term Paper Test for Hidden Bias The Implicit Association Test, tests for unconscious biases. I chose this learning activity to see if I have any hidden biases. I have always believed that I was a straight shooter never putting on a facade or giving a false presentation of myself. To prepare for taking this activity, I made sure that I was in a quiet room, away from any distractions. I concentrated on each activity as they appeared on my computer screen. I chose six categories to…
issues that occur there are many that people may not be aware of, but the ones that will be discussed to explore ethical situations are Unauthorized Access related to software, hardware, network, internet web mining, IT freedom and hacking. This paper examines how each unauthorized access should be handled and provides examples of each related area of security. Security – Unauthorized Access Unauthorized access is known as the act of gaining access to a network, system,…
The Emancipation Proclamation and the Death of an American Hero. Students Name Professor’s Name History 150 Online 10 March 2014 There were many different events that happened during the time of President Abraham Lincoln and the Civil War. President Abraham Lincoln came up with the Emancipation Proclamation which was an effort to help end slavery, eventually leading to the thirteenth amendment to abolish slavery altogether. Sadly his life was cut short. John Wilkes Booth assassinated him…
Progressive Roots - In the beginning of the 1900s, America had 76 million people, mostly in good condition. Then before the first decade of the 20th century, the U.S. would be influenced by a “Progressive movement’ that fought against monopolies, corruption, inefficiency, and social injustice. 1. The purpose of the Progressives was to use the government as an agency of human welfare. - The Progressives had their roots in the Greenback Labor Party of the 1870s and 1880s and the Populist Party…
Community Organization September 16 2013 Compare and Contrast Community Organizations The two community organizations that I choose to compare and contrast is Do-All,Inc and United Way. I have worked with both of these organizations in the past, and they are both really good organizations, and do a lot of improve the overall community. Do-All, Inc. evolved from a dream for a better life for people with disabilities. Do-All, Inc was formed in 1952 by the Bay County Association of Retarded Citizens…
Pediatric Oncology Nursing Did you know that one in one hundred new nurses will become a pediatric oncology nurse? Pediatric oncology nursing is a very demanding and heartwarming career. To be a pediatric oncology nurse means to be a primary care coordinator for the management of patients with cancer. A pediatric oncology nurse will assess patient needs, implementing a plan with appropriate tasks for the patient to gain progress. Not only will the pediatric oncology nurse help with the patient…
Introduction Software as a Service (SaaS) has the potential to transform the way information-technology (IT) departments relate to and even think about their role as providers of computing services to the rest of the enterprise. The emergence of SaaS as an effective software-delivery mechanism creates an opportunity for IT departments to change their focus from deploying and supporting applications to managing the services that those applications provide. A successful service-centric IT, in turn…
he Glass Menagerie is a very character oriented poem. Tom, Amanda, and Laura are all very well developed characters. They all have significant and unique characteristics that are shown well throughout the poem. Tom is the most interesting to me though because of his qualities and even his flaws. Tom has a few different and contradicting characteristics such as he is easily persuaded, his determination and his strong sense of guilt. Tom Wingfield seems to be easily entrapped and persuaded into…