Monday, August 12, 2019

Can Gray Hacking Be Justified Research Paper Example | Topics and Well Written Essays - 1000 words

Can Gray Hacking Be Justified - Research Paper Example Known as the ethical hacker, these persons are perceived almost as a mystery. The interconnectedness of the term ethical with hacking is known as being oxymoron, parallel to calling someone a frank offender. It would seem as although Ethical Hackers, however; may have established a place in our canon of defenses of network assets and that they are here to stay. The wagers today are much advanced and the playing ground encompasses every element of our society: be it be commerce and industry, national security, educational entities, and public/private organizations. The domain of the ethical hacker will grown into all these grounds and the insight derived from skills will have to be integrated into the organ of statistical and practical understanding utilized appropriately to shield informational assets(Harper et al, 2011). According to Harper et al (2011), the ideal for the Ethical Hacker is to be a contributor to the organ of knowledge of network security. With this in their mindset, it is essential that these persons follow a systematic tactic, in approaching their relevant network attacks. The concept of breaking into a customer’s network further must be regarded in light of the ultimate objective of mending it. Here, the Ethical Hacker is presented not one who is self-seeking, rather they must be perceived as being another spoke in the Defense in-Depth plan. The concept of utilitarianism that was initially devised by Jeremy Bethman in the eighteenth century, later to be fully developed by John Stewart Mill in the nineteenth century states that we should at all times act so as to create the greatest ratio of good to evil for everyone concerned with our choices.... The concept of utilitarianism that was initially devised by Jeremy Bethman in the eighteenth century, later to be fully developed by John Stewart Mill in the nineteenth century states that we should at all times act so as to create the greatest ratio of good to evil for everyone concerned with our choices. Utilitarianism with regard to many ethical hypotheses has many strengths and weaknesses. The main strong point for this hypothesis is that it is at all times seeking for the maximum good for the utmost number. This is an excellent strength. Since its, a network strives to maximize pleasure for the greatest number. The major weak point of utilitarianism is that it is highly hard to project the outcome of the action. The results of all conditions are difficult to estimate, so how can we probably apply the imperative of the most happiness for the greatest number if we do not understand who will benefit the greatest every time is still a question that begs for answers. Gray hat defines a cracker or as it is well understood, a hacker who uses a security weakness in a computer system or product for them to show the weakness to the attention of the owners. Unlike a gray hat, a black hat acts without spiteful intention. The objective of a gray is to advance the network and security network. By exposing the susceptibility, the gray hat, however, may offer other hackers the chance to exploit it. This is different from the white who notifies system owners and merchants of the susceptibility with apparently exploiting it in public.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.