Wednesday, May 6, 2020

Study the Role of Hacker-Free-Samples for Students-Myassignment

Question: Discuss about the role of the hacker in different in different aspect of life bringing into consideration the ethical aspect as well as the non-ethical aspect of the hackers. Answer: Introduction The main aspect of the case study is to study the role of the hacker in different in different aspect of life bringing into consideration the ethical aspect as well as the non-ethical aspect of the hackers. The role of the hacker can be justified on various fields ranging from personal need like spying on someone to breaking into a companys database in order to access their client list and other important informations (Ibrahim, Hamlyn-Harris Grundy, 2016). Utilitarianism Theory Putting emphasis on the case study it can be stated that the role of hacker is playing a vital role in every aspect of life is it for their benefit or for the benefit of other person. It was noted that people across the world ranging from Sweden to Australia were using anonymously request of the hacking service. Some of the job related to it very legal and the other were not clear for example an Australian wanted to hack his rivals customer database. The white hat hackers are categorized in the good hackers zone, they are the computer expert who are mainly specialized in testing and other mythological aspects which is done mainly to ensure that the companys information system are secured from any breaches (Maqbool, Pammi Dutt, 2016). The job description that the hacker used in the description did not match or could not be linked to the information that would directly or indirectly reveal their identity. As stated by (Hausken, 2017) the different sites was in fact leaking information that was linked to the buyer in the prospective of their name and address to the job description. This would reveal the identity and their main motive behind hiring a hacker. This would make a potentially embarrassing effect on anyone and it made them think twice before hiring a hacker online. The people wanted to hire a hacker for many roles in order for their own benefit ranging from gaining access to their own account, some wanted to change their grade and some surprisingly wanted to spy on their spouses (Maqbool, Pammi Dutt, 2016). Deontology Theory A wife stated that she thinks that her husband is cheating on her as a result of which she wanted to hire a hacker in order to hack into her husbands Watsapp account. As a respond of which one person notability a hacker offered between $300 and $500 for the job and listed a username and a NSW home address (Berger Jones, 2016). An enterprise user from the Western Australia sought a semi unethical hacker to hack into the database behind the tertiary institute service centre for $100 to $1000. It was not clear that the hacking the web site was ever carried out or not. Virtue Theory The hacker itself is not related to the cost of anyone and thus hackers should be considered to be ethical, it was simply in order to help someone beat a flawed system to advance in the field of education was the common aspect according to the common people (Hausken, 2017). Hackers can be categorized as bad and good hackers (Ibrahim, Hamlyn-Harris Grundy, 2016). The white hat hackers are categorized in the good hackers zone, they are the computer expert who are mainly specialized in testing and other mythological aspects which is done mainly to ensure that the companys information system are secured from any breaches. These It security personals depend highly on the evolution of the technology in order to match with the battle of hacking (Maqbool, Pammi Dutt, 2016). A black hat hacker is a bad boy who is typically termed as just a plain hacker. The term is used in some part with respect to the hacker who breaks into a personal network or computer or is involved in creating computer viruses. The hackers in this category often manage different paths of least resistance whether due to laziness or human error. They can be further being divided into two parts or categories as active hackers and passive attackers. An active hacker is someone who takes the i nformation and modifies it according to their own requirement on the other hand a passive attacker just reads or obtains the message and uses it for its own benefit. The difference between an active hacker and a passive hacker is that an active attacker can be detected quite easily and a passive attacker is very difficult to detect because they do not do any sort of modification on the message and thus remain unnoticed.] Contract Theory According to the Australian law a person who commits the crime of hacking faces imprisonment between two and ten years depending upon the offence committed. If someone hires a hacker in order to do something but the person does not do anything or play any role in the activity both are liable for the punishment (Abbasi, Bahramian Salami, 2016). The type of job which is offered on the hackers list wont be of surprise to the professional IT security contractors who eventually draw the line at customer testing with the permission as opposed to their customers rivals. The threat intelligence team always gets a handful of calls each year from different individuals who put their query as to whether their account is being hacked or someone else is in the verge of doing so. Their put their request of investigation and on the other hand some want to break into others account as they believe that they are being targeted for reasons that can be personal as well as business related aspects (Youn g et al., 2017). Conclusion In some cases the information which is given to the hacker is not at all safe for safe. The hacker can retain the information and make use of the information in order to achieve their personal benefit (Brakerski Rothblum, 2017). The role which is played by the hacker can be varies in many instances depending upon the task they are appointed and the role they have to play in each context. The data which is given to the hacker can be used in the near future in order to detect the person (Trabelsi McCoey, 2016). It has been already been stated that if a person hires a hacker for some personal reason or to achieve a goal and the person does not play any role in it, but by the law the person is also liable for punishment and would be convicted of the crime. There are many hackers who play the role of a so called term ethical hacker. They are usually appointed by an organization in order to prevent their data and their system from the hand of the hacker. They play a vital role in every a spect of the organization (Abbasi, Bahramian Salami, 2016). References Abbasi, E., Bahramian, R., Salami, S. (2016). Ranking multidisciplinary industrial investment firms' performance Hierarchical method (AHP)(Case Study: Shasta companies, Ghadir, Omid, Social Security and National Development). Management, 3(8), 1-14. Abu-Shaqra, B., Luppicini, R. (2016). Technoethical Inquiry into Ethical Hacking at a Canadian University. International Journal of Technoethics (IJT), 7(1), 62-76. Berger, H., Jones, A. (2016, July). Cyber Security Ethical Hacking For SMEs. In Proceedings of the The 11th International Knowledge Management in Organizations Conference on The changing face of Knowledge Management Impacting Society (p. 12). ACM. Brakerski, Z., Rothblum, G. N. (2017). Adaptive security is a strong security notion that captures additional security threats that are not addressed by static corruptions. For instance, it captures real-world scenarios where hackers actively break into computers, possibly while they are executing secure protocols. Studying this setting is interesting from both theoretical and practical points of view. A primary building block in designing... Journal of Cryptology, 30(1), 289-320. Hausken, K. (2017). Security Investment, Hacking, and Information Sharing between Firms and between Hackers. Games, 8(2), 23. Ibrahim, A. S., Hamlyn-Harris, J., Grundy, J. (2016). Emerging security challenges of cloud virtual infrastructure. arXiv preprint arXiv:1612.09059. Manes, E. (2016). U.S. Patent Application No. 15/268,065. Maqbool, Z., Pammi, V. C., Dutt, V. (2016). Influence of Motivational Factors on Hackers and Analysts Decisions in Dynamic Security Games. In Advances in Human Factors in Cybersecurity (pp. 239-251). Springer International Publishing. Trabelsi, Z., McCoey, M. (2016). Ethical hacking in information security curricula. International Journal of Information and Communication Technology Education (IJICTE), 12(1), 1-10. Young, J., Campbell, K., Fanti, A., Johnson, S., Sells, Z., Sutter, A. (2017). The Development of an Applied Ethical Hacking and Security Assessment Course

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.