logo

Article | ANALYSIS OF CYBERSECURITY

   

Added on  2022-08-12

5 Pages1297 Words10 Views
Running Head: ANALYSIS OF CYBERSECURITY 1
Cybersecurity: Analytical reading and writing
Student’s Name
Institution

ANALYSIS OF CYBERSECURITY 2
The analysis of this weekly reading executes the knowledge and understanding of
cybersecurity. Cases surrounding the gist of security in computer applications are rising
throughout the world in each economic sector. There is a need to understand “Why” hackers are
striving to develop this unregulated and casual doing to professional practice. The analysis is set
under empirical knowledge, metaphysics studies, and realism concepts. Critical and creative
thinking applies to offer critiques on the content through inductive and deductive reasoning.
The understanding of this week's analysis revealed the fatal implications of hacking,
which can be assumed. How did this action of hacking gain power? As an organization in the
United States suffer losses; as a result, the effect is gaining control over the computer application
industry, turning to a game between hacker and anti-hacker (Hutchings and Hayes, 2019).
Computer experts are generating millions of dollars to prevent hackers, whereas the hackers are
mining twice amount as anti-hackers. The theory of code of conduct can define these two parties
are fighting daily to earn a living through this evolving profession.
What are the actions definable as hacking? According to (Bok, 2018), the action involves
pinpointing and manipulating dimness in either a computer networks or system. Hacking may
also refer to an unconventional way of doing something with influence to the public. Ethical
theory of “Virtue Ethics” can be linked with the analysis, it explains which professional public
virtues a person should possess or undertake without harm effect to the other.
Who can be classified as a hacker, and under which two types? During the reading of
chapter titled “The Ethical Hacker” under Cybersecurity, a hacker was defined as a skillful
computer programmer, who is capable of identifying and manipulating computer systems or
network (Allen, 2006). The term has slighted to a meaningful phrase "Security Hacker", to
describe the individual which powered skills and knowledge of using bugs or exploits purposely

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Ethical Hacking and Penetration Testing
|3
|417
|96

Cyber security : Assignment PDF
|5
|1139
|160

An Ethical Dilemma: Operating from the Frontline of Cyber Security
|10
|2768
|284

Penetration Testing: Ethical and Legal Issues, Methodology, and Full Scale Testing in Kali Linux
|20
|2559
|88

Theory and Practices of Hacking
|12
|3083
|312