logo

Ethical Hacking Assignment

19 Pages5428 Words271 Views
   

Added on  2020-05-04

Ethical Hacking Assignment

   Added on 2020-05-04

ShareRelated Documents
Research proposal on ethical hacking 1RESEARCH PROPOSAL ON ETHICAL HACKINGBy (Name)CourseInstructor’s NameInstitutional AffiliationThe City and StateThe Date
Ethical Hacking Assignment_1
Research proposal on ethical hacking 2Abstract;For decades, there has been a substantial and dynamic change in the level of technology.However, the dynamic change of technology has come along with high levels of insecurity, therehas been recurring cases of information insecurity in form of hacking and cybercrime which hascaused serious breaching of rights, linking of confidential information, loss of money throughcredit cards and identity theft among others. One of the solutions created to cub some of theserisks include Ethical Hacking which tends to increase security protection by identifying securityvulnerabilities in a system.Therefore, this research is to critically investigate, analyze and establish the extent towhich ethical hacking has contributed to the prevention of system hacking/ internet hacking, bothpositive and negative. In other words, the research will aim at answering the question, “ishacking really ethical?”Introduction:An increase in growth of internet and technology has brought great things such as Netbanking, Cloud Computing, Email, Social Media among others, but there is a Dark side knownas Hacking, Back doors, breaching our right to privacy. It is the biggest problem faced by manyorganizations, people, government and private companies all over the world (Wilhelm 2009).Hacking can be in any form from abducting credit card numbers to reading emails and recordingvideos by the camera of your own devices (Veruggio et al 2016, p.2160). But there is also a goodside of hacking known as ethical hacking where white-collar hackers come in that is to say theyhelp people from hacking or people who are suffered by hacking. Security for our systems isvital in protecting data (Yang 2009, p.20). The paper is meant to describe the meaning of
Ethical Hacking Assignment_2
Research proposal on ethical hacking 3hacking, the aims of ethical hacking, how it is trained and how it affects the world ITdepartment, in relation to already written articles (Venter and Eloff 2000, p.15).The growth of internet has brought many good things such as electronic commerce, e-mail, easy access to vast stores of reference material among others. However, to maintain therelevance of dynamism in the internet, there is need to maintain high levels of security and oneof the more effective ways of testing system security is by ethical hacking. Using an ethicalhacking technique, activities focus on to identify, and exploit security vulnerabilities andsubsequent implementation of corrective measures (Logan and Clarkson 2005). Through theethical hacking process, organizations are able to evaluate the extent of success or failure of theircurrent security measures and also to prevent criminal hackers who can secretly link theorganization’s information to unauthorized parties, putting the company at a danger (Graves2010). These types of hackers are called black hat hackers, and in order to overcome such major/alarming issue, another type of hackers came in place and these are the ethical hackers (Hafele2004). Various research has been carried out on ethical hackers, their skills and how they goabout helping their customers. It is noted that ethical hackers perform the hack as security testsfor their systems and this type of hacking is legal and trustworthy. In other terms, ethical hackingis the process of testing for the security level and availing the needs for the improvement oftechnology (Reddy et al. 2010, p.189). It focuses on securing and protecting the IP systems.According to a research made, understanding an ethical hacker is more complicated thanunderstanding the public itself (Farsole et al 2010, p.15). Technology is ever growing and we arefacing tools and gadgets that are beneficial to people depending on their usage, and on the otherside, they are more vulnerable to hacking. This is where ethical hacking comes in as a preventive
Ethical Hacking Assignment_3
Research proposal on ethical hacking 4step in ensuring the information safety (Krutz and Vines 2007). It constitutes tools that can findand exploit a security weakness. Ethical hackers use the same tools and techniques of hackers totest and evaluate system security. It is an effective tool that can assist companies, people andgovernment to protect data against hackers if used ethically well.This therefore brings as to the point that, information security holds an important placein information technology and information system as a whole. Computers and systems use asmany updates as new technologies come up day after day some of which include; cloudcomputing, virtualization among others to be able to deal with security issues (Johnson 2017).Ethical hackers must think and work carefully, that is the reason why all the academiccurriculum has the "attacker" and "defender” perspective for students to know how a hackerthinks and performs attacks and how to defend them by adjusting their systems, policies, andarchitecture accordingly (Engebretson 2013). With keeping all of the above in mind, ethicalhacking has become talk of the town. Students are being taught hacking at schools, organizationshave been setup providing hacking courses and certifications for individuals which has led toincrease in the number of hackers in down side towns and they are mostly trained to aid in theprevention of cybercrimes and hacking (Graves 2007). Questions are being raised such as isethical hacking solving our problems or creating new ones? Ethics form a core part of anyactivity as breaking the ethics or not having any may cause damage instead of benefit. Logan andChatzidakis and Mitussis (2007) found that a course in information and security shouldemphasize the ethical responsibility of the security professional who are entrusted to protect dataassets. So, ethical hacking is an assessment to check and test an information technologicalenvironment for possible links and vulnerabilities. It describes the process of hacking a networkin an ethical way.
Ethical Hacking Assignment_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Ethical Issues in Technology and Hacking
|4
|1264
|132

Hacking and Cybersecurity
|4
|705
|70

Data Breach and Memory Protection in Information Security
|12
|3163
|23

Issue in POS Systems - Assignment
|3
|724
|290

Data Breach is a Huge Concern for Cyber Security Experts
|8
|1551
|459

Security Threats in Cloud Computing and Preventive Methods
|4
|2565
|96