Legal Obligations of Investigators in Ethical Hacking
Verified
Added on 2023/05/27
|4
|898
|193
AI Summary
This article discusses the legal obligations of investigators in ethical hacking, including maintaining security and privacy of data, evaluating software copyright, and enhancing system security.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: ETHICAL HACKING ETHICAL HACKING Name of the Student: Name of the University: Author Note:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1ETHICAL HACKING Legal obligations of the investigators while ethical hacking of the target system: While ethically hacking the target system, the experts has to maintain the security and the privacy of the data. The main objective of the ethical hacking is to find out the loop holes in the target system along with maintaining the security and the privacy of the information stored in the system. With the advancement of the technology, all the organizations are concerned about the misuse of technology (Liet al. 2018). During the conduction of the ethical hacking the expert is needed to be aware about the range of IP addresses, networks, subnets and computers. In some cases, the ethical hacking also includes the evaluation of evaluation of software review and decompiling (Rathore 2016). In this case, the copyright of the software is needed to be examined in order to ensure that the copyright of the software permits the practices of the ethical hacking. In the cloud architecture, it is the responsibility of the cloud providing vendor to permit the practice of the ethical testing or hacking. In this case, the hacking activity will be restricted in a certain area (Peeters 2017). The ethical hacker should not harm the system of the computer and the illegal interface should not be made by the experts. Apart from that the data and the information stored in the system should not be manipulated by the work of the experts (Marsh 2017). The ethical hacking activity will be carried out by the experts on the basis of the social consequences of the action. The ethical hacker will identify the loopholes in the security of the system and will inform those loopholes to the maintenance team. The main objective of the ethical hacking is to enhance the security of the system. Maintaining the privacy of the data:
2ETHICAL HACKING Maintaining the privacy of the data defines the privacy and the confidentiality of the information about the users stored in the system while the conduction of the ethical hacking. In the ethical hacking the accessing of the private data of the users is not needed. It is the responsibility of the ethical hacker to test whether the identified loop hole in the system can take the information database stored in the system. If the loophole is identified, the ethical hacker can suggest the solutions to eliminate the loophole or security bug from the system (Liet al. 2018). The whole process does not need the access of the private data of the users stored in the system. The privacy of the data regarding the other users can be secured through different techniques like preserving the privacy of the users through privacy aware hacking. In this case, the ethical hacker may choose not to access confidential data of the users (Anderson 2016). On the other hand, demo database can be used during the ethical hacking process. In this case, the database will be filled with the data like the user data (Liet al. 2018). However, in case, if the confidential data regarding the individuals and the institution are needed to be handled by the ethical hacker during the course of the process, the expert should inform this possibility to the Computer Security Incident Response team (Wang and Yang 2017). Apart from that the expert handling the process should cooperate will the employees of the organization (Liet al. 2018). Themeetingsabouttheinformationsecurityoverviewscanbeconductedamongthe management and the experts. On the basis of the meetings, the decision canbe taken regarding the handling of the privacy during the ethical hacking.
3ETHICAL HACKING References Anderson, M., 2016. Hacking: What EVERY Beginner Needs to Know (Volume 1). Li, L., Li, Z., Shahriar, H., Rutherfoord, R., Peltsverger, S. and Tatum, D., 2018. Ethical Hacking: Network Security and Penetration Testing. Marsh, D., 2017.Are Ethical Hackers the Best Solution for Combating the Growing World of Cyber-Crime?(Doctoraldissertation,UniversityHonorsCollege,MiddleTennesseeState University). Peeters, G., 2017.Strengthening the digital Achilles heel of the European Union: Make use of ethical hackers to find vulnerabilities in information systems?(Master's thesis). Rathore, N.K., 2016. Ethical hacking & security against cyber crime.Journal on Information Technology (JIT),5(1), pp.7-11. Wang, Y. and Yang, J., 2017, March. Ethical Hacking and Network Defense: Choose Your Best Network Vulnerability Scanning Tool. InAdvanced Information Networking and Applications Workshops (WAINA), 2017 31st International Conference on(pp. 110-113). IEEE.