logo

Legal Obligations of Investigators in Ethical Hacking

   

Added on  2023-05-27

4 Pages898 Words193 Views
Running head: ETHICAL HACKING
ETHICAL HACKING
Name of the Student:
Name of the University:
Author Note:

1ETHICAL HACKING
Legal obligations of the investigators while ethical hacking of the target system:
While ethically hacking the target system, the experts has to maintain the security and the
privacy of the data. The main objective of the ethical hacking is to find out the loop holes in the
target system along with maintaining the security and the privacy of the information stored in the
system.
With the advancement of the technology, all the organizations are concerned about the
misuse of technology (Li et al. 2018). During the conduction of the ethical hacking the expert is
needed to be aware about the range of IP addresses, networks, subnets and computers. In some
cases, the ethical hacking also includes the evaluation of evaluation of software review and
decompiling (Rathore 2016). In this case, the copyright of the software is needed to be examined
in order to ensure that the copyright of the software permits the practices of the ethical hacking.
In the cloud architecture, it is the responsibility of the cloud providing vendor to permit the
practice of the ethical testing or hacking. In this case, the hacking activity will be restricted in a
certain area (Peeters 2017). The ethical hacker should not harm the system of the computer and
the illegal interface should not be made by the experts. Apart from that the data and the
information stored in the system should not be manipulated by the work of the experts (Marsh
2017). The ethical hacking activity will be carried out by the experts on the basis of the social
consequences of the action. The ethical hacker will identify the loopholes in the security of the
system and will inform those loopholes to the maintenance team. The main objective of the
ethical hacking is to enhance the security of the system.
Maintaining the privacy of the data:

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Computer Crime and Digital Forensic : Report
|15
|3299
|123

Cyber Security & Ethical Hacking : Report
|9
|2386
|80

Human Dimension of Information Security: Autopsy of a Data Breach
|4
|789
|310

Cyber Security Threat Management | Assignment
|9
|2180
|85

Report On WholeWorldBand | Building Information System
|8
|967
|375

Information Policy and Governance
|7
|1778
|71