Analysis of Cybersecurity: Ethical, Legal, and Practical Aspects

Verified

Added on  2022/08/12

|5
|1297
|10
Report
AI Summary
This report provides an analysis of cybersecurity, focusing on the increasing prevalence of hacking and its ethical implications. It delves into the motivations behind hacking, the roles of white hat and black hat hackers, and the ethical theories applicable to these activities. The report examines the definitions of hacking, cybercrime, and cyberterrorism, highlighting the lack of comprehensive legislation to address these issues. It discusses the ethical dilemmas surrounding responses to ransomware attacks and the importance of ethical conduct in technology. The analysis emphasizes the need for a balance between technological advancement and ethical considerations, advocating for robust legal frameworks to combat cybercrime and protect individuals and organizations from cyber threats. The report underscores the evolving nature of cybersecurity, emphasizing the importance of continuous learning and adaptation in this dynamic field. The report also includes references to various sources like Allen, Bok, Clough, Eboibi, Hutchings, Jamieson, Malcolm, Scambray, etc.
Document Page
Running Head: ANALYSIS OF CYBERSECURITY 1
Cybersecurity: Analytical reading and writing
Student’s Name
Institution
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
ANALYSIS OF CYBERSECURITY 2
The analysis of this weekly reading executes the knowledge and understanding of
cybersecurity. Cases surrounding the gist of security in computer applications are rising
throughout the world in each economic sector. There is a need to understand “Why” hackers are
striving to develop this unregulated and casual doing to professional practice. The analysis is set
under empirical knowledge, metaphysics studies, and realism concepts. Critical and creative
thinking applies to offer critiques on the content through inductive and deductive reasoning.
The understanding of this week's analysis revealed the fatal implications of hacking,
which can be assumed. How did this action of hacking gain power? As an organization in the
United States suffer losses; as a result, the effect is gaining control over the computer application
industry, turning to a game between hacker and anti-hacker (Hutchings and Hayes, 2019).
Computer experts are generating millions of dollars to prevent hackers, whereas the hackers are
mining twice amount as anti-hackers. The theory of code of conduct can define these two parties
are fighting daily to earn a living through this evolving profession.
What are the actions definable as hacking? According to (Bok, 2018), the action involves
pinpointing and manipulating dimness in either a computer networks or system. Hacking may
also refer to an unconventional way of doing something with influence to the public. Ethical
theory of “Virtue Ethics” can be linked with the analysis, it explains which professional public
virtues a person should possess or undertake without harm effect to the other.
Who can be classified as a hacker, and under which two types? During the reading of
chapter titled “The Ethical Hacker” under Cybersecurity, a hacker was defined as a skillful
computer programmer, who is capable of identifying and manipulating computer systems or
network (Allen, 2006). The term has slighted to a meaningful phrase "Security Hacker", to
describe the individual which powered skills and knowledge of using bugs or exploits purposely
Document Page
ANALYSIS OF CYBERSECURITY 3
to break into a computer network or systems illegally Hutchings and Hayes (2019). However,
how do these security hacker acquired their knowledge and skills to perform this action? Not in
learning institutions? Or is through self-research? The chapter has failed to explain the influence
of such activities.
The article classified hackers into two: White hat and Black hat. Ethical theory run
across the concept of a person who desire to work for public gain. White hat hackers usually
perform the action so as to help government and institutions. Incidences of dangerous and hidden
information to the government or public, can attract professional hackers to manipulate the
computer systems before a deadly risk or uncertainty- cases of computerized atomic bomb. On
the other hand, black hat hacker commits such criminal acts to cause social disruptions as result
of unauthorized access to public computer systems. The article has not classified the action as a
recurring game of hide and seek between white hat hack and black hat hack.
The article didn’t recognize hacking of computer systems as a crime persuaded under
Cybercrime Act, 2015. Scholars have questioned on the steady growth of technology with least
growth of legislation. Hacking is a feature of cybercrime, which should be governed by legal
rules structured by a central government. Is Cybercrime Law and Practices deeming?
Highlighted cases in the articles raised various rhetorical interrogation, which may lead to
Legislation Responsibility (Clough, 2015). The legal bodies are not included in the article,
which can fight against this world crisis born by technology. Does it mean government is not
aware of use of computer as an instrument to further illegal ends? Such as committing fraud,
trafficking in child pornography and intellectual property, stealing identities, or violating privacy
(Malcolm, 2006). Some hobbyist hackers offer their skills to the highest bidder, and syndicates
run by cybercriminals may buy those skills.
Document Page
ANALYSIS OF CYBERSECURITY 4
Some certain activities fall broadly under the umbrella of hacking which is also referred
to as variants of cybercrime which include: Cyber vandalism: this relates to the editing of online
data maliciously, and it involves adding, removing or modifying content which is offensive or is
in bad taste Clough (2015). Cyber trespass: this includes unlawful access to computers or
password protected sites. Cyber terrorism: this is the politically motivated use of computers and
data technology to cause widespread fear or severe disruption in society (Eboibi, 2017).
Computer fraud: this is the use of deception for personal gain in the online business transactions
by assuming a fake online identity.
Reactions to Ransomware
For those attacked, there are different ethical dilemmas which are presented example:
should one pay a ransom? Ethics of paying a ransom: ethicists give several reasons why you
should never pay a payment as it encourages the groups to carry out more attacks in the future
(Scambray, McClure, and Kurtz, 2010). Ethics of pen testing: pen testing is usually a set of
practices carried out generally by an outside company hired by a corporation to attempt to access
their systems. Pen testers utilize both traditional and social engineering techniques to break into
the clients' system to identify and aid in fixing any security vulnerabilities found (Jamieson, et
al., 2009).
The incidents of hacking have shifted from casual to professional standards. The mode of
chapter arguments on the article’s theme can distinguish the role of black hat and white hat
hackers. Hacking is creating cyberterrorism as the types of black hats are categorized as illegal
and unethical (Malcolm, 2016). It is a responsibility for both technology users and developers to
hold ethical conduct in their technological dealings.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
ANALYSIS OF CYBERSECURITY 5
References
Allen, M. (2016). Social engineering: A means to violate a computer system. SANS Institute
InfoSec Reading Room, 1-13.
Bok, S. (2015). Lying: Moral choice in public life. Pantheon Books.
Clough, J. (2015). Principles of cybercrime. Cambridge University Press.
Eboibi, F. E. (2017). A review of the legal and regulatory frameworks of Nigerian Cybercrimes
Act 2015. Computer law & security review, 33(5), 700-717.
Hutchings, A., & Hayes, H. (2019). Routine activity theory and phishing victimisation: Who gets
caught in the ‘Net’? Current Issues in Criminal Justice, 20(3), 433-452.
Jamieson, R., Land, L., Smith, S., Stephens, G., & Winchester, D. (2009). CRITICAL
INFRASTRUCTURE INFOMATION SECURITY: IMPACTS OF IDENTITY AND
RELATED CRIMES. PACIS 2009 Proceedings, 78.
Malcolm, A. (2016). Social Engineering: A Means to Violate a Computer System. Retrieved
May, 14, 2011.
Scambray, J., McClure, S., & Kurtz, G. (2010). Hacking exposed. McGraw-Hill Professional.
chevron_up_icon
1 out of 5
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]