Ethical Hacking: Target System Investigation and Legal Privacy

Verified

Added on  2023/05/27

|4
|898
|193
Essay
AI Summary
This essay explores the legal obligations of investigators during ethical hacking activities, emphasizing the importance of maintaining data security and privacy. It highlights the need for ethical hackers to be aware of IP address ranges, network configurations, and software copyrights, particularly in cloud architectures where vendor permissions are crucial. The discussion covers the ethical hacker's responsibility to avoid system harm, prevent illegal interfaces, and refrain from data manipulation. It also addresses the significance of data privacy, detailing techniques like privacy-aware hacking and the use of demo databases to protect user information. The essay further suggests the importance of collaboration with Computer Security Incident Response teams and organizational employees, along with conducting meetings to discuss information security overviews to ensure responsible handling of privacy during ethical hacking processes. Desklib offers a platform for students to access this document and other solved assignments to aid in their studies.
Document Page
Running head: ETHICAL HACKING
ETHICAL HACKING
Name of the Student:
Name of the University:
Author Note:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1ETHICAL HACKING
Legal obligations of the investigators while ethical hacking of the target system:
While ethically hacking the target system, the experts has to maintain the security and the
privacy of the data. The main objective of the ethical hacking is to find out the loop holes in the
target system along with maintaining the security and the privacy of the information stored in the
system.
With the advancement of the technology, all the organizations are concerned about the
misuse of technology (Li et al. 2018). During the conduction of the ethical hacking the expert is
needed to be aware about the range of IP addresses, networks, subnets and computers. In some
cases, the ethical hacking also includes the evaluation of evaluation of software review and
decompiling (Rathore 2016). In this case, the copyright of the software is needed to be examined
in order to ensure that the copyright of the software permits the practices of the ethical hacking.
In the cloud architecture, it is the responsibility of the cloud providing vendor to permit the
practice of the ethical testing or hacking. In this case, the hacking activity will be restricted in a
certain area (Peeters 2017). The ethical hacker should not harm the system of the computer and
the illegal interface should not be made by the experts. Apart from that the data and the
information stored in the system should not be manipulated by the work of the experts (Marsh
2017). The ethical hacking activity will be carried out by the experts on the basis of the social
consequences of the action. The ethical hacker will identify the loopholes in the security of the
system and will inform those loopholes to the maintenance team. The main objective of the
ethical hacking is to enhance the security of the system.
Maintaining the privacy of the data:
Document Page
2ETHICAL HACKING
Maintaining the privacy of the data defines the privacy and the confidentiality of the
information about the users stored in the system while the conduction of the ethical hacking. In
the ethical hacking the accessing of the private data of the users is not needed. It is the
responsibility of the ethical hacker to test whether the identified loop hole in the system can take
the information database stored in the system. If the loophole is identified, the ethical hacker can
suggest the solutions to eliminate the loophole or security bug from the system (Li et al. 2018).
The whole process does not need the access of the private data of the users stored in the system.
The privacy of the data regarding the other users can be secured through different
techniques like preserving the privacy of the users through privacy aware hacking. In this case,
the ethical hacker may choose not to access confidential data of the users (Anderson 2016). On
the other hand, demo database can be used during the ethical hacking process. In this case, the
database will be filled with the data like the user data (Li et al. 2018). However, in case, if the
confidential data regarding the individuals and the institution are needed to be handled by the
ethical hacker during the course of the process, the expert should inform this possibility to the
Computer Security Incident Response team (Wang and Yang 2017). Apart from that the expert
handling the process should cooperate will the employees of the organization (Li et al. 2018).
The meetings about the information security overviews can be conducted among the
management and the experts. On the basis of the meetings, the decision can be taken regarding
the handling of the privacy during the ethical hacking.
Document Page
3ETHICAL HACKING
References
Anderson, M., 2016. Hacking: What EVERY Beginner Needs to Know (Volume 1).
Li, L., Li, Z., Shahriar, H., Rutherfoord, R., Peltsverger, S. and Tatum, D., 2018. Ethical
Hacking: Network Security and Penetration Testing.
Marsh, D., 2017. Are Ethical Hackers the Best Solution for Combating the Growing World of
Cyber-Crime? (Doctoral dissertation, University Honors College, Middle Tennessee State
University).
Peeters, G., 2017. Strengthening the digital Achilles heel of the European Union: Make use of
ethical hackers to find vulnerabilities in information systems? (Master's thesis).
Rathore, N.K., 2016. Ethical hacking & security against cyber crime. Journal on Information
Technology (JIT), 5(1), pp.7-11.
Wang, Y. and Yang, J., 2017, March. Ethical Hacking and Network Defense: Choose Your Best
Network Vulnerability Scanning Tool. In Advanced Information Networking and Applications
Workshops (WAINA), 2017 31st International Conference on (pp. 110-113). IEEE.
chevron_up_icon
1 out of 4
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]