Tuesday, June 11, 2019

Ethical Hacking the three shades White Hat, Black Hat, Gray Hat Research Paper

Ethical Hacking the three shades White Hat, Black Hat, Gray Hat - Research Paper Example2010 Snyder, 2006 Mahmood et al., 2010 metalworker et al., 2002 Pashel, 2006 Raether, 2008) II. Introduction Hacking has become the stuff of national security talk in the US and other countries recently, with the proliferation of news with regard to accusations that China is leading a conjunctive effort to cut back into very critical systems owned by the US government as well as private enterprises around the world. Some of the nigh recent reports tie the concerted hacking efforts to the Chinese military, indicating that not only is the hacking sanctioned by government, scarcely is being done with its active support, with the intent to gain from the enormous intelligence that can be had from the hacking exercises. This recent spate of news has put hacking in a bad light. Clearly this kind of hacking is unethical, because of the intent to gain from illicitly breaking into global information sy stems, and without the permission of the system owners. From the point of view of international law, this is unethical and clearly whitlow (Sanger, Barboza and Perlroth, 2013 Navarro, 2013 Olson, 2012). On the other hand it is worthy to note that ethical hacking is offered as a course in some universities, as in the case of a course offering in Northumbria University, empower Ethical Hacking for Computer Security Bsc. It is an honors course. The goal of the course is to be able to produce ethical hackers who are adept at penetrating into systems with the use of tools to hack into them, so that the weaknesses and flaws of those systems may be identified and strengthened/addressed appropriately (Northumbria University, 2010). This testifies to many things, among them being that ethical hacking is a mainstream, legitimate activity, rather than something that can be deemed as criminal. The intent here is to bolster security rather than to breach systems with malice and with an intent to commit crimes. This is reflected as much in the Oxford Dictionary translation of the experimental condition, which also underlines the growing importance of ethical hacking and ethical hackers to be able to make systems more secure (Oxford University Press, 2013). That ethical and unethical hacking both exist, as typified by the two contrasting examples above, is further reflected in the way these two types of hacking are immortalized in the literature, via the contrasting designation of black hat hacking representing the practice of unethical and criminal hacking, and white hat hacking, or ethical hacking. There is also gray hat hacking, which, as the term connotes, is part ethical and part unethical. This latter term also denotes a hacker who has had experience with doing hacking on both sides of the fence. The arguments against hacking in general point to the aspect of the debate with regard to whether hacking has any place at all in legal society. This line of thinking says that all hacking is potentially illegal. Those in favor of ethical hacking, on the other hand, admit as much, but then posits the example of the locksmith. If one is locked into a house, for instance, because one lost the keys to the door, then it makes sense to call a locksmith to create new

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.