Ethical Hacking

Ethical Hacking

  • Submitted By: Knighty
  • Date Submitted: 11/25/2013 5:59 AM
  • Category: Technology
  • Words: 887
  • Page: 4
  • Views: 74

Name:
Institution:
Course:
Tutor:
Date of submission:
Ethical Hacking - good or bad
The state of online security is poor and there is slow progress toward increasing its protection. This has resulted in action being taken, termed as Ethical Hacking. The work of ethical hackers is to find bugs and fix them. They beta test companies’ software in order to access and find information. They carry out network scans for bugs, and information about software bugs is shared online. Essentially this means that people are taught to hack, all with the intention of alerting companies of bugs. This action has been deemed necessary due to the increased level of crime with a study indicating that nearly 90% of the attacks happen on the inside. Working on the inside thus means that there are more chances of infiltrating an attack. The debate is whether ethical hacking is a good measure or a bad move.
The problem that arises is that teaching hacking to students is a serious matter to consider. The course leaders are of the opinion that students will learn how to progress intrusion. It is very hard to know the true intentions of the students thus the debate over why ethical hacking should be used arises. The availability of the course to students is a chance to curb cyber crime and should the information lead to more crimes by the same individuals, the society cannot place blame on the course leaders who offered it in the first place (Kimberly, 237).

Education and Training
In an education since, teaching students how to hack gives them the ability to hack into computer systems aided by university lecturers. This threat is deemed too big, but the assumption is that students may use them for ill purposes. (Patrick, 59) adds that if course leaders stuck with this notion then no education to combat cybercrime could be disseminated. Should there be a need to use caution, universities could apply security checks and enquire about professional certificates among other...

Similar Essays