Tuesday, 16 May 2023

What Problem Hacking Identify

Hacking Identifies the following problems:

  • Ethics is different from individual to individual. Ethics are just a matter of intention and interpretation of hackers and what they are trying to activate. In a few different ways, we can perceive ethical hacking. For some users, it's a noble and great pursuit. It provides a way for us to understand how a hacker thinks and attacks. This knowledge provides a big advantage in protecting the system from an attack.
  • In a company, confidential information can disclose by the ethical hacker to the other parties. The disclosure of information can be intentionally or unintentional by the hacker.
  • The white hat hackers are in the majority. Sometimes ethical hackers use some methods, and due to this, they could be considered grey hat hackers in the application. A hacker needs to get written permission which it is clearly defined what we can and cannot do at the time working on a network.
  • In 1986, an act called Computer Fraud and Abuse was passed. This act says that accessing a Computer without authentication and stealing financial/credit card information and private government information is illegal. The technological version of trespassing is breaking into a computer system. A hacker should say that there would be no harm to the computer system when they break into the computer system. Persons expect privacy. When that privacy is broken, a person loses their priceless information, even if it seems intangible. Many people don't know about the different types of hackers like grey hat hackers, black hat hackers, and white hat hackers. People suppose that all hackers are not to be trusted and malicious. An ethical hacker should come with stigmatization. Due to the lack of this type of knowledge, some people have fear and uncertainty about ethical hackers. An unknown often drives this fear, and that unknown is the extent of the capabilities of an ethical hacker.
  • We know that privacy is priceless. The individual is seen to be a potential threat that can take privacy away. That is why an ethical hacker needs to maintain a high ethical standard. There are some complicated ethical hacking situations, and that situation an ethical hacker may be faced sometimes. For example, it is very common on the workplace computer to find illegally pirated material like games, movies, and music. The individual should inform the management about the misuse of company computers and network resources, but it depends on whether the individual will inform or not. That would be an ethical decision made by a person working on that user's device. In that scenario, a twist occurs when the network security individual finds child pornography on the workplace computer. In that situation, the individual must immediately report it to management and law enforcement. If an individual fails to report it to law enforcement, due to this, the person who found it liable for criminal prosecution may leave. In the network, an ethical hacker may have a complex role. The hacker will be fine until they have a strong ethical standard.
  • According to Sun Tzu, we don't need to fear the result of any hundred battles until we know ourselves and our enemy. We will defeat every victory we gained if we know ourselves but don't know about the enemy. In every battle, we will succumb if we know neither ourselves nor the enemy.

No comments:

Post a Comment