Ethical Hacking: Is It a Thing? Essay

Exclusively available on Available only on IvyPanda® Made by Human No AI

The definition of hacking includes the action of sacrificing the individual liberty of deed or professional honor in trade for pays or other guaranteed recompense.

Hacking as an action has been existent for more than a hundred years. In the second half of the nineteenth century, more than a few youngsters were flung off the nation’s pristine phone organization by furious establishments.

Computer programmers implemented the term ‘hacker’ at the beginning of the 1960s in the framework of a positive definition for an individual of dexterous software development skill. The application of the term most likely originates from hack signifying to chop, or from the hacker, which meant an unprofessional performer in various sports. With the course of time, the definition of the term ‘hacker’ developed into less constructive and affirmative, conversely. Only few years passed, and the engineering undergraduates at several academies, such as Cal Tech, applied the similar noun hack to describe an inventive and practical joke. Surrounded by the pranks in which some of the IT workers would be involved, unquestionably, the forced entries into other computer systems existed. For the reason that such forced entries fascinated nationwide responsiveness, the mass media detained upon the term of hacking as the marker for the wrongdoers and offenders. Such application of a term is often objected by the majority of the computer programmers as they are aware of using this term as the definition of praise (Legal issues, 2013).

The workers can be impeached under a state antihacking ruling for obtaining computer records that they were sanctioned to admit and expending them in a way forbidden by the organization, a national applications court of law has stated.

“As long as the employee has knowledge of the employer’s limitations on that authorization, the employee ‘exceeds authorized access’ when the employee violates those limitations. It is as simple as that,” Judge Stephen Trott stated in an outlook combined with the opinion of the Judge Diarmuid O’Scannlain (Appeals Court, 2011, para. 2).

On the contrary, Judge Tena Campbell stated that, under the preponderance’s decision, “any person who obtains information from any computer connected to the internet, in violation of her employer’s computer-use restrictions, is guilty of a federal crime” (Appeals Court, 2011, para. 2).

The definition of “white hat” in the Internet colloquial speech speaks of an ethical PC hacker, or a PC security specialist, who concentrates on penetration testing and on various other analysis methods in order to guarantee the safety of a government’s or companies’ material structures (Knight, 2009). ‘Ethical hacking’ is a word created by IBM; it is meant to suggest a wider class aside from penetration testing (Palmer, 2001). The representatives of this class can also perform under different names, such as the teams of ‘sneakers’ (What is a White Hat, 2010). Generally speaking, if the admission to a structure is sanctioned, the penetration is moral and lawful. In other cases, it appears to be a crime under the Computer Misuse Act (Is ethical hacking actually ethical or even legal, 2013).

The illegal admission crime includes the whole lot from fathoming the keyword, to retrieving the email account of a person, to breaching the security of a financial institution. The extreme consequence of illegal admission to a personal computer can be up to two years of imprisonment and a fine. There could be bigger punishments in cases when the hacker adjusts information as well apart from accessing it. These offenses can result in ten years in prison.

References

(2011). Web.

Is ethical hacking actually ethical or even legal? (2013). Web.

Knight, W. (2009). License to hack. InfoSecurity, 6(6), 38-41.

Legal issues in penetration testing. (2013). Web.

Palmer, C. (2001). Ethical hacking. IBM Systems Journal, 40(3), 769.

(2010). Web.

More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2022, April 18). Ethical Hacking: Is It a Thing? https://ivypanda.com/essays/position-paper-about-the-ethics-of-hacking/

Work Cited

"Ethical Hacking: Is It a Thing?" IvyPanda, 18 Apr. 2022, ivypanda.com/essays/position-paper-about-the-ethics-of-hacking/.

References

IvyPanda. (2022) 'Ethical Hacking: Is It a Thing'. 18 April.

References

IvyPanda. 2022. "Ethical Hacking: Is It a Thing?" April 18, 2022. https://ivypanda.com/essays/position-paper-about-the-ethics-of-hacking/.

1. IvyPanda. "Ethical Hacking: Is It a Thing?" April 18, 2022. https://ivypanda.com/essays/position-paper-about-the-ethics-of-hacking/.


Bibliography


IvyPanda. "Ethical Hacking: Is It a Thing?" April 18, 2022. https://ivypanda.com/essays/position-paper-about-the-ethics-of-hacking/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
This academic paper example has been carefully picked, checked and refined by our editorial team.
No AI was involved: only quilified experts contributed.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment
1 / 1