Ethical Hacking: Is It a Thing? Essay

Exclusively available on IvyPanda Available only on IvyPanda

The definition of hacking includes the action of sacrificing the individual liberty of deed or professional honor in trade for pays or other guaranteed recompense.

We will write a custom essay on your topic a custom Essay on Ethical Hacking: Is It a Thing?
808 writers online

Hacking as an action has been existent for more than a hundred years. In the second half of the nineteenth century, more than a few youngsters were flung off the nation’s pristine phone organization by furious establishments.

Computer programmers implemented the term ‘hacker’ at the beginning of the 1960s in the framework of a positive definition for an individual of dexterous software development skill. The application of the term most likely originates from hack signifying to chop, or from the hacker, which meant an unprofessional performer in various sports. With the course of time, the definition of the term ‘hacker’ developed into less constructive and affirmative, conversely. Only few years passed, and the engineering undergraduates at several academies, such as Cal Tech, applied the similar noun hack to describe an inventive and practical joke. Surrounded by the pranks in which some of the IT workers would be involved, unquestionably, the forced entries into other computer systems existed. For the reason that such forced entries fascinated nationwide responsiveness, the mass media detained upon the term of hacking as the marker for the wrongdoers and offenders. Such application of a term is often objected by the majority of the computer programmers as they are aware of using this term as the definition of praise (Legal issues, 2013).

The workers can be impeached under a state antihacking ruling for obtaining computer records that they were sanctioned to admit and expending them in a way forbidden by the organization, a national applications court of law has stated.

“As long as the employee has knowledge of the employer’s limitations on that authorization, the employee ‘exceeds authorized access’ when the employee violates those limitations. It is as simple as that,” Judge Stephen Trott stated in an outlook combined with the opinion of the Judge Diarmuid O’Scannlain (Appeals Court, 2011, para. 2).

On the contrary, Judge Tena Campbell stated that, under the preponderance’s decision, “any person who obtains information from any computer connected to the internet, in violation of her employer’s computer-use restrictions, is guilty of a federal crime” (Appeals Court, 2011, para. 2).

The definition of “white hat” in the Internet colloquial speech speaks of an ethical PC hacker, or a PC security specialist, who concentrates on penetration testing and on various other analysis methods in order to guarantee the safety of a government’s or companies’ material structures (Knight, 2009). ‘Ethical hacking’ is a word created by IBM; it is meant to suggest a wider class aside from penetration testing (Palmer, 2001). The representatives of this class can also perform under different names, such as the teams of ‘sneakers’ (What is a White Hat, 2010). Generally speaking, if the admission to a structure is sanctioned, the penetration is moral and lawful. In other cases, it appears to be a crime under the Computer Misuse Act (Is ethical hacking actually ethical or even legal, 2013).

1 hour!
The minimum time our certified writers need to deliver a 100% original paper

The illegal admission crime includes the whole lot from fathoming the keyword, to retrieving the email account of a person, to breaching the security of a financial institution. The extreme consequence of illegal admission to a personal computer can be up to two years of imprisonment and a fine. There could be bigger punishments in cases when the hacker adjusts information as well apart from accessing it. These offenses can result in ten years in prison.

References

(2011). Web.

Is ethical hacking actually ethical or even legal? (2013). Web.

Knight, W. (2009). License to hack. InfoSecurity, 6(6), 38-41.

Legal issues in penetration testing. (2013). Web.

Palmer, C. (2001). Ethical hacking. IBM Systems Journal, 40(3), 769.

(2010). Web.

Remember! This is just a sample
You can get your custom paper by one of our expert writers
Print
Need an custom research paper on Ethical Hacking: Is It a Thing? written from scratch by a professional specifically for you?
808 writers online
Cite This paper
Select a referencing style:

Reference

IvyPanda. (2022, April 18). Ethical Hacking: Is It a Thing? https://ivypanda.com/essays/position-paper-about-the-ethics-of-hacking/

Work Cited

"Ethical Hacking: Is It a Thing?" IvyPanda, 18 Apr. 2022, ivypanda.com/essays/position-paper-about-the-ethics-of-hacking/.

References

IvyPanda. (2022) 'Ethical Hacking: Is It a Thing'. 18 April.

References

IvyPanda. 2022. "Ethical Hacking: Is It a Thing?" April 18, 2022. https://ivypanda.com/essays/position-paper-about-the-ethics-of-hacking/.

1. IvyPanda. "Ethical Hacking: Is It a Thing?" April 18, 2022. https://ivypanda.com/essays/position-paper-about-the-ethics-of-hacking/.


Bibliography


IvyPanda. "Ethical Hacking: Is It a Thing?" April 18, 2022. https://ivypanda.com/essays/position-paper-about-the-ethics-of-hacking/.

Powered by CiteTotal, the best referencing tool
If you are the copyright owner of this paper and no longer wish to have your work published on IvyPanda. Request the removal
More related papers
Cite
Print
1 / 1