Thursday, September 26, 2019
Ethical v. unethical hacking Research Paper Example | Topics and Well Written Essays - 2500 words
Ethical v. unethical hacking - Research Paper Example The revelations of individuals such as Julian Assange and Edward Snowden have underscored the pertinence and relevance of considering the potential for information to be compromised, hacked, and used by third parties that have never been given license or permission for such use. As such, the relevance of hacking is something that not only considers an individual hacker but entire corporations, or national security apparatus. For this very reason, the following plan will provide an overview for how information will be included, what will be discussed and what metrics will be utilized to measure and draw inference upon hacking and the differential, if any exists, between ââ¬Å"ethicalâ⬠and ââ¬Å"unethicalâ⬠hacking. In this way, the following brief discussion has analyzed a litany of both primary and secondary texts in the attempt to provide a valid and fair overview into the issues at hand. Furthermore, by discussing and analyzing the different theoretical approaches that different authors have made, in determining ethics and/or the definitions/interpretation of hacking, the analysis has engaged in a diverse approach to the literature and sought to reflect this with respect to the representations and determinations that have been made. In this evolved and highly digital era, cyber security is probably the most notable type of security individuals and companies ought to be concerned with. Businesses, governments, schools, banks, hospitals and virtually every modern institution that comes to mind keeps and organizes information it acquires electronically. Individuals also have a host of information stored electronically. This implies that highly sensitive information ââ¬â from account and credit card numbers, to phone bills and medical records ââ¬â is available to people who can decide to steal, manipulate, or share the information maliciously (Leeson & Coyne, 2005). Hacking is mostly
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.