Question

Chapter 10 is a critical chapter with regard to running an E-Commerce website. Security has become...

Chapter 10 is a critical chapter with regard to running an E-Commerce website. Security has become an issue of paramount importance in the last few years. Even the general media has jumped on the bandwagon. We routinely see stories on the news about security breaches and "hackers."

One of the most interesting anomalies of distributed networks and the Internet is the rise of the "hacker." Originally this term was meant to refer to anyone who tries to make a computer system better by re-writing its programs to be more efficient, etc. Unfortunately, over the years, hacker has devolved into a more evil connotation. Today it typically refers to people who attempt to break into systems, usually to damage them or steal information contained from them. Stranger still is a recent phenomenon in which hackers, who have broken into a company's system, are then hired by the company to help make it more secure! It is this aspect on which I want to focus your last assignment.

Write a 400 - 500 word essay for or against this practice. Enumerate your opinion and why you think this is a valid practice or why you think it is not. Please be thorough and support your opinions with references where appropriate.

0 0
Add a comment Improve this question Transcribed image text
Answer #1

With the advent of technology the whole world has revolutionized by its effects.Technology has brought up various structures, procedures,rules,tasks and their solutions.It has worked for the betterment of society and prove fruitful to people.Now in the aspect of networking,the security breaches are outnumbered.Various systems are compromised due to illegal breaches to their systems by persons known by the term "Hackers".This practice had been adapted within industries first to find out the loopholes in the fence,networks, firewalls and other information related features.The aim of this thing was to work for improvement.Now this practice is common and has been conducted under illegal means that has become threat to Government, Information systems,banks and people.Hacking or Ethical Hacking now a terms ,is the practice of finding loopholes in a system or network and through that loopholes breaching into the system for accessing information, data,stealing and much more.There has been quite a many number of cases related to hacking .It is an illegal activity and should not be performed for the betterment of society.Example

Several cases are related to breaching out in a highly secured network of banks and holding public accounts and raising funds transfers and thus stealing money.Many cases are related to security of a nation or country security outreaches to get track of operational data, procedures and inner secrets to disturb the harmony of a country and its people.Hackers use dark web for this purpose and conduct operations regarding their abilities to crash into other secured systems of any organisation for stealing data or anything.It is considered as an evil and should not be practiced.Strict action should be taken against persons involved in this as this is an illegal means of captivating people or organisations.

Add a comment
Answer #2

In recent years, the concept of "ethical hacking" has become more popular, with companies hiring skilled hackers to identify weaknesses in their own systems before malicious hackers can exploit them. While this may seem counterintuitive, the logic behind it is sound: it is better to have a known, trustworthy hacker identify and fix vulnerabilities in a company's system than to have an unknown, malicious hacker exploit those same vulnerabilities for nefarious purposes.

Those who support the practice of hiring hackers argue that it is an effective way to identify and address weaknesses in a company's security infrastructure. By bringing in outside experts with specialized skills, companies can gain insights into their security vulnerabilities that they may not have otherwise discovered. Additionally, these ethical hackers can provide valuable feedback on how to improve the overall security posture of a company's systems, often at a fraction of the cost of hiring a full-time security team.

However, there are those who are opposed to the idea of hiring hackers, arguing that it sends the wrong message and can even encourage more malicious hacking attempts. Critics argue that by hiring hackers, companies are essentially rewarding bad behavior, sending a message that if you break into a system, you might just get hired. Furthermore, there is the concern that even if a hacker is hired for a legitimate purpose, they may still have ulterior motives and could use their position to cause harm or steal valuable data.

Despite these concerns, the practice of hiring ethical hackers has become increasingly common in today's digital landscape. Many companies recognize the importance of having a strong security posture and are willing to take whatever steps necessary to ensure the safety of their data and systems. While it may be controversial, there is no denying that ethical hacking can be an effective way to identify and address security vulnerabilities before they can be exploited by malicious actors.

In conclusion, while the idea of hiring hackers may be controversial, the reality is that in today's digital age, it is a necessary step for companies looking to protect their valuable data and systems. By hiring skilled ethical hackers, companies can gain valuable insights into their security vulnerabilities and take proactive steps to address them. While there are certainly risks associated with this practice, the potential benefits are too great to ignore. As such, I believe that hiring ethical hackers is a valid practice and one that will continue to play an important role in the world of cybersecurity.


answered by: Hydra Master
Add a comment
Know the answer?
Add Answer to:
Chapter 10 is a critical chapter with regard to running an E-Commerce website. Security has become...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around...

    Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...

  • The discussion: 150 -200 words. Auditing We know that computer security audits are important in business....

    The discussion: 150 -200 words. Auditing We know that computer security audits are important in business. However, let’s think about the types of audits that need to be performed and the frequency of these audits. Create a timeline that occurs during the fiscal year of audits that should occur and “who” should conduct the audits? Are they internal individuals, system administrators, internal accountants, external accountants, or others? Let me start you: (my timeline is wrong but you should use some...

  • Chapter 16 The Tax Is Illegal—Getting the Story Out 1. Is it the TRUTH? 2. Is...

    Chapter 16 The Tax Is Illegal—Getting the Story Out 1. Is it the TRUTH? 2. Is it FAIR to all concerned? 3. Will it build GOODWILL and better FRIENDSHIPS? 4. Will it be BENEFICIAL to all concerned? —The “Four Way Test,” written by Herbert J. Taylor, adopted as creed of Rotary International, 1943 Lunapark was an urbanized township. It used to have farms, but they were all gobbled up with housing developments. The only businesses were nonagricultural manufacturers, offices, and...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT