Title 1 ABSTRACT To take advantage of this template’s design, use the Styles gallery on the Home tab. You can format your headings by using heading styles, or highlight important text using other styles, like Emphasis and Intense Quote. These styles come in formatted to look great and work together to help communicate your ideas. Go ahead and get started. 2 INTRODUCTION 2.1 ETHICAL HACKING Ethical hacking is the view of the IT infrastructure of an organization through the eyes of a hacker. The aim is to test the strength of the protection of the target. Ethical hacking is usually done on the basis of pre-agreed agreements on how to deal with the vulnerabilities found. This can vary from just a reporting up to the actual exploit or fix the leak. 2.2 PHASES OF HACKING • Foot Print • Scanning • Enumeration • Access • erase Tracks • Create Backdoors 2.2.1 Foot Print The purpose of foot print is to obtain general information about a target through public information on websites, directories, the Yellow Pages. Useful information include names and addresses of employees, phone numbers, job titles and organization charts. This information will be used for the hack itself or for social engineering. Foot print is about information gathering of the potential target e.g, address and name data. The collection of information is essential prior to the hack operation. It is important to make sure that nothing is overlooked. The techniques that are used for information gathering are
The different formats in which text may be presented are they are font typefaces, headings, font size, effects (bold, italics, underline, etc.), colours etc. We can format the text in paragraphs, tables and columns. We can add bullets or numbers, headers and footers.
Ethics, in business, refers to moral principles and standards that define acceptable behavior in the world of business. Ethical decisions foster trust among individuals and in business relationships. Recognizing ethical issues is important in the workplace. An ethical issue is an identifiable problem requiring a person or organization to choose from among several actions that may be evaluated as ethical or unethical. When you’re determining is a situation is ethical or not, there are three factors to take into consideration. Individual factors, organizational factors, and opportunity. Individual factors are sets of principles that describe what a person believes are the right way to behave. Organizational factors include the influence of managers, coworkers, and the work group. Opportunity is a set of conditions that punish unfavorable behavior or reward favorable behavior. “Target thrives on competing to win in the marketplace. We compete and negotiate actively, but always with integrity. Taking advantage of anyone by manipulating or concealing
The word hacking, usually associated with information technology, is a term used for the development of creative solutions for a problem by someone in a non-professional environment. With the introduction of personal computers and the internet, anyone could create solutions to problems in computer science. This led to the emergence of “hacker culture”, leading to the decentralization of computer industry (Hicks, 2014).
The different formats in which text may be presented are font typefaces, headings, font size, effects (bold, italics, underlined), colours and text boxes. We can format text in paragraphs, tables and columns. We can add bullet points, headers and footers. We can also add tables, graphs, diagrams and flowcharts as a clear way to represent data and processes.
The second step of the ethical hacking process typically consists of two parts: port scanning and
Good example of format or style. Language and structure clear and unambiguous. Structure demonstrates understanding and application.
This information should be protected by others for potential by some hacker threats,they can read and change the contents of the message and information and exploit this information for personal benefit[17] .
One of the unethical considerations to put into perspective is the sophisticated use of Hacking/cracking. Hacking “To gain unauthorized access to data in a system or computer”. Also cracking, “which is the technique of the modification of software to remove or disable features which are considered undesirable by the person”. The unlawful and unethical use of these techniques have the features and sophistication to create devastation and destruction to our lives through the exploitation of technology. For example, as shown in Die Hard 4, this movie visually demonstrates how “Hacking” was frequently used to exploit technology to create a “fire sale”. This was used to achieve unethical outcomes to hackers which would cause devastation, unrest
Despite Kenneth argues that hacktivism is morally impermissible due to its moral disvalue by referring that hacker are trying to get away from punishment and negatively affect innocent third party, I believe that non-malicious hacktivism is morally permissible. I will attack her points by arguing if the intellectual property rights is unnecessary, there will not be any legitimate punishments. Then from the utilitirism side, I will discuss the moral value or benefits of hacktivism is over its moral disvalue to the whole society.
The second instalment of lab exercise for the MIS 515, Information Security in Private and Public Sector involved a general fact finding about a selected target. It was intended to get us familiar with the various tools we could use to in assessment of networks and websites. We were asked to follow some steps given to us in the assignment narrative and see what we could find on our own.
Communication plays a vital role in our lives and our professional scope, as such it is the easiest landing for malicious actors to obtain some information that they need to execute their acts. Some of the ways through which they get this information are as discussed.
For a writer to better understand style, multitudes of books and helpful guides have been published. Many are written as lists of rules about word choice, constructions to avoid, common stylistic traps, and other such things. One of these is The Elements of Style by
Computer hacking: Is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose. People who engage in computer hacking activities are often called hackers. Since the word “hack” has long been used to describe someone who is incompetent at his/her profession, some hackers claim this term is offensive and fails to give appropriate recognition to their skills. The majority of hackers are technology buffs. They are self-motivated and learning about computers is their true passion. ("What Is Computer Hacking?" WiseGEEK. N.p., n.d. Web. 27 July 2013).
The ethical issues surrounding hacking, stem from several sources mainly dealing with order and control, and information ownership. What is difficult to decipher from all the media hoopla surrounding the terms, "hacker" and "hacking" is both the simultaneous sensationalism and the condemnation of said activities. Of course just recently, even a movie was made and was appropriately called Hackers. The term and all that it implies has truly entered our popular consciousness when Hollywood has made a box office movie on it. As the advancement of computer technologies and systems of information become increasingly more and more complex in today's fast paced modern world and said technologies become an integral
As the search is undertaken for books, articles, Internet sites, on hacking or network security themes, it may be necessary to change phrases, add additional keywords and incorporate different databases. Modified with different areas in social themed, education, business, management not necessarily related to any topic in information technology may also present positive results. The more keywords and expressions incorporated with terms in social objectives, social discernment, and cyberbullying may likewise help center exploration of the issue.