Tuesday, February 5, 2019

Hacking Essay -- Technology, White Hat, Back and Grey Hat

Determine if hacking into a tissue site is ever justifiable, applying your theory to a real-world case in which individual hacked into a system, including the name of the company and details. In general, hacking or more specifically cracking is not justifiable due to the negative connotations associated with the term. Hackers argon more often than not categorized into three categories, white assume, black or grey hat (Arn wiz, 2005). White hats are personnel that are often employed to meet holes, penetrate or exploit a security system so the company commode take corrective actions. Black hats are typically associated will malicious activity (cracking) such as developing and deploying viruses, worms, thievery or damaging a system. The gray hats are somewhere in between the white and the gray hats. Arnone discusses how the federal government is utilizing hackers to test their take security measures and learn how to secure their systems by understanding how hackers opera te and soak up entry into network systems (Arnone, 2005). The white hat hacker has proven take to be by showing a company where their security vulnerabilities lie. White hackers are also in demand. They are hired by consultants for many great deal 500 companies to find external and internal weaknesses and report them in tramp for those holes to be closed (Wiles, 2008). There are some instances in which hacking can be justified. Hacking for National Security can be justified although controversial. The force has been using hacking techniques for decades. While not specifically tied to a computer, they concord deceived the enemy using fake radio broadcasts, such as the preparations for the infringement of Normandy in World War II. The military has monitored radio conversations by eavesdro... ... forever and a day evolving threats and increasingly sophisticated cyber criminals, AT&T works to stay one step ahead. The companys sophisticated network monitors, probes, a nd algorithms to identify known or guess viruses, worms, and other Internet attacks often destroying them before they reach an enterprise (AT&T, 2011).AT&T stresses individual vigilance regarding their personal account information. AT&T will never ask for any account information via netmail or over the phone. Should you receive such inquiries, lot it as fraudulent. AT&T has alerted the cyber task force of the Federal Bureau of Investigation to return assistance and examine our security systems to prevent a future breach.We treat this breach very serious and maintaining your trust is our highest priority and we apologize for the incontinency this security breach caused. Sincerely,

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.