Ethics of Hacking and Cracking

Need help with assignments?

Our qualified writers can create original, plagiarism-free papers in any format you choose (APA, MLA, Harvard, Chicago, etc.)

Order from us for quality, customized work in due time of your choice.

Click Here To Order Now

Ethics of Hacking and Cracking

An ethic is a standard of right or wrong as per societal norms. Hacking is a technical term that refers to an attempt to successfully gain unauthorized access to a computer website, program, or other resources. On the other hand, cracking involves the action of breaking into a given computer resource such as a system, often for malicious personal objectives (Geisler, 2018). Hacking has rendered cybersecurity one of the most significant issues in the digital industry (Gupta & Anand, 2017). However, hacking can be ethical when a company performs a penetrative action into its systems to test the resources safety.

Many hackers and crackers are motivated by ill motives to perform malicious actions in systems that are not allowed. First, hackers hack to steal some database of a given company if the files information is beneficial to them (Geisler, 2018). Hackers manage to steal a companys identity where they open credit accounts, hence ringing up a lot of money. Second, hackers penetrate systems to have control of internet-enabled services.

Hacking and cracking can be ethical if the target company has consent for performing security tasks, and that is referred to as white hat. However, people who engage in unethical hacking violate the cybercrime law and are subject to the prosecutors legal measures due to the commission of an act classifies as black hat (Gupta & Anand, 2017). Black hat may lead to the loss of resources if the hackers manage to transfer funds into their accounts, leading to a company collapsing due to the loss.

In case computer technicians are authorized to penetrate a companys security testing resources, they should only do that under permission but not every time they wish. It is important to remember that hacking puts data and information to be at risk of malicious usage (Geisler, 2018). Therefore, companies should ensure that adequate security measures are put in place to discourage hackers from gaining access.

References

Geisler, K. (2018). Hacking wall street: reconceptualizing insider trading law for computer hacking and trading schemes. SSRN Electronic Journal, 3(2), 6-14.

Gupta, A., & Anand, A. (2017). Ethical hacking and hacking attacks. International Journal of Engineering and Computer Science, 10(4), 5-11. Web.

Need help with assignments?

Our qualified writers can create original, plagiarism-free papers in any format you choose (APA, MLA, Harvard, Chicago, etc.)

Order from us for quality, customized work in due time of your choice.

Click Here To Order Now