Network Security And Ethical Hacking Essay

5261 words - 22 pages

Network Security & Ethical Hacking

Neal Patrick and his friends did not realise they were doing anything unethical, in fact: when asked by Congress “At what point he questioned the ethics of his actions” – he answered “Once the FBI knocked upon my door.”

“I have found that inadequate network security is usually caused by a failure to implement security policies and make use of the security tools that are readily available. It’s vital that companies complete professional risk assessments and develop comprehensive security plans and infrastructures that are publicly supported by upper ...view middle of the document...

It is fair to assume that the original LANs where based on a very basic topology, select personnel used them (normally IT associated people), they were cumbersome and slow and everything took an age to do anything on them. There was no need for security at the time as there was no perceived threat from within as everyone was trusted and as the Internet did not exist there was no externally posed threat either.
Once LANs became linked up and WAN links were the norm plus the birth of the Internet and an increase in LAN exposure to working professionals (Non IT personal) there became a need to safeguard the network not only from external threats but also internal threats as well.i
It’s worth mentioning that the need to safeguard personal information is now a legal requirement under the Data Protection Act 1998 – if information is kept pertaining to a living person then that information must be stored in an adequately secure environment scaling to the severity of the data. For example, your email address does not have to have large security back ends, a simple encryption in a database would be fine, but medical records which are incredibly personal do require larger amounts of security to ensure they cannot be viewed or edited by unauthorised individuals.
Some governments in different countries are paving the way for the future by introducing legislation with regards to network security. By forcing people’s hands and introducing security principles to safeguard data on a network this can only be a good thing. Once these laws become enforceable, a badly designed or security lacking network will be made accountable and companies or individuals will be penalized accordingly.

An up to date example of the Government level IT Security legislation is the E-PARASITE Act being pushed through the US Congress as this report is written. The E-PARASITE act solicits the use of IT Security measures within the US to “unilaterally censor foreign websites.” This act provides the prime example of how the use of Security can trip the fine line between keeping people safe and censoring their lives – this act has become hot topic across the internet, companies such as Google, AOL and Facebook has opposed such a law that would pose huge risks to the internet. The precedent this sets, by allowing individuals and companies to file litigation to force ISP’s, Search Engines, Payment Processors and Ad networks to block and cease business with websites linked with online Piracy, and by extension, anything they consider illegal by US law.
Whilst enforcing Security measures may be prudent, this law has given way to a debate with excellent arguments: Critics say “The bill as drafted would expose law-abiding US internet and technology companies to new uncertain liabilities, private rights of action and tech mandates that would require monitoring of websites.”
This opens the floor to a larger debate of whether it is right to be able to do this, is this bill...

Other assignments on Network Security And Ethical Hacking

Cyber Security Essay

317 words - 2 pages Why Hire Me? _____________________________________________________________ I am a highly motivated and professional Security Engineer with (Linux Professional Institute (LPI 102) certification and willing to pass CEH Certified Ethical Hacking). Capable of delivering at the highest level. With excellent interpersonal skills, I am confident in my ability to become the most valuable member of your company. I have developed expertise in networks

Biggest Challenges Today Are To Control The Network Security

399 words - 2 pages  Biggest challenges today are to control the network security. Network security is having protection of networks and their services from unauthorized access, destruction, or disclosure. Malicious acts bring up the important topic of disaster recovery. Companies must have up to date copies of their important documents and software to prevent extended downtime. The saved information will let the company's employees continue to work while the IT

Computer Security & Privacy - Tjx

620 words - 3 pages / card invalidated / expiring the spending power, Financial Institutions –re-issue the cards for those customers whose information was compromised, Store Associates –change their credentials for system access, Vendors, Merchandisers - Modify the information shared due to mutual network and Richel Owen, CSO- design long and short term strategy to address the security breach issue. Intruders utilized the data stolen to produce bogus credit/debit cards

Security Requirements And Possible Risks

1019 words - 5 pages following security requirements must be established. The requirements, at a very minimum, are firewall protection, password protection, and Risk Management Software. The term “firewall” in computer talk can be either software-based or hardware-based and is used to help keep a network from being intruded. Its main goal is to control incoming and outgoing network traffic through analyzing the data packets and determining whether it should be

Secutiry Threats

452 words - 2 pages Computer Security. McGraw Hill. Retrieved from Scambray, J., McLure, S., & Kurtz, G. (2001). Hacking exposed: network security secrets & solutions. Washington D.C.: McGraw-Hill/OsborneMedia.

Busn 460

489 words - 2 pages user would urinate or deposit saliva on a microchip and the app would tell them if they are infected. They would then go and securely get their results offline without ever having to see a doctor. This raises so many ethical and moral concerns, not to mention the security issues of having your DNA uploaded to a database. Cache, J., Wright, J., & Liu, V. (2010). Hacking Exposed Wireless : Wireless Security Secrets & Solutions. New York

Keeping Information Secure

1741 words - 7 pages about how computers work and get excitement out of cracking the security of remote computer systems. They often enjoy programming and have expert-level skills in one particular program. For these individuals, computer hacking is a real life application of their problem-solving skills. The purpose of hacking could be anything like to get money illegally, destroying the network, stealing, for the fun or some other motives as well. There are very

Computer Viruses

1026 words - 5 pages perpetrate cybercrimes, and they are: hacker, cracker, cyberterrorist, cyberextortionist, unethical employee, script kiddie and corporate spy. A hacker is defined as someone who accesses a computer or computer network unlawfully. They often claim that they do this to find leaks in the security of a network. The term cracker refers to someone intentionally accessing a computer or computer network with malice in mind. They access computers with the


444 words - 2 pages Another privacy issue is hacking. Because social networks do not offer security measures for their users, many of the computers used by networkers are vulnerable to hackers. Every bit of information on a networker’s computer becomes available to those skilled in this science, often without the knowledge of the networker. Along with the ability to hack is the ability to plant viruses. Many viruses today are passed through social networks

Importance Of Security Of Personal Belongingsg

642 words - 3 pages within that machine absolutely must be accountable for his or her actions or the entire thing may break down. None of it would be possible without accountability. Security is essential to maintain a functioning network and productive employees and soldiers. These security recommendations should be implemented to ensure a safe and secure operating network where there are minimal fears from outside influences such as viruses, spam and hacking

Case Stury

4098 words - 17 pages  pervasive confusion among plaintiffs and defendants alike. The goal of this study  is to show just that: to highlight the ambiguity of the law through examples, to discuss the stiff  legal repercussions these hacktivists have faced, and to consider the dialogue between the news  media and the general public about the appropriateness of criminal sentencing and the nature and  motives of hacking incidents.  For those wishing to reform the law

Similar Documents

Ethical Hacking And Network Defense Unit 2 Assignment

1705 words - 7 pages _____________________________________________ Lab #6 Design and Implement IT Security Policies to Help Mitigate Risk – FERPA Compliance Case Study Course Name: Computer and Network Security Student Name: Instructor Name: Lab Due Date: 05/07/2013 Lab Assessment Questions & Answers 1. There are 5 steps to the ethical hacking process. The first step is reconnaissance, which involves gaining information about the target system

Ceh Course Essay

458 words - 2 pages attacking their own networks, no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking. This course prepares you

Ethical Hacking Essay

2587 words - 11 pages systems for personal gain. 2-Technically, these criminals are Crackers as Criminal Hackers. Crackers break into systems with malicious Intentions An ethical hacker is a computer and network expert who attacks a security system on behalf of its owners, seeking vulnerabilities that a malicious hacker could exploit. To test a security system, ethical hackers use the same methods as their less principled counterparts, but report problems instead of

Ethical Issues Arising From The Intersection Of Law, Compliance & Investigations

417 words - 2 pages There are several ethical issues that arise in information security. The security is one of most issue of concern for every business organization. Ethics is a term which is used to distinguish between right or wrong things. Ethical issues in computer security includes cybercrimes, computer hacking and information warfare. In an Internet world, many banking organizations are attacked by attackers and millions of credit card details stolen every