$19.95 Buy and instantly download this paper now
The paper explains the difference between the ethical hacker and the criminal hacker and identifies what an information security consultant does to assess the security posture of a system as well as how sniffers test the vulnerability of the networks. The paper discusses how a company must require a comprehensive background and credit investigation on the security experts to be hired, and a detailed documentation that spells out the rules of engagement for the security consultant. The paper concludes that there will never be a 100% guarantee that information systems experts and organic security personnel will not become malfeasant individuals, but if enough control mechanisms and countermeasures are placed, it will be more difficult for them to do so.
From the Paper:"Having explained the real meaning or the etymology of the term hacker, it is now critical to evaluate the evolution of the term - or even the person. Thus, someone knowledgeable about computers does not necessarily mean that that person will always be ethical or morally upright as to keep the trust when it comes to managing the system. From here evolved two kinds of hacker - the ethical hacker and the criminal hacker or the cracker. Both are experts in computers and systems security except the former "employs the same tools and techniques as the intruders, but they would neither damage the target systems nor steal information. Instead, they would evaluate the target systems' security and report back to the owners with the vulnerabilities they found and instructions for how to remedy them. (Palmer, 2001)" The latter or cracker looks for weaknesses and loopholes in the system and exploits these for personal or financial gain and even to exact revenge on a target organization's information systems. Like any other people though, the ethical hacker and the criminal hacker can change or may change; and they may have a reversal of roles where the good becomes bad and vice versa. So in terms of protecting or guarding the information systems infrastructure and resources, is if safe to hire a former criminal hacker?"
Sample of Sources Used:
- Palmer, C. C. (2001). "Ethical hacking." IBM Systems Journal, 40(3): 769-780. [Online] Retrieved November 6, 2009 from, http://pdf.textfiles.com/security/palmer.pdf.
- Rivlin, G. (2005, July 31). "The sniffer vs. the cybercrooks." The New York Times. [Online] Retrieved November 6, 2009 from, http://www.nytimes.com/2005/07/31/business/yourmoney/31hack.html.
- Thomson, K. (2006, Aug. 23). Would you hire a hacker? [Online] Retrieved November 6, 2009 from, http://www.windowsecurity.com/whitepapers/Would-You-Hire-Hacker.html.
- Wikipedia Foundation Inc. (2009, November 3). "Hacker (computer security)." Wikipedia, the free encyclopedia. [Online] Retrieved November 6, 2009 from, http://en.wikipedia.org/wiki/Hacker_%28computer_security%29.
Cite this Term Paper:
Hackers as Information Security Experts (2012, May 31) Retrieved February 03, 2023, from https://www.academon.com/term-paper/hackers-as-information-security-experts-151324/
"Hackers as Information Security Experts" 31 May 2012. Web. 03 February. 2023. <https://www.academon.com/term-paper/hackers-as-information-security-experts-151324/>