Sunday, August 11, 2019
Advantages and disadvantages of having hackers or other systems Essay
Advantages and disadvantages of having hackers or other systems intruders as your IT security guardians - Essay Example ââ¬ËHackerââ¬â¢ is very commonly used term in computer technology and refers to wickedness, deceitful individual who is intended to steal some kind of information or data and burglarizes the business or personal computers. Despite the fact that there are some benefits of engaging a hacker as a member of corporationââ¬â¢s information technology staff since a corporation that upholds a corporate website and domestic network is capable to take advantage of the experiences built by the hacker. In other words, it can be said that all the hackers are not bad a number of them get through the network safety in an effort to teach various users (Marsh, 2011). This paper is also about the assessment of some of the main aspects regarding the varied nature of hackers. The basic aim of this research is to discuss the advantages and disadvantages of having hackers or other systems intruders as our business IT security guardians. What do hackers know that you (or your other IT people) don't know? Computer hackers have been using the weaknesses of any corporate network or else communication systems that are exposed to them, in computer networks. Though the reason can be that number of people using internet for some reason have been rising more and more every year, this outlines that a hacker can well be among one of them. As a matter of this realism, numerous unofficial groups of hackers explicitly have shown information, on, how they go about contravention effectively into some corporate computer systems (ISA, 2005). For the assessment of a hacker that is engaged for good intention will typically concentrate on how technology could be utilized to improve business production while illicit hackers pay their significant concentration on how technology is competent to be perverted as well as controlled (Purewire, Inc., 2010) and (Kelton, 2010). As the subsequent production of IT networking, the wireless 802.11 standard LANs are as well the novel playing fields for hackers . However, the security actions such as effectual encryptions and validation for standard wireless LANs are yet mounting; on the other hand, hackers have access to the user-friendly tools that are able to open more and more complicated attacks that are very dangerous to the information resources of the organizations. In this scenario, a number of enterprises make the blunder of considering that they do not need to agonize regarding wireless safety if they are operating non-mission decisive systems by means of non-susceptible data and information all through their wireless communication LANs. Though, a small number of networks function as isles of computerization. The majority of them make their connection with the enterprise backbone at a number of points, and hackers are capable to utilize the wireless LAN like a start point to the whole network. Therefore, each entrance indicating that network is supposed to be protected. During the summer time of year 2002, a trade chain was stat ed to be operating its typical wireless LAN with no some structure of encryption. The seller replied through stating that its wireless LAN simply managed its inventory function, consequently encryption was not desirable. Though, the open links invites hackers to watch about on the network to probably acquire access into secret client records or else sensitive business details plus information (AirDefense, Inc. , 2003) and (Kelton, 2010). Policies should IT security consultants be allowed to break in pursuit of security threats or threateners? There are two types of hackers. First type is known as White hat and other is Black hat. White hat hackers are those persons who are hired for positive purposes and for the effective management of business as well as corporate operations whereas the black hat hackers are opposite in nature. White
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.