Tuesday, May 5, 2020

Discussing the Pros and Cons free essay sample

Topic 1: Write an essay discussing the pros and cons of hiring known hackers to test the security of a system. Nowaday, hacker is someone makes the technologys life to be more interesting. The term hacker has evolved over the years and been growing. For years there existed a fuzzy distinction between good and bad computer hackers, or we also call them white hat and black hat hackers. Whether they are good or bad, we cant negate they dont have any influence on the development of technology.Hiring known hackers to test the security of a system is an example of this idea. Some companies have the great database which stores information about back hat hackers. Its made and developed by white hatters. These hackers break into systems and report holes that company engineers quickly seal. Companies need to have appropriate way to choose hackers to hire. Another positive aspect to hiring reformed hackers as security consultants is that staying up with the latest security exploits and countermeasures is a full time job. In most companies, the IT staff has an acceptable level of security knowledge, but they must focus most of their attention on the day to day responsibilities of keeping the network up and running. A good security consultant focuses almost solely on security and consequently has a level of security knowledge that goes far beyond that of most other IT professionals. The risks of hiring so-called good hackers can be minimized by following several basic rules, but the use of hackers with criminal records is not common.With security of a system, hiring hackers will break the rule, go into and test, but there is a notable amount of back doors already compromising the systems after they finish. Controlled from remote locations by hackers, or malicious hacker takes over computers on the Internet and causes them to flood a target site with demands for data and other small tasks can happen when hackers know about the weakness of your system. Someone has the thinking like hacking is a criminal activity. We have so many examples about risk which is made by hackers.Recently computer hackers have been blamed for 40 million stolen credit cards from a single credit card processing company. People all over the world are now worried that these information may be used for identity theft. A report on the television states that credit card theft is a major global business that is costing some 40 billion dollars in losses every year. Ethics in Information Technology need to be cared when company decides to hire hackers to test their system security. Depend on the level of thics, there will be risks or not in that case. Some quality of hackers must be considered, seen as the standard to spend the belief. Topic 2: Write an essay discussing the ethics, risks and benefits of using cookies and spyware to track customer browsing and online purchasing habits. Spyware is regarded as the largest threat to internet users since spam, yet most users do not even know spyware is on their personal computers. Ethical and legal concerns associated with spyware call for a response.A balance must be found between legitimate interests of spyware installers, who have obtained informed consent of users who accept advertisements or other marketing devices, and users who are unwitting targets. Currently, there is not widespread awareness or understanding of the existence of spyware, its effects, and what remedies are available to defend against it. For industry sectors subject to data collection and protection laws, spyware results in unintentional noncompliance. First, the increasing prevalence of spyware is discussed. Various types of spyware are then overviewed.Ethical and legal concerns, including privacy invasion, surreptitious data collection, direct marketing, hijacking, and trespass are discussed. Finally, various methods of responding to spyware, including approaches by consumers, industry, and the U. S. government, are addressed, calling for a need to resolve escalating concerns of users while balancing the beneficial use of spyware as a legitimate marketing tool. People do not like being tracked. Even if some companies mean no harm, people still do not like the fact they are being monitored while they browse. Cookies can also show links in them if someone happens to look at them on your pc. Most of the websites that store the cookies, will have the site name or link visible in the cookie on your machine, so its normally easy to tell where the cookie came from. However, Cookies have some beneficial things. For example, when you log on to certain sites, did you ever notice that when you return again you do not have to sign on the next time, it will stored your password and id on your machine in a cookie. The same holds true when you purchase goods online, you can return later and your goods are still in your shopping.Cookies are also very beneficial to websites trying to market to you. For example, if you go to one of the major search engines, like yahoo. com, google. com etc. and search for web cookies, the next time you come back to the website to search again, you may see a large picture or cookie advertisement at the top of your screen. This is NOT what everyone sees, only you! They know you like this a lot because you searched for it last time you were there, so they now show you advertisements because it may be something targeted towards your buying habits.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.