Week6_CourseProject ALL ANSWERS 100% CORRECT FALL-2021/2022 SOLUTION GUARANTEED GRADE A+
The terms of hackers and being related to Hat denotes the intent of a person’s use of information in the hacker world. Ethics are the foundation of what het a hacker wears. The idea is that morals are the importance of what a hacker should do in a situation where there are vulnerabilities that could damage a system. In a situation where there are exploits in a system that could easily be used to get vital information should be records and fixed. If the ethics do not apply to that person typically they are Black hats. Then if the ethical code does apply by performing tasks using the information to strengthen a network would be a White hat. The Grey hats are a bit more complicated in the fact that they wish to perform on the ethical side as well as unethical. With the ultimate goal being the information and finding weaknesses in a system the hats are inevitably the future of security. Since the ethical code of a hacker is very straightforward it is easy to find a White hat. They are involved with companies and advertise skills to let other know what their capabilities are and how to fix them. “In the professional landscape, white hats work under the pretense of multiple job titles — security engineer, security analyst, ethical hacker, penetration tester, security researcher, etc.” (Knowles, 2016) These occupations operate under the ethical means through contracts and Non Disclosure Agreements (NDA). This protects the company and the hacker from any legal issue that may arise by performing tasks to find vulnerabilities. Since the information could be very sensitive and be used to exploit the company, the ethical hacker, is then doing the right thing by not releasing that information. The process of finding vulnerabilities is laid out step- by-step for the company prior to performing any tasks. This lets everyone know what is going to happen, what the results were, and how to fix them. There are no secrets when performing a penetration test, which is the ethics of a White hat. There is a more know name for hackers and that being the Black Hat. These are very skilled technicians at penetrating network systems and gaining access to information. Though there are variants to the malicious operations and how well they are performed. An attack of an experienced Black Hat enters the network then leaves without a trace of anyone being there. There may not be any intent of financial gain from an attack. The hacker may just out to see where the vulnerabilities are in the network to later plant code the will damage systems or computers. Also the political attack for information is common to getting control over a system to the funnel information out of the network without out alerting security. The Black Hats operate with out boundaries and rules that have to be approved. Which is also the other end of saying they are more experienced than any other hat since they operate without limitations.
Written for
- Institution
-
Devry University
- Course
-
SEC 311 (SEC311)
Document information
- Uploaded on
- December 7, 2021
- Number of pages
- 6
- Written in
- 2021/2022
- Type
- Other
- Person
- Unknown
Subjects
- sec 311
-
week6courseproject