Hacking In the Business Society

1177 Words3 Pages

Hacking In the Business Society

From history we can observer that "human society" is easily

influenced, and often mislead. There is a near endless amount of

examples for this, ranging from the Suicidal Sect leaders (David

Koresh http://www.rickross.com/reference/waco/waco321.html ), to mad

dictators, with aspirations of taking over the world. This human

susceptibility of being easily mislead, is clearly apparent when

dealing with the issue of "Hacking", and "Hacking In the Business

Society". The movie industry has played a great role in misinforming

society of who a hacker is, and what they can do. ("How Hollywood

portrays hackers" Andrew Brandet

http://edition.cnn.com/2001/TECH/internet/04/05/hacking.hollywood.idg/

) For this reason it is essential to define key concepts and

terminology before one can discus this issue.

"Hacking", unfortunately, has become a word, with many various

meanings. For the sake of discussion, hacking will be defined, here,

as: "Breaking into a system", where "system" is defined to be a

computer, server, database, software, or any other source of

computerized information.

Another term that is not evident is "Business Society". The business

society comprises of:

i. Organizations (Firms, Companies, etc)

ii. Employees

iii. Consumers

iv. The Government

v. Hackers

This may seem a strange way to describe the "Business Society", but it

is vital to realize that they all play a very significant role in

Business, and hence all should be included when discussing this

matter.

Now that the key terms have been asserted, one must ask "What is the

underlying issue?" It can be en...

... middle of paper ...

... validate

the integrity of your organization's network." (http://www.afentis.com/services/index.html

Afentis) Protecting ones "system", has become a full time job and if

the problem of hacking is to be reduced it must be treated like a full

time job.

For a business to ensure security it must implement measure to protect

against both internal and external attacks. These measures may seem

drastic to many privacy groups, however the sacrifice may be far less

than the one paid at compromised data. Data is not only games, or

source code, it could be as seen above credit card numbers, addresses,

phone numbers. All this must be taken into consideration. Ideally a

system would be devised where internal systems could be monitored

without intrusion of privacy, but until then the sacrifice is less

than the potential danger.

Open Document