Is Ethical Hacking Ethical?

1224 Words3 Pages

Tameem Haj-Ibrahim November 26, 2017 IS 350 – Section 451 IS350 Final Is Ethical Hacking Ethical? Section 1: Description Hacking is the term used to describe the process of breaking into and obtaining access to a computer system or network. It’s essentially the modern successor of the age-old breaking-and-entering. In this information age, information is power. Those who obtain a person’s personal information can use it to for various crimes including identity theft. Companies and corporations are not exempt from this either. Nowadays, many companies store their customer’s personal data in their databases (a massive collection of data, similar to a giant, virtual phonebook). As a result, they become targets of hackers who, if successful, …show more content…

The recent Equifax incident is a prime example of this (Gressin, 2017). Hackers were able to steal credit card numbers of 209,000 people as well as the personal information (name, SSN, addresses, etc…) of thousands more (Gressin, 2017). This was a huge incident and caused widespread panic among Equifax customers who feared they would become victims of identity theft. So how can companies and corporations protect themselves from hackers and cybercriminals? The answer, quite simply, is to employ the use of ethical hacking. Ethical hacking involves hiring hackers to try and break into your own systems in order to learn how they do it and resolve potential security breaches. The logic behind ethical hacking derives from the saying, “In order to catch a criminal, you must think like a criminal.” Thus, ethical hackers play the role of the villain in order to protect their employer from the real villains. They’re kind of like the doctors of the cyber world. Modern day doctors give their patients vaccines that may temporarily …show more content…

However, almost every user doesn’t bother even reading the Privacy and Terms of Service Agreements. In an experiment run by two college professors, students were presented with a terms of service agreement for a new social media platform called NameDrop. In this Terms of Service agreement there was a line that said “I agree to give NameDrop my future first-born child”. 75% of the students didn’t even bother looking at the agreement. The other 25% skimmed the agreement for less than a minute. Every student, without fail, clicked the “I have read and agree to the above Terms and Conditions” checkbox and clicked Join. Luckily, NameDrop doesn’t actually exist but it goes to show just how easily companies and corporations can get away with putting anything in these agreements. Companies can easily put in clauses stating that “By agreeing, you give [so-and-so] permission to sell your personal information to whoever they choose” and most of us would agree without even realizing it. I understand reading every single terms of service agreement is tedious, annoying, and time-consuming. In fact, it is estimated that reading all of the Terms of Service agreements we see would take around 76 hours a year. However, we should at least be aware of what’s at stake and what information we are giving

More about Is Ethical Hacking Ethical?

Open Document