-
Essay / Hacking - 1637
Determine whether hacking a website is justifiable, by applying your theory to a real-life case in which someone hacked a system, including the company name and details. In general, hacking or more specifically, cracking is not justifiable due to the negative connotations associated with the term. Hackers are generally classified into three categories: white hat, black hat or gray hat (Arnone, 2005). White hats are personnel often employed to find vulnerabilities, penetrate or exploit a security system so that the company can take corrective action. Black hats are usually associated with malicious activities (cracking) such as the development and deployment of viruses, worms, theft or damage to a system. Gray hats fall somewhere between white and gray hats. Arnone explains how the federal government uses hackers to test its own security measures and learn how to secure its systems by understanding how hackers operate and penetrate network systems (Arnone, 2005). The white hat hacker has proven his worth by showing a company where its security vulnerabilities lie. White hackers are also wanted. They are hired by consultants for many Fortune 500 companies to detect external and internal weaknesses and report them in order to close these loopholes (Wiles, 2008). There are certain cases in which piracy can be justified. Hacking for national security can be justified although controversial. The military has used hacking techniques for decades. Although not specifically linked to a computer, they deceived the enemy using false radio broadcasts, such as preparations for the Normandy invasion during World War II. The military has been monitoring radio conversations, listening... middle of paper ...... Ever-evolving threats and increasingly sophisticated cybercriminals, AT&T strives to stay ahead of the curve. The company's sophisticated network monitors, probes, and algorithms to identify known or suspected viruses, worms, and other Internet attacks – often destroying them before they reach a business” (AT&T, 2011). AT&T emphasizes individual vigilance regarding personal account information. AT&T will never ask for account information via email or phone. If you receive such requests, consider them fraudulent. AT&T has alerted the Federal Bureau of Investigation Cyber Task Force to provide assistance and review our security systems to prevent a future breach. We treat this breach very seriously and maintaining your trust is our highest priority and we apologize for the incontinence of this security breach. cause. Sincerely,