Hacking is known as weakness in the computer systems and network for the purpose of exploiting the weakness to gain access. Hacking is considered as using the computers for the purpose of committing fraudulent acts such as Fraud, Privacy, invasion, stealing the personal data, etc. this essay covers the topic related to Penetration Testing V/S Ethical Hacking, difference in White, Grey, and black hat hackers, and lastly essay is concluded with brief conclusion.
Generally, it is considered that penetration hacking is very similar to ethical hacking, and sometimes these terms are used interchangeably, but some differences are there which we should observe.
Penetration testing is the term which is specific in nature and it only focus on discovering the vulnerabilities, risks, and target environment for the purpose of securing the system and taking control of the system. In other words, this testing targets the defense system of respective organization which also includes computer system and infrastructure.
On the other hand, Ethical hacking is considered as term which is extensive in nature, and mainly covers all techniques related to hacking and also other attack techniques which are associated with computer. This system of Hacking also ensures that the security related to target system and also discover the security flaws and vulnerabilities. This system is beyond the hacking system but it also safeguards the security for future purpose. Therefore, we can say that penetration testing is the part of ethical hacking (Infosec, 2016; Baloch, 2013).
Generally, Hackers are differentiated on the basis of Hat such as White hat, Grey hat and Black hat. These terms are derived from old spaghetti westerns because in these bad guys wears black cowboy hat and good guys wear a white hat. For the purpose of determining type of hacker two main factors are considered and these factors are motivations and whether such hackers are breaking the law. These hackers are defined below:
Black hat hackers- Like other hackers black hat hackers have wide knowledge related to break down the computer networks and also bypassing the protocols related to security. They are responsible for malware, and malware is the method through which they can access these systems. The primary objective of black hat hackers is personal or monetary gain, but they also get involved in cyber espionage, protest or sometimes they are just get addicted to the thrill of cybercrime.
These types of hackers getting their feet wet by spreading the malware, and they also want to get experience of hackers who are aiming to steal data mainly information related to financial transactions, information which is personal in nature, and also login credentials. It must be noted that these hackers not only steal data but they also modify or destroy the data as well (Kovacs, 2015).
On the basis of ethic theories, it is clear that these types of hackers are not ethical because their motivations are malicious. They are considered unethical because they are influenced with the feeling of revenge and power.
White hat hackers- these hackers use their knowledge for good purposes and not for any evil purpose, and these hackers are also known as ethical hackers. These hackers are also paid employees or contractors, who are working for companies and they are also known as security specialists and they are trying to find holes in specialization through their hacking. These hackers use same methods as black hat hackers but there is one exception that is they do all these activities with the permission of owner because of which this process becomes completely legal. For the purpose of ethical hacking even several courses, training, conferences and certifications are organized by companies.
On the basis of ethical theories this type of hacking is ethical in nature because their motivations are not malicious, and they are driven by honorable motivations.
Grey Hat Hackers- in life several situations occurred which are not considered as black or white, but they are actually known as grey areas. Grey hat hackers are considered as mixture of both black hat and white hat hackers. In actual, these types of hackers search the vulnerabilities in the system without the permission or knowledge of the owner. In case any issue is found then they will report such issue to the owner and also charge fees for fixing such issue. If owner does not reply than these hackers sometimes post the exploit online for the purpose of world to see.
Generally, intentions of these types of hackers are not wrong they just want to get some benefits from their findings. They do not exploit any vulnerability, but still this type of hacking is considered as not legal because permission is not received by hacker from owner and he just try to attack the system (Hoffman, 2013).
Conclusion:
After considering above facts it is clear that there is various type of hacking and hackers are there. This essay also state the difference and similarities between the penetration test and ethical hacking in which it is found that penetration test is the part of ethical hacking.
Now, this era is known as information age and it can be described as the era where economic activities are mainly based on the information. These changes occurred because of development and use of technology.
All these developments also brings new ethical and juridical problems, and these problems are specially related to various rights of person such as right to access information or right of privacy. These rights are usually threatened the free flow of information and also the protection of owner’s economic interest in case of intellectual property.
In this essay, the main topic of discussion is an ethical issue which is related to right to privacy of the individual which is threatened by the use of technology. Lastly this essay is concluded with brief conclusion (Edewor, 2011).
Generally, ethical actions of persons are considered those actions which are performed as per the criteria of those actions which are defined as good actions. It basically defined the good and bad actions of individual. As per the Spinello the main purpose of ethics is to help us behave in honorable manner and attain those basic goods that make us more fully human.
On the other hand, Privacy is defined as those conditions which are considered as exclusion from publicity. Usually, this concept is defined as natural right of the person, and it must be noted that this natural right provides the foundation for the legal right. Therefore, this right to privacy is protected under the private law.
Although it is true that technology play major role in gathering, storage, retrieval and dissemination of information, but the ethical impact of technology relates to the accessibility, inaccessibility and the manipulation of information. These impacts result in possibility of wider as well as simultaneous access of information. Because through implications it becomes very easy to access information related to any person which is private in nature. It is also possible that person is excluded from the information which is necessary and kept in electronic format by using the different security measures such as password protection.
Manipulation of information through technology refers to the integration of information such as merging of the documents, repackaging such as translations of the information and also integration of textual and graphical formats, and it also includes possible alteration of information such as changing the images.
While processing the information through the use technology cannot be considered as ethically neutral. Generally, people refer the use of technology as a value laden process, and even it is determined that ontological status of any document is changed because of technology with accompanying ethical implications. Through these it is specifically known as the manipulation of information by use of technology (Hartman, 2017).
As per Brown, on other side of coin it is correct that various ethical problems are caused because of the use of technology and it is necessary for us to rethink our moral values. Therefore, it is clear that various usages of technology impact the privacy of people which actually manifests the variety of areas.
For the purpose of handling and processing the different categories of information such as private and personal information, and in case of professional information the information deals with following ethical issues:
Conclusion:
In this essay, the main point of discussion is ethical implications related to right of privacy, and after considering all above facts it is clear that use of technology while processing any information will poses important questions and this right is directly relates with the right to freedom and human autonomy.
References:
Britz, J. J. Technology As A Threat To Privacy: Ethical Challenges to the Information Profession. Retrieved on 4th June 2017 from: https://web.simmons.edu/~chen/nit/NIT%2796/96-025-Britz.html.
Hartman, P. L. Technology and Ethics: Privacy in the Workplace. Retrieved on 4th June 2017 from: https://www3.nd.edu/~rbarger/privacyintheworkplace.html.
Edewor, N. Ethics and Social Issues Related to Information Communication
Technology (ICT). Retrieved on 4th June 2017 from: https://www.irma-international.org/viewtitle/43777/.
Victoria parliament. Security and Privacy Issues Relating To Technology AndThe Law. Retrieved on 4th June 2017 from: https://www.parliament.vic.gov.au/images/stories/committees/lawrefrom/technology/barisic_paper.pdf.
Baloch, R. (2013). Ethical Hacking Vs Penetration Testing. Retrieved on 4th June 2017 from: https://www.rafayhackingarticles.net/2012/10/ethical-hacking-vs-penetration-testing.html.
Infosec. Ethical Hacking vs. Penetration Testing. Retrieved on 4th June 2017 from: https://resources.infosecinstitute.com/ethical-hacking-vs-penetration-testing/#gref.
Kovacs, N. (2015). What is the Difference Between Black, White and Grey Hat Hackers. Retrieved on 4th June 2017 from: https://community.norton.com/en/blogs/norton-protection-blog/what-difference-between-black-white-and-grey-hat-hackers.
Hoffman, C. (2013). Retrieved on 4th June 2017 from: https://www.howtogeek.com/157460/hacker-hat-colors-explained-black-hats-white-hats-and-gray-hats/.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download