Tuesday, February 11, 2020
Social Engineering (ethical hacking ) Essay Example | Topics and Well Written Essays - 2000 words
Social Engineering (ethical hacking ) - Essay Example However, while the internet has been a blessing to humankind, along with its bounties and huge number of facilities, it has brought a few risks as well. Studies (Erickson, pp. 49-56) have indicated that stealing of valuable information, corruption, and vanishing of computer systems are some of the major risks associated with the utilization of internet. Although in the past, it was an understanding that information locked in a file cabinet is more vulnerable than the existence of that information in electronic mode. However, things have changed now, and people are again relying on file cabinets to keep their records due to huge amount of issues related to information systems security on the internet. In this regard, internet has resulted in commencement of various beneficial things such as electronic commerce, e-mail, e-advertisement, and e-education; however, along with such technological advancements, there is one major issue among the various IS security related issues; hacking (McClure & Shah, pp. 20-26). In other words, a huge number of issues and threats exist in the world of information systems; however, hacking is one of the major issues that have been deteriorating the security of information security systems, which will be the focus of this report in detail. Analysis of different sources (Harris & Ness, pp. 49-63) has indicated that until today, the computer industry is using the term of hacking or hacker for dual purposes. In the beginning, hacker would be an individual who was interested in learning new things about the computer systems, and was keen to discover new capabilities of the computer networks unlike usual users of the computers who were interested in learning only standard usage of the computers. In other words, enthusiastic programmers were hackers, and as the time passed, skillful programmers continued to
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.