Ethical Hacking

1 January 2017

Due to the advance technology of the Internet, the government, private industry and the everyday computer user have fears of their data or private information being comprised by a criminal hacker. C. C. Palmer, who manages the Network Security and Cryptography department at the IBM. Thomas J. Watson Research Center writes, “They are afraid that some hacker will break into their Web server and replace their logo with pornography, read their e-mail, steal their credit card number from an on-line shopping site, or implant software that will secretly transmit their organization’s secrets to the open Internet”.

This hacking is not only widespread, but is being executed so flawlessly that the attackers compromise a system, steal everything of value and completely erase their tracks within 20 minutes. Because of criminal hackers, ethical hacking is rapidly becoming an accepted business practice. One of the most significant current discussions in the information technology community is Ethical hacking? The topic of discussion varies from “why is ethical hacking so popular? ” to “Can hacking be ethical? ” What is ethical hacking?

Ethical Hacking Essay Example

Ethical hacking is the controversial practice of employing the tools and tactics of hackers to test the security precautions protecting a network. Ethical hacking is also called “penetration testing” and “intrusion testing” or “red teaming,” a term used when the U. S. government began hacking its own systems in the 1970s. In the 1980s, Telecommunications companies – a frequent target of budding cyber vandals who could gain street credibility by messing with the local phone company – began using ethical hacking as well.

Banks caught on in the 1990s, and later in that decade, most e-commerce firms depended on ethical hacking as a critical security measure, since a single interruption or intrusion could cause massive financial problems. Consequently, a company main goal in hiring ethical hackers is to test for vulnerabilities and mitigate them or defend against them. Why is ethical hacking so popular? According to Author James Tiller, a security services expert, states his opinion of why ethical hacking is as popular as, “Several reasons can be attributed to the frenzy we’re seeing, but for me one seems to stand out.

Based on hundreds of conversations with companies throughout the United States and most of Europe, many feel they are practicing sound security and have tamed the beast. Now all that is left for them is to test. Can hacking be ethical? According to author Kimberly Graves, the answer is “Yes! Ethical hackers are usually security professionals or network penetration testers who use their hacking skills and tool sets for defensive and protective purposes”. Who Are the Attackers? Ethical hackers are up against several individuals in the battle to secure the network.

The following list presents some of the more commonly used terms for these attackers: * Phreakers: The original hackers. These individuals hacked telecommunication and PBX systems to explore the capabilities and make free phone calls. Their activities include physical theft, stolen calling cards, access to telecommunication services, reprogramming of telecommunications equipment, and compromising user-id’s and passwords to gain unauthorized use of facilities, such as phone systems and voice mail.

A term used to describe often younger attackers who use widely available freeware vulnerability assessment tools and hacking tools that are designed for attacking purposes only. These attackers typically do not have any programming or hacking skills and, given the technique used by most of these tools, can be defended against with the proper security controls and risk mitigation strategies. * Disgruntled employee: Employees who have lost respect and integrity for the employer. These individuals might or might not have more skills than the script kiddies.

Many times, their rage and anger blind them. They rank as a potentially high risk because they have insider status, especially if access rights and privileges were provided or managed by the individual. * Whackers: Whackers are typically newbie who focus their limited skills and abilities on attacking wireless LANs and WANs. * Software Cracker/Hacker: Individuals who have skills in reverse engineering software programs and, in particular, licensing registration keys used by software vendors when installing software onto workstations or servers.

Although many individuals are eager to partake of their services, anyone who downloads programs with cracked registration keys are breaking the law and can be a greater potential risk and subject to malicious code and malicious software threats that might have been injected into the code. * Cyber-Terrorists/Cyber-Criminals: An increasing category of threat that can be used to describe individuals or groups of individuals who are typically funded to conduct clandestine or espionage activities on governments, corporations, and individuals in an unlawful manner.

These individuals are typically engaged in sponsored acts of defacement; Dos/DDos attacks identify theft, financial theft, or worse, compromising critical infrastructures in countries, such as nuclear power plants, electric plants, water plants, and so on. * System Cracker/Hacker: Elite hackers who have specific expertise in attacking vulnerabilities of systems and networks by targeting operating systems. These individuals get the most attention and media coverage because of the globally affected viruses, worms, and Trojans that are created by System Crackers/Hackers.

System Cracker/Hackers perform interactive probing activities to exploit security defects and security flaws in network operating systems and protocols. Standard Services Offered to Combat the Attackers Because of the onslaught of hacker attacks, companies offers ethical hacking services to combat the attackers. Bill Coffin (2003), in his article IT takes a thief: Ethical hackers test your defenses, points out that “what goes into ethical hacking depends on the range of services required, the size of the client and how much that client is willing to pay.

Typical services offered to combat attackers include the following: * External network hacking: This includes scanning the target’s Web server, firewall and routers for vulnerabilities from an external source. This is the most commonly provided ethical hacking service. * Internal network hacking: This involves deploying a team to the target site, where they conduct penetration testing on the company’s servers and routers, using its own equipment.

This is a good test for defending against disgruntled employees, industrial saboteurs (although uncommon) or anyone else who might try to intrude upon a company’s network from within. Application testing: A growing arena for the ethical hacking industry, application testing is aimed specifically at clients who have developed their own software, such as custom Web-based voting and polling programs or online stores and payment programs. Just about any software that is not delivered shrink-wrapped falls under the custom application category. Comparatively, scanning Web servers for vulnerabilities are fairly easy since they are all relatively uniform. When scanning custom applications, however, the ethical hacker must reverse engineer the program and analyze every line of code.

This is another increasingly common service because many firms employ wireless networks within their facilities. Such networks enable laptop users to move their computers from office to office while remaining connected to the local network. The downside is passersby out side the facility can use that same wireless technology to log in to the company’s network without the company knowing it. The most common way to perform a wireless LAN assessment is to conduct “war driving” –physically traveling around the target facility in search of wireless access points.

This is an old hacking technique where a hacker breaks into a network by calling phone numbers in the hopes of hitting an unsecured modem that the target has accidentally left active or forgotten. Automated programs enable hackers to dial thousands of number in a matter of moments. The technique almost always works and is one of the tests ethical hackers run that usually turns up an intrusion alert. * Social engineering: Like war dialing, social engineering is a simple but effective technique. An intruder calls someone within the target company and convinces him or her to give up sensitive IT information over the phone.

Ethical hackers test against this vulnerability by performing social engineering of their own to highlight what ruses the client’s personnel will fall for—and what it needs to educate itself against. * Thrashing: This is another old hacker trick in which intruders comb through the garbage of a target company in search of documents that contain important IT data, such as access numbers and passwords. Not all ethical hackers perform trash testing, which borders on breaking into the client’s facilities. Many firms choose to stick exclusively with technology testing.

Since some companies (such as financial institutions) employ armed guards, trashing carries with it the possibility of a tragic misunderstanding between the ethical hacker and his or her client’s security personnel. Those ethical hacking firms that do “trash” their clients often use subcontractors for the job and coordinate extensively with the client company so that security guards do not mistake an intrusion test for something more sinister”. Common Group of Hackers: Hackers can be divided into three groups: white hats, black hats, and grey hats.

According to author Kimberley Graves, “Ethical hackers usually fall into the white-hat Category, but sometimes they’re former gray hats who have become security professionals and who use their skills in an ethical manner. ” Graves offers the following description for the three groups of hackers: • White Hats are the good guys, the ethical hackers who use their hacking skills for Protective purposes. White-hat hackers are usually security professionals with knowledge of hacking and the hacker toolset and who use this knowledge to locate weaknesses and implement countermeasures.

Black Hats are considered the bad guys: the malicious hackers or crackers use their skills for illegal or malicious purposes. They break into or otherwise violate the system integrity of remote machines, with malicious intent. Having gained unauthorized access, black-hat hackers destroy vital data, deny legitimate users service, and basically cause problems for their targets. • Grey Hats are hackers who may work offensively or defensively, depending on the situation. This is the dividing line between hacker and cracker. Both are powerful forces on the Internet, and both will remain permanently.

And some individuals qualify for both categories. The existence of such individuals further clouds the division between these two groups of people. Legal Implications of Hacking What are the legal implications of hacking? Ethical hackers should know the laws and penalties of unauthorized hacking into a system. No ethical hacking activities associated with a network-penetration test or security audit should begin until a signed legal document giving the ethical hacker express permission to perform the hacking activities is received from the target organization.

Hacking is covered under law Title 18: Crimes and Criminal Procedure: Part 1: Crimes: Chapter 47: Fraud and False Statements: Section 1029 and 1030. Each is described here: 1. Section 1029 Fraud and related activity with access devices. This law gives the U. S. Federal government the power to prosecute hackers that knowingly and with intent to defraud, produce, use, or traffic in one or more counterfeit access devices.

Access devices can be an application or hardware that is created specifically to generate any type of access credentials, including passwords, credit card numbers, long distance telephone service access codes, PINs, and so on for the purpose of unauthorized access. 2. Section 1030 Fraud and related activity in connection with computers. The law covers just about any computer or device connected to a network or Internet. It mandates penalties for anyone who accesses a computer in an unauthorized manner or exceeds one’s access rights.

This is a powerful law because companies can use it to prosecute employees when they use the rights the companies have given them to carry out fraudulent activities. Other federal laws that address hacking include the following: Computer Fraud and Abuse Act of 1984 The Computer Fraud and Abuse Act (CFAA) of 1984 protect certain types of information that the government maintains as sensitive. The Act defines the term “classified computer,” and imposes punishment for unauthorized or misused access into one of these protected computers or systems.

The Act also mandates fines and jail time for those who commit specific computer – related actions, such as trafficking in passwords or extortion by threatening a computer. In 1992, Congress amended the CFAA to include malicious code, which was not included in the original Act. The Cyber Security Enhancement Act of 2002 This Act mandates that hackers who carry out certain computer crimes might now get life Sentences in jail if the crime could result in another’s bodily harm or possible death.

This means that if hackers disrupt a 911 system, they could spend the rest of their days in jail. The Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism (USA PATRIOT) Act of 2001 originally passed because of the World Trade Center attack on September 11, 2001. Strengthens computer crime laws and has been the subject of some controversy. This Act gives the U. S. government extreme latitude in pursuing criminals. The Act permits the U. S. government to Monitor hackers without a warrant and perform sneak and peek searches.

Conclusion One of the most significant findings to emerge from this research is that ethical hacking can be beneficial in identifying vulnerabilities before they are exploited. Ethical hacking is legal and performed with the target’s permission. It is part of an overall information risk management program that allows for ongoing security improvements. “Ethical hacking has continued to grow in an otherwise lackluster IT industry, and is becoming increasingly common outside the government and technology sectors where it began”.

How to cite Ethical Hacking essay

Choose cite format:
Ethical Hacking. (2017, Jan 11). Retrieved July 29, 2021, from
A limited
time offer!
Save Time On Research and Writing. Hire a Professional to Get Your 100% Plagiarism Free Paper