Friday, June 7, 2019
Ethical Issues with Hacking Essay Example for Free
Ethical Issues with Hacking EssayThere is a new crime on the verge of being on Americas clear up ten crimes describe, figurer hacking. Computer hacking is the practice of unlawfully gaining access to and sometimes tampering with cultivation in a computer system. Since the cyber age, the use of computers has slowing interconnected into most of societys everyday life and since then new crimes have emerged as a result of this age. The access of information readily available at the thumb of a button, erect be very enticing to unlawfully acquire, but the companies who hold this important information has a duty to keep every last(predicate) files and information safeguarded. As a result of the cyber age, no longer argon there just mundane crimes in America such as murder or assault. There has been a new crime wave, crimes of technologies. Cyber crimes are now listed in the top leading crimes of today. Out of the top ten crimes in America during 2012, computer related crimes wer e at number seven and number ten. Seven being computer theft, and ten being identity theft, with computer hacking rising on that list daily.With careful planning and updated online security, cyber crimes such as, hacking domiciliate be decreased. According to the New York Times, they said that, new security protocols and stronger firewalls, which monitor computer networks for suspicious traffic, could help to discourage a person from hacking. Security experts say companies mustiness also adapt their security systems to protect against attacks through smartph anes and tablet computers. Although such mobile devices increase contraption for workers, they essentially a create a new door into the network, which then needs its own security watchdogs.A company is committed to keeping all the information as private as possible. When a person decides to hack into a companys database, email or website, they are not only putting their self at risk, but everyone involved will be negatively realised. The company who got hacked will most likely be publicized and their confidentiality of their patients information has now been corrupted. Lawsuits can follow for the company or the individual hacker if they get caught and it could also be very damaging for the individual who might have gotten their information hacked in the process.Policy PositionCompanies and their employees have a duty to uphold a certain standards when dealing with the consumers ain and private information. Dell has outlined some interference steps that can be taken on a company and a personal level to prevent hackers from infiltrating a computer networking system. Among these steps are the following Education- Hackers arent the only ones who can gain power from information. By educating yourself and employees about the types of scams that exist on the Internet and how to avert them, you are putting yourself one step ahead of the cyber criminals.Use a firewall- Firewalls monitor traffic between your computer or network and the Internet and serve as a abundant first line of defense when it comes to keeping intruders out. Use comprehensive security software and keep your system updated- Because hackers have a wide variety of slipway to access your system and information, you need comprehensive security software that can protect you from all angles. Secure your wireless network- Hackers can access data duration its in transit on an unsecured wireless network. You can keep the hackers out by enabling the firewall on your router and changing the routers decision maker password. Use strong passwords- Although it may be easier for you to remember short passwords that reference your birthday, or pets name, these kinds of passwords also make it easy for hackers.Strong passwords can go a long way in helping secure your information. According to the FBI, the threat that criminal hackers pose to corporate and government information systems has banish in the past five years. Stakehol ders including the company, employees and customers have the right to know about concealment-laws and should know that any information that is gained unlawfully and shared with the public comes with major consequences. Stakeholders must know what is at stake when information is compromised. Upon being hired an employee must know their companys policy regarding information that can be disclosed. An employee has the duty to take actions base on ethical standards that must be known and recognized by all who are involved.In Maryland, accessing and telling the world about another persons personal information is an invasion of silence that may make the hacker liable for money damages to the victim. (Lawyers.com, 2013) You, an employee, a hacker and the company has the duty to respect privacy of information and action. A person who violates subsection (c)(1) of this section is guilty of a misdemeanor and on conviction is subject to imprisonment not exceeding 3 years or a fine not exceed ing $1,000 or both. (2010 Maryland Code CRIMINAL LAW. TITLE 7, section 7-302) Other customers of that company may feel their privacy information and action should be respected by others. The other customers feel like the customer has a duty to them to uphold their privacy and not share it with third parties or other people they did not give permission.Bottom line is that companies have the same problems with theft of intellectual property and personal information just as much as everyone else, but we expect more from them to keep their customers information secure. Privacy-laws are put in coiffe for people can abide by those laws. Stakeholders must act in an ethical and moral manner when it concerns intellectual property, because if not, everyone can be negatively effected is this policy is not followed.REFERENCESRight of Publicity Overview. (2013). Retrieved Feb 1, 2013, from http//www.law.cornell.edu/wex/publicity Email Hacking is a Serious Crime.POSTED IN Privacy Law BY Lawyers .com (2013). Retrieved Feb 2, 2013, from http//communications-media.lawyers.com/privacy-law/Email-Hacking-Is-A-Serious-Crime.htmlComputer Intrusions. (2013). Retrieved Feb 9, 2013, from http//www.fbi.gov/aboutus/ check/cyber/computer-intrusions 2010Maryland Code CRIMINAL LAW. TITLE THEFT AND RELATED CRIMES Subtitle 3 Crimes Involving Telecommunications and Electronics Section 7-302 Unauthorized access to computers and related material. (2010). Retrieved Jan 31, 2013, from http//law.justia.com/codes/maryland/2010/criminal-law/title-7/subtitle-3/7-302/ Object1https//docs.google.com/viewer? a=vq=cacheIDTKbmw6TzwJwww.dell.com/downloads/ca/support/top_10_steps_to_protect_agains t_cybercrime_dell_en.pdf+steps+to+deter+hacking %2Bdellhl=engl=uspid=blsrcid=ADGEESj9mmGDd6D6c0Lbe5C-q06ZyXHh2rVmleQtWvkHTrRrt5ws07evPDNcipr3HEDdwBwcvOqq3zQVevNqmb1ae6A17RjPOoi7eGQd K_RmrRb4d_xO57dfK5Y-8FYICKa1UG8PV9isig=AHIEtbRvNOTu6CU5StjeP3LyY_Q_a0WyBQ Drew, C., Kopytoff, V. (2011). Deploying New Tools to S top the Hackers. Retrieved Feb 8, 2013, from http//www.nytimes.com/2011/06/18/technology/18security.html?pagewanted=all_r=0
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.