Tuesday 10 May 2016

Applications of Hacker Ethic

Applications of Hacker Ethic
             Firms of all sizes have a challenge of adopting the latest technologies, for instance, virtualization and cloud computing. Today, the attackers are highly sophisticated and well organized to launch disruptions. Despite the presence of anti-virus, IPS, and firewalls, most organizations including bank institutions, automakers, and military installations fall victims of IT attack. Therefore, many firms are increasingly becoming aware on the need to embrace and adopt hacker ethic.
            Hacker ethic is a philosophy coined by Steven Levy and refers to the hacking moral values. The philosophy entails improvement of life quality and freedom of dissemination of information. Some of the general principles of hacker ethics as outlined by Levy include openness, decentralization and world improvement (Levy, 2010).
            Companies specializing on hacker ethic have mushroomed cities and locations that their services are required. Such organizations share their advanced computer security expertise and knowledge with their clients. In the end, most firms and multinationals are able to train their workforce, enforce appropriate data security practices, and make adjustments to their security technology to protect sensitive data and crucial information systems. Hacker ethics allows for an assessment of security vulnerabilities, weaknesses, and risks. In addition, hacker ethics specialist offer remedies to such prevalent problems.
            Major multinationals such as RSA, Sony, and Google have become the latest victims. The results of such massive security breaches include loss of data, vital resources and a damage of company reputation. Most attackers target sensitive information like credit card numbers, user passwords, and social security numbers, hence resulting in loss of privacy information for firm's customers. It prompts the need for an organization to hire hacker ethic specialists for data and information protection. Ethical hackers can test for vulnerabilities in the system and fix the available loopholes before or after an attacker gains unauthorized access. Ethical hackers can conduct physical security testing, DMZ testing, and penetration testing. Other test concerns web applications and internal systems, for instance, Trojan virus, phishing, and social engineering attacks.
            JP Morgan Chase Bank and Google have hired white hat Hackers and computer security experts to analyze their It policies and architecture. This is a strategic move to prevent further attacks and security breaches in both organizations. Furthermore, the computer experts are involved in awareness creation program and educating the staff of affected companies on how to secure their internet access. Security consultants are becoming major players in large forms through the provision of IT services such as digital forensics reverse engineering, legal assistance, and analysis of malware (Himanen, 2010).
            Hacker ethic analysis of IT security breach is necessary to create knowledge on hot to repulse the devastating effects of further attacks. The victim organizations become aware on the extent of damage, existent insider threats, and vulnerabilities (Coleman, 2013). It is important for clients to outline their asset priority, IT security objectives, and test scope prior to consultation. It is true that consultations with hacker ethic professionals can be labor intensive and time-consuming because it requires interaction with the management and end-users. However, the outcome is worth the resources and time spent.
            Some of the areas that need constant security checks in an organization include research and development, finance and operations departments. Such areas often harbor sensitive information that can threaten the firm's operations if it is accessed without authorization. Sensitive military facilities, banks, and major government institutions should also seek hacker ethic consultation regularly given the prevalence of attacks in these fields.















References
Coleman, E. G. (2013). Coding freedom: The ethics and aesthetics of hacking. Princeton: Princeton University Press.
Himanen, P. (2010). The hacker ethic and the spirit of the information age. London: Vintage.

Levy, S. (2010). Hackers: Heroes of the Computer Revolution. Sebastopol, CA: O'Reilly Media.

No comments:

Post a Comment