Applications of Hacker Ethic
Firms of all sizes have a challenge of
adopting the latest technologies, for instance, virtualization and cloud
computing. Today, the attackers are highly sophisticated and well organized to
launch disruptions. Despite the presence of anti-virus, IPS ,
and firewalls, most organizations including bank institutions, automakers, and
military installations fall victims of IT attack. Therefore, many firms are
increasingly becoming aware on the need to embrace and adopt hacker ethic.
Hacker ethic is a philosophy coined
by Steven Levy and refers to the hacking moral
values. The philosophy entails improvement of life quality and freedom of dissemination
of information. Some of the general principles of hacker ethics as outlined by
Levy include openness, decentralization and world improvement (Levy, 2010).
Companies specializing on hacker
ethic have mushroomed cities and locations that their services are required.
Such organizations share their advanced computer security expertise and
knowledge with their clients. In the end, most firms and multinationals are
able to train their workforce, enforce appropriate data security practices, and
make adjustments to their security technology to protect sensitive data and
crucial information systems. Hacker ethics allows for an assessment of security
vulnerabilities, weaknesses, and risks. In addition, hacker ethics specialist
offer remedies to such prevalent problems.
Major multinationals such as RSA , Sony, and Google have become the latest
victims. The results of such massive security breaches include loss of data,
vital resources and a damage of company reputation. Most attackers target sensitive
information like credit card numbers, user passwords, and social security
numbers, hence resulting in loss of privacy information for firm's customers.
It prompts the need for an organization to hire hacker ethic specialists for
data and information protection. Ethical hackers can test for vulnerabilities
in the system and fix the available loopholes before or after an attacker gains
unauthorized access. Ethical hackers can conduct physical security testing, DMZ
testing, and penetration testing. Other test concerns web applications and
internal systems, for instance, Trojan virus, phishing, and social engineering
attacks.
JP Morgan Chase Bank and Google have
hired white hat Hackers and computer security experts to analyze their It
policies and architecture. This is a strategic move to prevent further attacks
and security breaches in both organizations. Furthermore, the computer experts
are involved in awareness creation program and educating the staff of affected
companies on how to secure their internet access. Security consultants are
becoming major players in large forms through the provision of IT services such
as digital forensics reverse engineering, legal assistance, and analysis of
malware (Himanen, 2010).
Hacker ethic analysis of IT security
breach is necessary to create knowledge on hot to repulse the devastating
effects of further attacks. The victim organizations become aware on the extent
of damage, existent insider threats, and vulnerabilities (Coleman ,
2013). It is important for clients to outline their asset priority, IT security
objectives, and test scope prior to consultation. It is true that consultations
with hacker ethic professionals can be labor intensive and time-consuming
because it requires interaction with the management and end-users. However, the
outcome is worth the resources and time spent.
Some of the areas that need constant
security checks in an organization include research and development, finance
and operations departments. Such areas often harbor sensitive information that
can threaten the firm's operations if it is accessed without authorization.
Sensitive military facilities, banks, and major government institutions should
also seek hacker ethic consultation regularly given the prevalence of attacks
in these fields.
References
Himanen, P. (2010). The hacker ethic and the spirit of
the information age. London :
Vintage.
Levy, S. (2010). Hackers: Heroes of the Computer
Revolution. Sebastopol ,
CA : O'Reilly
Media.
No comments:
Post a Comment