Ethics : Ethical Hacking Gaining Access

1695 Words7 Pages
Ethical Hacking Gaining Access
Name
Institution

Ethical Hacking Gaining Access
Introduction
Ethical hacking is the testing of access to a system, also known as white hacking. The process entails similar tools, methods, and techniques that most hackers employ though with a legal aspect to it. The goal of hacking is done with the permission of the intended target with a goal to show varied areas of weaknesses from the hacker’s perspective. It is part of information risk management allowing for security advancement. The process makes sure that security protections are valid. Computer security is vital as most companies can be at the threat of harmful practices (Baloch, 2014, 43). This can be like the loss of vital information,
…show more content…
Smurf attacks make efforts to make users on a network to flood every other with information, making it seem as though every person is causing harm to every other user and making the hacker not be known.
A hacker’s possibility of acquiring access into a target system are affected by element like model and configuration of the intended system, the level of expertise of the hacker and the first level of access acquired (Murphy, 2015). The most harmful form of denial of service attacks are attacks spread, where a hacker employs software distributed over a number of users’ systems over the internet to cause a cohesive denial of service attacks from several sources.
Laws and Regulation: Gaining Access
Any company with computers and access to the internet or in a network with several users has to be conversant with the laws relating to hacking, accessing private data, and unauthorized access to systems and networks. If a person acquires access to a system with no prior permission, there is need to take varied steps to help handle such a situation (Agarwal, and Woonna, 2015). Several countries have varied laws relating to hacking, unauthorized access of systems. There are set regulations that bar hacking acquiring access to someone’s system with no prior permission. If there are people accessing a network with no permission, there are some laws that one has to be aware.
The CFAA is responsible for hacking cases and those

More about Ethics : Ethical Hacking Gaining Access

Get Access