Ethics of Hacking and Cracking

An ethic is a standard of right or wrong as per societal norms. Hacking is a technical term that refers to an attempt to successfully gain unauthorized access to a computer website, program, or other resources. On the other hand, cracking involves the action of breaking into a given computer resource such as a system, often for malicious personal objectives (Geisler, 2018). Hacking has rendered cybersecurity one of the most significant issues in the digital industry (Gupta & Anand, 2017). However, hacking can be ethical when a company performs a penetrative action into its systems to test the resources’ safety.

Many hackers and crackers are motivated by ill motives to perform malicious actions in systems that are not allowed. First, hackers hack to steal some database of a given company if the files’ information is beneficial to them (Geisler, 2018). Hackers manage to steal a company’s identity where they open credit accounts, hence ringing up a lot of money. Second, hackers penetrate systems to have control of internet-enabled services.

Hacking and cracking can be ethical if the target company has consent for performing security tasks, and that is referred to as white hat. However, people who engage in unethical hacking violate the cybercrime law and are subject to the prosecutors’ legal measures due to the commission of an act classifies as black hat (Gupta & Anand, 2017). Black hat may lead to the loss of resources if the hackers manage to transfer funds into their accounts, leading to a company collapsing due to the loss.

In case computer technicians are authorized to penetrate a company’s security testing resources, they should only do that under permission but not every time they wish. It is important to remember that hacking puts data and information to be at risk of malicious usage (Geisler, 2018). Therefore, companies should ensure that adequate security measures are put in place to discourage hackers from gaining access.

References

Geisler, K. (2018). Hacking wall street: reconceptualizing insider trading law for computer hacking and trading schemes. SSRN Electronic Journal, 3(2), 6-14.

Gupta, A., & Anand, A. (2017). Ethical hacking and hacking attacks. International Journal of Engineering and Computer Science, 10(4), 5-11. Web.

Cite this paper

Select style

Reference

StudyCorgi. (2022, September 8). Ethics of Hacking and Cracking. https://studycorgi.com/ethics-of-hacking-and-cracking/

Work Cited

"Ethics of Hacking and Cracking." StudyCorgi, 8 Sept. 2022, studycorgi.com/ethics-of-hacking-and-cracking/.

* Hyperlink the URL after pasting it to your document

References

StudyCorgi. (2022) 'Ethics of Hacking and Cracking'. 8 September.

1. StudyCorgi. "Ethics of Hacking and Cracking." September 8, 2022. https://studycorgi.com/ethics-of-hacking-and-cracking/.


Bibliography


StudyCorgi. "Ethics of Hacking and Cracking." September 8, 2022. https://studycorgi.com/ethics-of-hacking-and-cracking/.

References

StudyCorgi. 2022. "Ethics of Hacking and Cracking." September 8, 2022. https://studycorgi.com/ethics-of-hacking-and-cracking/.

This paper, “Ethics of Hacking and Cracking”, was written and voluntary submitted to our free essay database by a straight-A student. Please ensure you properly reference the paper if you're using it to write your assignment.

Before publication, the StudyCorgi editorial team proofread and checked the paper to make sure it meets the highest standards in terms of grammar, punctuation, style, fact accuracy, copyright issues, and inclusive language. Last updated: .

If you are the author of this paper and no longer wish to have it published on StudyCorgi, request the removal. Please use the “Donate your paper” form to submit an essay.