Globalization and advancement in technology has changed the corporate world as companies are pressurized to go digital. For instance, businesses transactions are being conducted over the internet alongside other digital platforms (Cross & Shinder 96). This has led to a growing outcry in the corporate world owing to the rise of cyber related crimes which poses a significant security threat to both small and large business organizations (Cross & Shinder 102). These corporate organizations have realized that digital data is not secure due to attacks by hackers. Recent attacks on secured data in well established companies like Choice Point and LexisNexis have compelled similar business organizations in the corporate world to rethink of new strategies of detecting and preventing intrusion into their internal data systems (Rivlin 6).
The worst enemy of corporate data in this digital age is the typical hacker. The modern techniques being used seem to advance on a regular basis as they devise new methods to commit cyber crimes. Interestingly, recent development in the corporate world has witnessed companies hiring hackers as their IT guardians. The very hackers are also being used as IT consultants to provide valuable information on IT support. Indeed, it is a strategy to upgrade their IT security in order to prevent intrusion (Gaudin 10). This issue is currently within the public domain and has triggered intense debate on whether it is ethical to hire hackers since they are regarded as criminals. This essay explores the merits and demerits of hiring hackers as IT security guards.
The hacker’s mindset
The term hacker has always been perceived negatively. The mention of it creates an image of an evil person who is merely interested in breaking the law by illegally accessing corporate systems to obtain data without permission. According to Thompson (222), the term hacker has two distinct but related meanings. From the definition, a hacker is described as an individual who has adequate knowledge of computer hardware and soft ware. A hacker is also very keen in programming and solving computer related commands especially when breaking into a company’s database. Additionally, the key interest of such a person is to enhance the capabilities of a computer hardware and software so that information can be accessed with ease.
The second definition has made people contest against hiring of known computer hackers, as it refers to a hacker as a person who through illegal means gains access to people’s computer and tampers with whatever information is stored (Thompson 223). The second definition is what makes hackers attractive to companies as what a better way than to use a hacker to catch a hacker. The above information shows a hacker can be both valuable and a risk to the company.
According to Thompson (222), hackers have a wide range of experience in intruding and detecting data systems. The latter is apparently the main reason why companies are viewing them as potential solution to the IT security. In addition, the reason why IT security systems are a threat is due to the fact that company employees may be lacking experience and cannot keep up with the knowledge hackers obtain in the informal environment. Unlike IT experts who are formally trained, most of the hackers learn techniques practically and hence are more advanced and knowledgeable on current technological advancement (Rivlin 10). Their interest in finding ways to enhance computer hardware and software technologies is what makes them very innovative as each time they are always trying to find a weak ‘door’ into other peoples networks (Rivlin 7). In addition, hackers are a headache since most of them are geniuses, who are very innovative and thus they utilize multiple techniques to penetrate the network defense. Therefore, hackers like Mark Seiden, are way ahead of IT security experts because of their first hand experience and innovative mind (Rivlin 8).
As outlined above, hiring hackers seems like the best solution to eliminate network intrusion because of their experience in the world of hacking. The debate is whether it is ethical is still on, but it is good to outline the benefits and the shortcomings of hiring a known hacker as a security guard.
Advantages of hiring a hacker
The first advantage that a hacker might bring to a company is his/her first hand experience in the real world of data intrusion. A hacker, unlike an IT expert who only plays defense, knows how to play offense, a skill learned in the field (Thompson, 228). In the filed, a hacker learns and plays a trick with network systems so as to gain access. The hackers are known to love challenge presented to them, when they encounter complex network protection systems. They will use every available techniques and tools to make sure they gain access. According to Thompson (226), hackers’ deep rooted interest in finding fault and lines of weakness in computer networks can be tapped for the benefit of the company. Since hackers have extensive and diverse experience with computer network security systems, they are likely to locate weaknesses in companies’ IT security systems. A hacker clearly understands measures to take whenever weaknesses are identified in a database (Rivlin 8).
Besides their experience, hackers have been identified with other relevant qualities which can make them to be reliable employees. The first compelling factor to any hacking activity is self motivation which arises from self interest in computers. Most hackers do not engage in such activities due to financial motivation. Hence, they can be highly productive employees who are internally motivated to work without being pushed or supervised. In order to be successful in hacking, quick learning is an important attribute. On the same note, it is assumed that hackers are individuals who are most likely to be sharp in their minds. The latter quality is indeed necessary in order to succeed as a hacker (Thompson 222).
A hacker has to be innovative enough before breaking into password protected networks. This innovative character is required in the corporate world where performance is crucial in the day to day running of business affairs. Therefore, the innovative nature of hackers can be transferred into a real working environment to optimize production (Rivlin 8). Finally, hackers are known to be capable of solving problems since they have the ability to work out complex problems, a working characteristic that is most valued in the corporate world. As Thompson (222) notes, it is a matter of reforming the criminal mindset of a hacker and then transforming the overwhelming abilities into profitable ventures.
Disadvantages
Despite the above advantages of hiring a hacker, there are myriad of challenges and setbacks that may accompany such a decision. Hackers, especially those classified as grey hackers whose are driven by the passion to commit crime may pose quite a number of problems to the hiring company (Cross & Shinder 120).
To begin with, the first disadvantage of hiring a hacker is the lack of trust on the person being hired. The greatest challenge an organization can face when hiring a hacker is how to determine whether the person has reformed. The hired hacker is supposed to be entrusted with security details of an organization (Gaudin 10). However, the dilemma remains to be the level of trust that can be leveled to a person who has already engaged in acts of crime especially where sensitive data is involved (Gaudin (12). It is imperative to understand that the main idea of developing an IT security system is to keep off people who are perceived to be intruders and cannot be entrusted with sensitive information. However, it may be quite tricky part is how to trust a person who was once considered to be a threat to the very systems being protected. In addition, the corporate image might be tarnished when shareholders and customers learn that an organization hired a former hacker to be in charge of information systems or sensitive database which contains personal information (Rivlin 8). An organization might have decided to trust a hacker after doing some background check. Nonetheless, it may be a daunting task to convince the public that the hired hacker is not a threat to sensitive data. For example, anon-reformed hacker may pose a serious threat to a company’s IT security system. The hacker with a criminal mind might decide to create back doors into the company’s security system for future use in case their services are terminated.
As already mentioned, hackers have a brilliant employability character but most of them cannot fit in a corporate setting owing to the fact that they are not team players. According to Cross& Shinder (120), hackers have been classified as lone rangers and are usually opposed to the corporate setting of team work. If a company can succeed in luring such a person to the company through financial and other fringe benefits, such a person may not conform to the corporate environment hence conflict may arise (Thompson 226). Similarly, keeping the loner worker engaged to avoid boredom can yet be another administrative hustle. Since the lone hacker is not social, he might use the available free time for hacking other companies using the employer’s network. The biggest challenge is how to keep the hired hacker engaged to avoid side kicks (Thompson 228).
The decision to hire or not to hire should solely rest with an organization bearing in mind that companies have been hiring hackers from time immemorial. Cross and Shinder (120) observe that before such a decision is made, management should investigate a person’s background, how the decision will affect the company’s image, and whether their actions will not promote cyber crime.
In addition, before deciding to hire, an organization should take into account organizations into the security policies the hired hacker should observe (Thompson 223). The company and employee should enter into a contract on what boundaries and prohibitions are in place. Despite the restriction measure being in place, it is very tricky on how to handle an incident where the hacker is caught violating the rules.
In summing up, it is imperative to note that hackers can be both an asset and a liability to a hiring organization. Before companies can think of recruiting hackers, they should intrinsically inquire whether such actions will merely decorate cyber crimes or combat the vice. The decision to hire should be arrived at after all possible risks have been fully assessed.
Works cited
Cross, Michael & Debra, Littlejohn Shinder. Scene of the Cybercrime. Burlington, MA: Syngress, 2008. Print.
Gaudin, Sharon. “Can You Ever Trust A Hacker? UBS Trial Puts It To A Test.” InformationWeek, 2006. Web.
Rivlin, Gary.“The Sniffer vs. the Cybercrooks.” The New York Times, 2005. Web.
Thompson, Steve. T. “Helping the Hacker?” Library Information, Security, and Social Engineering”.Information Technology and Libraries, 25.4 (2006): 222-230.