We accept

What Is Honest Hacking?

Nowadays almost any information for every single person on the globe is kept in database somewhere on the globe. Every company and business works with, stores and uses personal information of some kind every day. This makes them in charge of its unassailability but because of the big volume of the skilled IT experts who've interest of stealing that information and put it to use for other purposes the companies cannot assure its protection.

This is where in fact the moral hackers and the moral hacking will come in to play. They are employed by companies to test its system's security. They use Honest Hacking to penetrate the system in order to find any weaknesses that can be used to gain unauthorized access to the machine.

What categories can hackers fall under?

There are three types of Hackers. The first one is the one that is known all around the world under the same name which is Hackers. The next one is Moral hackers.

The third the one which is widely lost with the hackers is Crackers.

The Hackers are keen and enthusiastic programmers who have confidence in the flexibility of writing information as well as their experience by writing free software and facilitating access to information and computing resources whenever we can. [1]

Ethical Hackers or in other words computer security consultants are people who are using the info provided by the hackers as well as some extra skills, for defensive purposes.

These Crackers are people who take good thing about the hackers' work and use the info provided from them for legal purposes. Which means hacker community calls these detrimental computer users crackers. [1]

As well as the sturdy understanding of programming languages, computer networks and operating system concept the moral hackers (security consultants) will need to have variety of skills to make them reliable and trustful employees. Some of them have: Professional, Lawful / Legal, Patient, Methodical, Adaptable / Versatile, Good verbal / written marketing communications, Efficient, Experienced, Interested in Technology, Team work, Logical Head, Researching Skills, Business knowledge, Organized and Confident.

In my estimation, the main skill is Credibility / Integrity, because in almost all of the cases while tests systems they will discover hypersensitive information for your client that can have negative impact of its business if printed or if dealt with improperly. Professionalism and reasonable thinking are also critical for setting up the surroundings for examining such as remote network, using strong cryptography to protect electronic results and so on.

It is vital to allow them to have a whole lot of fortitude and self-drive to do their job properly, because some system may take up to several weeks to test, teamwork is an extremely beneficial skill to have because it really helps to split the workload.

There are extensive aspects that produce computer experienced person Honest Hacker plus some of these are:



Culture's spiritual beliefs

Public beliefs

Economic beliefs

Restriction of law

I will briefly discus these aspects separately to progress knowledge of them and i quickly will discuss the impact that they may have in the life span of the Moral Hacker.

Ethic, morality and the link between them

What do we suggest by Ethics?

"The field of ethics (or moral idea) includes systematizing, defending, and suggesting ideas of right and incorrect behavior. " [2] More simply, you can say it is the study of what is to do in confirmed situation.

What do we suggest by Moral?

"Morality includes what we ought to do, right and wrong, good and bad, ideals, justice, and virtues. Morality is taken to make a difference, moral actions are often taken to merit reward and rewards, and immoral actions are often taken up to merit blame and abuse. " [3]

Most of individuals are facing ethical and moral difficulties often in their everyday activity but the ethical hackers are challenged with them on a regular basis in their career. One example can be that, many hackers claim they follow an ethic that guides their behavior and justifies their break-ins. They show that information should be free and therefore there is no such thing as intellectual property, no dependence on security. [4]

From the other hand if all information should be free, the personal privacy will be no more possible. Additionally, our society is dependant on information whose precision must be provided, hence free and unrestricted usage of such information is out of the question. [4]

From security viewpoint actual break-ins demonstrate security problems to a community that won't in any other case notice those very problems. This is beneficial to a whole lot of companies that are in charge of very delicate information. If we look at this problem from different moral potential client, if the vulnerability of the system is reported and told the administrators in charge of the security or the owner of the company that could illustrate the challenge as well, this means breaking in can't be justified. [4]

Should burglars be permitted to break into homes in order to show that door locks are not solid enough?

Other often reason of the hackers is they are simply making use of idle machines. Because a system is not used at its full capacity, the hacker is somehow entitled to utilize it.

Clearly, unauthorized one who access machine that is not his own property is not constantly in place to properly be eligible if the system is being used to the full of its capacity or not, because unused capacity is often present for future needs and immediate surges in system activity. [4]

Cultures religious beliefs

The links between Ethics and Morality in the life of ethical hacker is something very important. Although it may looks like folks using the same kind of faith must have the same understanding of Ethics that's not the truth in the majority of the time. The Ethics is understood differently by each and every person on the planet. A lot of people consider all the spiritual in the world are identical and they educate us the same principles of life, not to hurt other folks and to reside in peace with the nature. As many people know that this is false in reality, explicit exemplory case of that will be the standoffs between some of the major religious groups on earth such as: Catholics and Protestant Christians, Sunni and Shi'a Muslims, and Orthodox and modern Jews. [5]

Social and economical beliefs

The brain in the human been is like the procedure system of computer, it control and manages all the procedures in the torso. However the brain has no mechanism of discrimination, it cannot let you know what's relevant or less relevant except experience. Genetics has nothing to do with greed and business they do not control ideals, our action and ideals are reflective to the culture we face. [6]

Limitation of law

The law is what establishes the boundary that anyone should work in. When it comes to computer crimes there is different law in every country around the globe, some of them do not have such a law in place. I'll briefly go through the UK Computer Misuse Function (1990) and Data Safeguard Act (1998). Because of the impact the neighborhood law can have, every ethical hacker who wants to operate in UK should be aware of what's labeled as a legal, what as illegal and what are his/her rights. A number of the laws and the way they are applied slightly improved since the Budapest Convention on Cybercrime that occurred in 2001.

The Budapest Convention on Cybercrime is a location where representative out of every country desperate to have a part are accumulated to go over the cyber problems. Its purpose is to present common criminal plan, emphasize the importance of better investigative techniques and the value of assistance among countries. [7]

The convention on cybercrime divides the computer misuse to 6 main areas:

Computer Fraud

Computer Forgery

Damage to Computer data or Computer Programs

Computer Sabotage

Unauthorized Access

Child Pornography

Computer fraud - Any intentional insight, amendment, removal or violation of computer data that influences the consequence of its control and can cause lack of any kind is classified as computer fraudulence. [7]

Computer Forgery - Any intentional insight, amendment, removal or violation of computer data that it would constitute the offence of forgery if it turned out committed regarding a traditional subject of this offence. [4]

Damage to Computer Data or Computer Programs signify deleting, damaging, an infection or suppression of computer data or computer programs without right. [4]

Computer Sabotage means any manipulation to data with purpose to impede the functioning of an computer or a telecommunications system. [4]

Unauthorized Gain access to is the gain access to without right to a pc system or network by avoiding the security options. [4]

Child Pornography consists of producing, distribution, offering and making child pornography for the purpose of its distribution by having a computer system for oneself or someone else. [7]

Case study

R v Daniel Cuthbert, Horseferry Road, Magistrates Judge, 07/10/2005, Computer Misuse Function 1990, s 1 Unauthorised access. IT security builder Daniel Cuthbert, donates 30 to charity website, then decides to check on it security. Mr. D. Cuthbert found guilty of unauthorized gain access to, convicted and fined 400. [8]

If Mr. Cuthbert is to be presumed that he just wished to test the security without any rear thoughts and free of charge theoretically he has not done anything bad, however from regulations perspective this is wrong. Personal data or information cannot be accessed without authorization. This is good example that demonstrates that although the law and the ethics derive from the same ideas they are applied differently in almost all of enough time and also if something is good that will not make it right. This example illustrates perfectly the arguments and counterarguments between hackers, crackers and moral hackers that we published about in web page two.

Is it ethical to make use of entrapment as a way of detecting and capturing a Hacker?

In my own opinion, predicated on my ethical and moral rules and on my public background there exists nothing wrong to use honey pods or any other software and hardware for taking hackers and cracker. The reasons I agree with the entrapment methods are simple. The first and most important the first is that: to make use of entrapments of any type is legal based on the regulation in UK. Also this is opportunity for the police to prevent future accidents created by crackers and hackers, because if they fail to capture and identify hacker who's trying to grab some information from company or business that can have big impact for the institution and bring big loss to it. This method is the 'electronic version' of dual agent whose job is to recognize and capture crooks in the moment when they are taking action to do something illegal. Finally as I talked about in page two, no person has the right to access and manipulate private information if it is not authorized to do so.


We often use the term "professional ethics" but what does that actually means? This means a list of laws, rules, and rules that specialists are supposed to follow on a regular basis in their employment opportunities. These rules, restrictions and laws and regulations might be satisfactory by many people, but that will not makes them objective moral requirements that each professional should accept. In my judgment every occupation has its moral expectations that are unique to it. There is no general ethics and moral that everyone on the globe will follow simply due to number of ethnicities, religious and laws and regulations surrounding the world, even two brothers that grow up jointly will have different view for moral and ethics, therefore the ethical hackers should always have very good understanding and working based on the law in the country that he/she is working.

More than 7 000 students trust us to do their work
90% of customers place more than 5 orders with us
Special price $5 /page
Check the price
for your assignment