Sample Ethics Paper on Hackers

Hackers are always in the process of finding ways in which they can be able to crack into a computer system. Computer hackers start as teenagers, where they get encouraged when they thrill and become cybercrime hackers. We are going to look into ways in which we can help to curb this behavior at an early age through the following;

Q 1

The education system should introduce a topic for the students to learn about ethics required to become legal professionals. They should understand the background and educational requirements; to date, there is no education set by the government needed to be a white hacker. But diploma in IT and computer science can be used to determine the job experience used to solve the problem and ensure no shortcut used. Soft skills should be provided in line with the ethics to outsmart black-hat hackers to avoid being drawn into the criminal world. They should build and master skills to be ethical hackers professionally. Teaching them at their early ages on how to stay legal is another essential role that will never engage them in illegal activities. They should understand that hiring in other people’s networks with no permission can ruin their life, and they can even end up in jail. More so, they need to ensure that they get certified to become ethical hackers, which only takes a few years to become one. The course gives the best information for them to able to prevent hacking from the root. Finally, making them explore the resources is another way to help them discover how to improve and deal with the technology despite the changes so that they can depend on them to avoid being tempted stealing information from other servers (Engebretson, 2013).

Q 2

I agree that it is not easy to turn into a teenage hacker quickly, but there are several ways in which we can help to curb this habit. Most hackers are observant and are always looking for loopholes into a company’s system; therefore, it is essential to manage your computer network to stop the system from becoming vulnerable to attacks.  Moreover, system hardening, which involves deactivating non useful software, locking down the security system, and configuring the operating system, reduces their chances of attacking the system (Helms et al., 2014). Notably, teenagers are prone to misuse, like when they are paid to hack into a computer network since teenagers are vulnerable when it comes to money. Therefore such people should be noticed, and they should face the law if they get caught to prevent repeating the same. Lastly, companies should hire the “white hat” to test their systems; due to their high skills, they can easily detect any alterations to prevent the external attack.

 

 

 

References

Engebretson, P. (2013). The basics of hacking and penetration testing: ethical hacking and    penetration testing made easy. Elsevier.

Helms, M. M., Ettkin, L. P., & Morris, D. J. (2014). Shielding your company against information     compromise. Information management & computer security.