The main aspect of the case study is to study the role of the hacker in different in different aspect of life bringing into consideration the ethical aspect as well as the non-ethical aspect of the hackers. The role of the hacker can be justified on various fields ranging from personal need like spying on someone to breaking into a company’s database in order to access their client list and other important information’s (Ibrahim, Hamlyn-Harris & Grundy, 2016).
Putting emphasis on the case study it can be stated that the role of hacker is playing a vital role in every aspect of life is it for their benefit or for the benefit of other person. It was noted that people across the world ranging from Sweden to Australia were using anonymously request of the hacking service. Some of the job related to it very legal and the other were not clear for example an Australian wanted to hack his rival’s customer database. The white hat hackers are categorized in the good hackers zone, they are the computer expert who are mainly specialized in testing and other mythological aspects which is done mainly to ensure that the company’s information system are secured from any breaches (Maqbool, Pammi & Dutt, 2016). The job description that the hacker used in the description did not match or could not be linked to the information that would directly or indirectly reveal their identity. As stated by (Hausken, 2017) the different sites was in fact leaking information that was linked to the buyer in the prospective of their name and address to the job description. This would reveal the identity and their main motive behind hiring a hacker. This would make a potentially embarrassing effect on anyone and it made them think twice before hiring a hacker online. The people wanted to hire a hacker for many roles in order for their own benefit ranging from gaining access to their own account, some wanted to change their grade and some surprisingly wanted to spy on their spouses (Maqbool, Pammi & Dutt, 2016).
A wife stated that she thinks that her husband is cheating on her as a result of which she wanted to hire a hacker in order to hack into her husband’s Watsapp account. As a respond of which one person notability a hacker offered between $300 and $500 for the job and listed a username and a NSW home address (Berger & Jones, 2016). An enterprise user from the Western Australia sought a semi unethical hacker to hack into the database behind the tertiary institute service centre for $100 to $1000. It was not clear that the hacking the web site was ever carried out or not.
The hacker itself is not related to the cost of anyone and thus hackers should be considered to be ethical, it was simply in order to help someone beat a flawed system to advance in the field of education was the common aspect according to the common people (Hausken, 2017).
Hackers can be categorized as bad and good hackers (Ibrahim, Hamlyn-Harris & Grundy, 2016). The white hat hackers are categorized in the good hackers zone, they are the computer expert who are mainly specialized in testing and other mythological aspects which is done mainly to ensure that the company’s information system are secured from any breaches. These It security personals depend highly on the evolution of the technology in order to match with the battle of hacking (Maqbool, Pammi & Dutt, 2016). A black hat hacker is a bad boy who is typically termed as just a plain hacker. The term is used in some part with respect to the hacker who breaks into a personal network or computer or is involved in creating computer viruses. The hackers in this category often manage different paths of least resistance whether due to laziness or human error. They can be further being divided into two parts or categories as active hackers and passive attackers. An active hacker is someone who takes the information and modifies it according to their own requirement on the other hand a passive attacker just reads or obtains the message and uses it for its own benefit. The difference between an active hacker and a passive hacker is that an active attacker can be detected quite easily and a passive attacker is very difficult to detect because they do not do any sort of modification on the message and thus remain unnoticed.]
According to the Australian law a person who commits the crime of hacking faces imprisonment between two and ten years depending upon the offence committed. If someone hires a hacker in order to do something but the person does not do anything or play any role in the activity both are liable for the punishment (Abbasi, Bahramian & Salami, 2016). The type of job which is offered on the hackers list won’t be of surprise to the professional IT security contractors who eventually draw the line at customer testing with the permission as opposed to their customers’ rivals. The threat intelligence team always gets a handful of calls each year from different individuals who put their query as to whether their account is being hacked or someone else is in the verge of doing so. Their put their request of investigation and on the other hand some want to break into others account as they believe that they are being targeted for reasons that can be personal as well as business related aspects (Young et al., 2017).
In some cases the information which is given to the hacker is not at all safe for safe. The hacker can retain the information and make use of the information in order to achieve their personal benefit (Brakerski & Rothblum, 2017). The role which is played by the hacker can be varies in many instances depending upon the task they are appointed and the role they have to play in each context. The data which is given to the hacker can be used in the near future in order to detect the person (Trabelsi & McCoey, 2016). It has been already been stated that if a person hires a hacker for some personal reason or to achieve a goal and the person does not play any role in it, but by the law the person is also liable for punishment and would be convicted of the crime. There are many hackers who play the role of a so called term ethical hacker. They are usually appointed by an organization in order to prevent their data and their system from the hand of the hacker. They play a vital role in every aspect of the organization (Abbasi, Bahramian & Salami, 2016).
Abbasi, E., Bahramian, R., & Salami, S. (2016). Ranking multidisciplinary industrial investment firms' performance Hierarchical method (AHP)(Case Study: Shasta companies, Ghadir, Omid, Social Security and National Development). Management, 3(8), 1-14.
Abu-Shaqra, B., & Luppicini, R. (2016). Technoethical Inquiry into Ethical Hacking at a Canadian University. International Journal of Technoethics (IJT), 7(1), 62-76.
Berger, H., & Jones, A. (2016, July). Cyber Security & Ethical Hacking For SMEs. In Proceedings of the The 11th International Knowledge Management in Organizations Conference on The changing face of Knowledge Management Impacting Society (p. 12). ACM.
Brakerski, Z., & Rothblum, G. N. (2017). Adaptive security is a strong security notion that captures additional security threats that are not addressed by static corruptions. For instance, it captures real-world scenarios where “hackers” actively break into computers, possibly while they are executing secure protocols. Studying this setting is interesting from both theoretical and practical points of view. A primary building block in designing... Journal of Cryptology, 30(1), 289-320.
Hausken, K. (2017). Security Investment, Hacking, and Information Sharing between Firms and between Hackers. Games, 8(2), 23.
Ibrahim, A. S., Hamlyn-Harris, J., & Grundy, J. (2016). Emerging security challenges of cloud virtual infrastructure. arXiv preprint arXiv:1612.09059.
Manes, E. (2016). U.S. Patent Application No. 15/268,065.
Maqbool, Z., Pammi, V. C., & Dutt, V. (2016). Influence of Motivational Factors on Hackers’ and Analysts’ Decisions in Dynamic Security Games. In Advances in Human Factors in Cybersecurity (pp. 239-251). Springer International Publishing.
Trabelsi, Z., & McCoey, M. (2016). Ethical hacking in information security curricula. International Journal of Information and Communication Technology Education (IJICTE), 12(1), 1-10.
Young, J., Campbell, K., Fanti, A., Johnson, S., Sells, Z., & Sutter, A. (2017). The Development of an Applied Ethical Hacking and Security Assessment Course
To export a reference to this article please select a referencing stye below:
My Assignment Help. (2019). Study The Role Of Hacker. Retrieved from https://myassignmenthelp.com/free-samples/study-the-role-of-hacker.
"Study The Role Of Hacker." My Assignment Help, 2019, https://myassignmenthelp.com/free-samples/study-the-role-of-hacker.
My Assignment Help (2019) Study The Role Of Hacker [Online]. Available from: https://myassignmenthelp.com/free-samples/study-the-role-of-hacker
[Accessed 27 May 2020].
My Assignment Help. 'Study The Role Of Hacker' (My Assignment Help, 2019) <https://myassignmenthelp.com/free-samples/study-the-role-of-hacker> accessed 27 May 2020.
My Assignment Help. Study The Role Of Hacker [Internet]. My Assignment Help. 2019 [cited 27 May 2020]. Available from: https://myassignmenthelp.com/free-samples/study-the-role-of-hacker.
MyAssignmenthelp.com has become one of the leading assignment help provider in New York City and Boston. We provide top class auditing assignment help. Not only auditing, but we also cover more than 100 subjects and our writers deal with all types of assignments with utmost expertise. To make writing process faster and accurate, we have segmented our assignment experts' teams as per their expertise on writing different types of assignments. We guaranteed that students who buy our assignment online get solutions worth their investment.
Answer: Introduction There are different ISO standards that are used as a baseline for the security of the information in an organization. The ISO standards is used for avoiding breaches in the network, reassuring the customers, gaining an edge and access new market opportunities. It is internationally recognized and applied for management of the safety practices and used as a systematic approach for increasing reliability and enforcement of th...Read More
Answer: Part A The company, which has been chosen in this case, is “Cloud-Pty Limited”. It is actually a cloud-based software development company that is based in Brisbane, Australia. The organisation is deciding to start newer and better responsive cloud-based software applications in the required market. Not very long ago, the dynamic and competitive advantage has formulated some very wrong decisions of investment. At present the ...Read More
Answer:  Journal Title of article: A Forecast of the Adoption of Wearable Technology Author: Page, Tom URL (if available): http://irep.ntu.ac.uk/id/eprint/32219/1/9768_Page.pdf Date accessed: 18 Apr, 2018 Journal Title: International Journal of Technology Diffusion Year of publication: 2015 Page Numbers: 12-29 Volume no: 6 Issue no: 2 Summary of article This article describes about the en...Read More
Answer: Introduction The report mainly focusses on the information system development for the “UNICEF Child Care” organization so that the problems that the organization is facing due to the utilization of manual system can be mitigated easily. The new system will provide the facility of depositing fees online and after the payment, a thanking email for the payment will be generated automatically. The data as well as informa...Read More
Answer: Business identification and IT goals This particular report is focused on the development of a coffee vending machine and its internal processes to be followed for its successful implementation. The aim of the system is to increase the efficiency of the process whenever a user will request for coffee by inserting coin into it.. In order to reduce the errors in the coffee vending machine advanced level of set up are acquired to b...Read More
Just share Requriment and get customize Solution.
Our writers make sure that all orders are submitted, prior to the deadline.
Using reliable plagiarism detection software, Turnitin.com.We only provide customized 100 percent original papers.
Feel free to contact our assignment writing services any time via phone, email or live chat.
Our writers can provide you professional writing assistance on any subject at any level.
Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.
Get all your documents checked for plagiarism or duplicacy with us.
Get different kinds of essays typed in minutes with clicks.
Calculate your semester grades and cumulative GPa with our GPA Calculator.
Balance any chemical equation in minutes just by entering the formula.
Calculate the number of words and number of pages of all your academic documents.
Our Mission Client Satisfaction
very good writings, good references and really good pronunciation. would do here again the other time. very recommended!!!
must be a stupid expert who finished my assignment, don\'t trust it when they say, how good they are. They are all lies!!! i paid 148 dollars for 1000 words, and got less than 50%.!
It was good and was satisfied with this. This is completed and was passed right away after the presentation. Thank you!
They did a good job but this time i was no happy that much because i feel i need to let them again and again then even they did't done proper what i need but anyway once happend otherwise other all are mine good and i clear too