country
$20 Bonus + 25% OFF
Securing Higher Grades Costing Your Pocket? Book Your Assignment at The Lowest Price Now!

Question:

Discuss about the role of the hacker in different in different aspect of life bringing into consideration the ethical aspect as well as the non-ethical aspect of the hackers.
 
 

Answer:

Introduction

The main aspect of the case study is to study the role of the hacker in different in different aspect of life bringing into consideration the ethical aspect as well as the non-ethical aspect of the hackers. The role of the hacker can be justified on various fields ranging from personal need like spying on someone to breaking into a company’s database in order to access their client list and other important information’s (Ibrahim, Hamlyn-Harris & Grundy, 2016).

Utilitarianism Theory

Putting emphasis on the case study it can be stated that the role of hacker is playing a vital role in every aspect of life is it for their benefit or for the benefit of other person. It was noted that people across the world ranging from Sweden to Australia were using anonymously request of the hacking service. Some of the job related to it very legal and the other were not clear for example an Australian wanted to hack his rival’s customer database. The white hat hackers are categorized in the good hackers zone, they are the computer expert who are mainly specialized in testing and other mythological aspects which is done mainly to ensure that the company’s information system are secured from any breaches (Maqbool, Pammi & Dutt, 2016). The job description that the hacker used in the description did not match or could not be linked to the information that would directly or indirectly reveal their identity. As stated by (Hausken, 2017) the different sites was in fact leaking information that was linked to the buyer in the prospective of their name and address to the job description. This would reveal the identity and their main motive behind hiring a hacker. This would make a potentially embarrassing effect on anyone and it made them think twice before hiring a hacker online. The people wanted to hire a hacker for many roles in order for their own benefit ranging from gaining access to their own account, some wanted to change their grade and some surprisingly wanted to spy on their spouses (Maqbool, Pammi & Dutt, 2016).

Deontology Theory

A wife stated that she thinks that her husband is cheating on her as a result of which she wanted to hire a hacker in order to hack into her husband’s Watsapp account. As a respond of which one person notability a hacker offered between $300 and $500 for the job and listed a username and a NSW home address (Berger & Jones, 2016). An enterprise user from the Western Australia sought a semi unethical hacker to hack into the database behind the tertiary institute service centre for $100 to $1000. It was not clear that the hacking the web site was ever carried out or not.

Virtue Theory

The hacker itself is not related to the cost of anyone and thus hackers should be considered to be ethical, it was simply in order to help someone beat a flawed system to advance in the field of education was the common aspect according to the common people (Hausken, 2017).

 


Hackers can be categorized as bad and good hackers (Ibrahim, Hamlyn-Harris & Grundy, 2016). The white hat hackers are categorized in the good hackers zone, they are the computer expert who are mainly specialized in testing and other mythological aspects which is done mainly to ensure that the company’s information system are secured from any breaches. These It security personals depend highly on the evolution of the technology in order to match with the battle of hacking (Maqbool, Pammi & Dutt, 2016). A black hat hacker is a bad boy who is typically termed as just a plain hacker. The term is used in some part with respect to the hacker who breaks into a personal network or computer or is involved in creating computer viruses. The hackers in this category often manage different paths of least resistance whether due to laziness or human error. They can be further being divided into two parts or categories as active hackers and passive attackers. An active hacker is someone who takes the information and modifies it according to their own requirement on the other hand a passive attacker just reads or obtains the message and uses it for its own benefit. The difference between an active hacker and a passive hacker is that an active attacker can be detected quite easily and a passive attacker is very difficult to detect because they do not do any sort of modification on the message and thus remain unnoticed.]

Contract Theory

According to the Australian law a person who commits the crime of hacking faces imprisonment between two and ten years depending upon the offence committed. If someone hires a hacker in order to do something but the person does not do anything or play any role in the activity both are liable for the punishment (Abbasi, Bahramian & Salami, 2016). The type of job which is offered on the hackers list won’t be of surprise to the professional IT security contractors who eventually draw the line at customer testing with the permission as opposed to their customers’ rivals. The threat intelligence team always gets a handful of calls each year from different individuals who put their query as to whether their account is being hacked or someone else is in the verge of doing so. Their put their request of investigation and on the other hand some want to break into others account as they believe that they are being targeted for reasons that can be personal as well as business related aspects (Young et al., 2017).

Conclusion

In some cases the information which is given to the hacker is not at all safe for safe. The hacker can retain the information and make use of the information in order to achieve their personal benefit (Brakerski & Rothblum, 2017). The role which is played by the hacker can be varies in many instances depending upon the task they are appointed and the role they have to play in each context. The data which is given to the hacker can be used in the near future in order to detect the person (Trabelsi & McCoey, 2016). It has been already been stated that if a person hires a hacker for some personal reason or to achieve a goal and the person does not play any role in it, but by the law the person is also liable for punishment and would be convicted of the crime. There are many hackers who play the role of a so called term ethical hacker. They are usually appointed by an organization in order to prevent their data and their system from the hand of the hacker. They play a vital role in every aspect of the organization (Abbasi, Bahramian & Salami, 2016).

 

References

Abbasi, E., Bahramian, R., & Salami, S. (2016). Ranking multidisciplinary industrial investment firms' performance Hierarchical method (AHP)(Case Study: Shasta companies, Ghadir, Omid, Social Security and National Development). Management, 3(8), 1-14.

Abu-Shaqra, B., & Luppicini, R. (2016). Technoethical Inquiry into Ethical Hacking at a Canadian University. International Journal of Technoethics (IJT), 7(1), 62-76.

Berger, H., & Jones, A. (2016, July). Cyber Security & Ethical Hacking For SMEs. In Proceedings of the The 11th International Knowledge Management in Organizations Conference on The changing face of Knowledge Management Impacting Society (p. 12). ACM.

Brakerski, Z., & Rothblum, G. N. (2017). Adaptive security is a strong security notion that captures additional security threats that are not addressed by static corruptions. For instance, it captures real-world scenarios where “hackers” actively break into computers, possibly while they are executing secure protocols. Studying this setting is interesting from both theoretical and practical points of view. A primary building block in designing... Journal of Cryptology, 30(1), 289-320.

Hausken, K. (2017). Security Investment, Hacking, and Information Sharing between Firms and between Hackers. Games, 8(2), 23.

Ibrahim, A. S., Hamlyn-Harris, J., & Grundy, J. (2016). Emerging security challenges of cloud virtual infrastructure. arXiv preprint arXiv:1612.09059.

Manes, E. (2016). U.S. Patent Application No. 15/268,065.

Maqbool, Z., Pammi, V. C., & Dutt, V. (2016). Influence of Motivational Factors on Hackers’ and Analysts’ Decisions in Dynamic Security Games. In Advances in Human Factors in Cybersecurity (pp. 239-251). Springer International Publishing.

Trabelsi, Z., & McCoey, M. (2016). Ethical hacking in information security curricula. International Journal of Information and Communication Technology Education (IJICTE), 12(1), 1-10.

Young, J., Campbell, K., Fanti, A., Johnson, S., Sells, Z., & Sutter, A. (2017). The Development of an Applied Ethical Hacking and Security Assessment Course

OR

Cite This Work

To export a reference to this article please select a referencing stye below:

My Assignment Help. (2019). Study The Role Of Hacker. Retrieved from https://myassignmenthelp.com/free-samples/study-the-role-of-hacker.

"Study The Role Of Hacker." My Assignment Help, 2019, https://myassignmenthelp.com/free-samples/study-the-role-of-hacker.

My Assignment Help (2019) Study The Role Of Hacker [Online]. Available from: https://myassignmenthelp.com/free-samples/study-the-role-of-hacker
[Accessed 27 May 2020].

My Assignment Help. 'Study The Role Of Hacker' (My Assignment Help, 2019) <https://myassignmenthelp.com/free-samples/study-the-role-of-hacker> accessed 27 May 2020.

My Assignment Help. Study The Role Of Hacker [Internet]. My Assignment Help. 2019 [cited 27 May 2020]. Available from: https://myassignmenthelp.com/free-samples/study-the-role-of-hacker.


MyAssignmenthelp.com has become one of the leading assignment help provider in New York City and Boston. We provide top class auditing assignment help. Not only auditing, but we also cover more than 100 subjects and our writers deal with all types of assignments with utmost expertise. To make writing process faster and accurate, we have segmented our assignment experts' teams as per their expertise on writing different types of assignments. We guaranteed that students who buy our assignment online get solutions worth their investment.

Latest It Write Up Samples

CO4512 Information Security Management

Download : 0 | Pages : 12
  • Course Code: CO4512
  • University: University Of Central Lancashire
  • Country: United Kingdom

Answer: Introduction There are different ISO standards that are used as a baseline for the security of the information in an organization. The ISO standards is used for avoiding breaches in the network, reassuring the customers, gaining an edge and access new market opportunities. It is internationally recognized and applied for management of the safety practices and used as a systematic approach for increasing reliability and enforcement of th...

Read More arrow

COIS13013 Business Intelligence

Download : 0 | Pages : 10

Answer: Part A The company, which has been chosen in this case, is “Cloud-Pty Limited”. It is actually a cloud-based software development company that is based in Brisbane, Australia. The organisation is deciding to start newer and better responsive cloud-based software applications in the required market. Not very long ago, the dynamic and competitive advantage has formulated some very wrong decisions of investment. At present the ...

Read More arrow

ITECH1001 Communications And Technology

Download : 0 | Pages : 5
  • Course Code: ITECH1001
  • University: Federation University
  • Country: Australia

Answer: [1] Journal Title of article:  A Forecast of the Adoption of Wearable Technology Author: Page, Tom URL (if available): http://irep.ntu.ac.uk/id/eprint/32219/1/9768_Page.pdf  Date accessed:  18 Apr, 2018 Journal Title: International Journal of Technology Diffusion  Year of publication:  2015 Page Numbers: 12-29 Volume no: 6 Issue no: 2 Summary of article This article describes about the en...

Read More arrow

COIT20248 Information Systems Analysis And Design 2

Download : 0 | Pages : 10

Answer: Introduction  The report mainly focusses on the information system development for the “UNICEF Child Care” organization so that the problems that the organization is facing due to the utilization of manual system can be mitigated easily. The new system will provide the facility of depositing fees online and after the payment, a thanking email for the payment will be generated automatically. The data as well as informa...

Read More arrow

BUS5BIM Business Information Systems Management

Download : 0 | Pages : 2
  • Course Code: BUS5BIM
  • University: La Trobe University
  • Country: Australia

Answer: Business identification and IT goals This particular report is focused on the development of a coffee vending machine and its internal processes to be followed for its successful implementation. The aim of the system is to increase the efficiency of the process whenever a user will request for coffee by inserting coin into it..  In order to reduce the errors in the coffee vending machine advanced level of set up are acquired to b...

Read More arrow
Next
watch

Save Time & improve Grade

Just share Requriment and get customize Solution.

question
We will use e-mail only for:

arrow Communication regarding your orders

arrow To send you invoices, and other billing info

arrow To provide you with information of offers and other benefits

1,320,224

Orders

4.9/5

Overall Rating

5,075

Experts

Our Amazing Features

delivery

On Time Delivery

Our writers make sure that all orders are submitted, prior to the deadline.

work

Plagiarism Free Work

Using reliable plagiarism detection software, Turnitin.com.We only provide customized 100 percent original papers.

time

24 X 7 Live Help

Feel free to contact our assignment writing services any time via phone, email or live chat.

subject

Services For All Subjects

Our writers can provide you professional writing assistance on any subject at any level.

price

Best Price Guarantee

Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.

Our Experts

Assignment writing guide
student rating student rating student rating student rating student rating 5/5

416 Order Completed

95% Response Time

Tyler Moore

MBA in Accounting

Washington, United States

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

752 Order Completed

100% Response Time

Hugh Cleave

Masters in Human Resource Management (MMgt, HRM)

Wellington, New Zealand

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 4/5

1309 Order Completed

100% Response Time

Gemmie Chen

MSc in Nursing

Singapore, Singapore

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

1758 Order Completed

99% Response Time

William Martinez

MS in Biology

Washington, United States

Hire Me

FREE Tools

plagiarism

Plagiarism Checker

Get all your documents checked for plagiarism or duplicacy with us.

essay

Essay Typer

Get different kinds of essays typed in minutes with clicks.

edit

GPA Calculator

Calculate your semester grades and cumulative GPa with our GPA Calculator.

referencing

Chemical Equation Balancer

Balance any chemical equation in minutes just by entering the formula.

calculator

Word Counter & Page Calculator

Calculate the number of words and number of pages of all your academic documents.

Refer Just 5 Friends to Earn More than $2000

Check your estimated earning as per your ability

1

1

1

Your Approx Earning

Live Review

Our Mission Client Satisfaction

very good writings, good references and really good pronunciation. would do here again the other time. very recommended!!!

flag

User Id: 409717 - 27 May 2020

Australia

student rating student rating student rating student rating student rating

must be a stupid expert who finished my assignment, don\'t trust it when they say, how good they are. They are all lies!!! i paid 148 dollars for 1000 words, and got less than 50%.!

flag

User Id: 422981 - 27 May 2020

Australia

student rating student rating student rating student rating student rating

It was good and was satisfied with this. This is completed and was passed right away after the presentation. Thank you!

flag

User Id: 238261 - 27 May 2020

Australia

student rating student rating student rating student rating student rating

They did a good job but this time i was no happy that much because i feel i need to let them again and again then even they did't done proper what i need but anyway once happend otherwise other all are mine good and i clear too

flag

User Id: 247567 - 27 May 2020

Australia

student rating student rating student rating student rating student rating
callback request mobile
Have any Query?