Week3 case study3 - Alireza Ghoorchian Week 3 Study Case Today the media paint a mixed picture for the public concerning the role hacker's play in

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon
Alireza Ghoorchian Week 3 Study Case Today the media paint a mixed picture for the public concerning the role hacker's play in our society. On the one hand they praise the skill hackers display when breaking into secure networks and wreaking havoc with clever viruses. At the same time they dramatize the damages and criminalize the activities. The perpetrators are painted out to be terrorists. This mixed message begs the question as to whether or not we should view hackers as criminals or thanks them for pointing out security problems in sensitive networks. If we as the general public were unaware of the risks associated with using the Internet to do business or deliver personal information and hacker activities exposed us to this knowledge we might view them as having helped us. We then would be more careful to protect ourselves. If hackers showed system administrators weaknesses they were unaware of in their network security without damaging the network they might then be viewed as a potential blessing. The reality is however that the public is aware of the risks they are exposed to on the Internet and the computer industry is aware of the need for and weaknesses of security measures in networking already. However, no value is generated from hackers taking advantage of the known flaws in order to play a game of cat and mouse with other peoples property. Furthermore since virus-scanning software is expensive
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
and widely used hackers are costing the public money and resources to protect themselves from their attacks. Unfortunately, intruders are always discovering new vulnerabilities (informally called "holes") to exploit in computer software. The complexity of software makes it increasingly difficult to thoroughly test the security of computer systems. When holes are discovered, computer vendors will usually develop patches to
Background image of page 2
Image of page 3
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 06/24/2011 for the course COMP 100 taught by Professor Dfgdegg during the Spring '08 term at DeVry Chicago O'Hare.

Page1 / 6

Week3 case study3 - Alireza Ghoorchian Week 3 Study Case Today the media paint a mixed picture for the public concerning the role hacker's play in

This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online