6 Oct 2022

92

Thinking Like a Hacker to Protect Your Network

Format: APA

Academic level: College

Paper type: Research Paper

Words: 1209

Pages: 4

Downloads: 0

Introduction 

In the modern age, computers, computerized devices, and computer networks are invaluable tools for organizations and individuals. However, as with any vital tools, computers come with exponential risks to their users. Key among these risks relate to the issue of cybersecurity in general and more specifically, hacking (Watkins, 2018). By definition, hacking refers to any unauthorized access to a computerized system. Normally, a computerized system has formal limitations of access ranging from no access at all to full access. The system’s administrator will set up specific avenues for authorized access and its limitations. Hacking involves accessing the computerized system without using the avenues set by the administrator or bypassing set limitations (Watkins, 2018). From a legal perspective, the law prohibits any unauthorized access of a computer system, a fact that makes hacking a crime. However, some administrators allow computer experts, known as white hackers, to attempt to overpass security systems in an effort to improve security. Black hackers in the other hand are criminals who unlawfully access secure networks with malicious or criminal intent. This research paper evaluates the issue of white hackers and black hackers even as it investigates in securing computerized systems from hacking.

Concerns Associated with White Hat Hacking 

White hat hacking, also known as ethical hacking happens when computer experts ape the techniques of cybercriminals in order to test the security resilience of a computerized system. Major companies retain white hackers to test their security systems regularly due to the sensitive nature their cyber systems. There are also contractors who specialize in testing computer systems on behalf of their owners (Watkins, 2018). The main difference between white and black hackers is they the former have the express permission of the computer system’s administrators before they undertake the hack. The second difference is what the hacker does upon successful completion of the hack. White hackers use the information gained to assist the administrators better protect the system from future hackers. Because of the benign intent of white hackers and the prior permission issued to them, white hacking is legal (Marsh, 2017). However, there is a new dimension of white hacking dubbed grey hacking where the hacker has ethical intentions but unauthorized by the owner of the network. In case they succeed, such hackers approach the network’s administrators with an offer to fix the susceptibility at a fee. Some grey hackers also act as vigilantes who expose to the public those organizations that do not protect data properly. The so-called grey hacking is technically illegal as there is no prior authorization from the network’s administrators.

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

Concerns Associated with Black Hat Hacking 

Black hackers are criminal elements who gain access to secure networks to further their nefarious agendas. Among the leading motivations for black hacking is money. There high potential for pecuniary gain stemming from the data stored in secure systems (Marcus, 2018). Some organization is willing to pay hefty amounts for such data for research or marketing purposes. Personal and financial information can also be useful for the perpetration of fraudulent transactions (Marcus, 2018). From a different perspective, some black hackers also hold computer systems for ransom. For example, the functioning of a hospital’s intranet is a matter of life and death for patients. Such an organization would be willing to pay a hefty amount of a hacker accessed the system and created a denial of service.

Terrorism is also a motivator for black hackers who interfere with secure networks to cause damage or make a political and social point. There is a high potential for the use of hacking for terror purposes due to the high reliance on computer networks in the public and private sectors (Georgescu & Tudor, 2015). For example, airports rely on cyber-networks to direct and control aircraft at their most susceptible moment, either immediately after departure or just before landing. In developed countries, computer networks play a critical role in infrastructure including electricity, water and gas supply. Attacking such networks can lead to loss of life, damage to property and widespread terror (Georgescu & Tudor, 2015). Black hat hacking is arguably the leading risk for cyber systems.

How to Make Sure Your Network is Secure 

Securing a network from hacking combines how to run the network, security systems within the network and finally how to react to an active threat. For a start, how administrators run a network can encourage or discourage black hat hackers. For example, most black hat hackers are after data, which can be a source of money. Ensuring that all data that is not in active use is encrypted securely is an important approach (di Vimercati et al., 2016). If hackers know that the data cannot be of any benefit to them, they will be less inclined to hack the system. The second approach is to invest in a comprehensive cyber-security system. For organizations that can afford it, getting a tailor-made security system is essential. The security system should include components such as data encryption and firewalls (di Vimercati et al., 2016). Further, it is important to regularly update the security system and maintain it properly. Finally, proper protocols for the use of a secure system should be in place. An important aspect of the protocols is limitation of access. Every user of a secure network should only have the minimum necessary level of access to minimize risk. Further, there should be a comprehensive rule on the use of personal gadgets in or around the secure network.

An effective cybersecurity system is also able to effectively and expeditionary detect any unauthorized inference in the system. Early detection is fundamental to limiting the impact of hacking on the secure network. The final critical approach in securing a cyber-network is learning to think like a black hacker, mainly using white hackers (Hiner, 2007). It is prudent to try to establish what component of a system would be of interest to a cyber-hacker. This will enable the organization to prioritize which aspect of the system to secure the most, as cybersecurity is also expensive. Further, thinking like a hacker will enable administrators to preempt attacks or mitigate their impact (Zurier, 2016).

Future Trends on Hacking and Network Security 

Over the last few decades, computer networks have risen in prevalence, prominence, and usage around the world, hence developing some form of indispensability. The indispensability raises the propensity and impact of attacks into the future. According to some experts, the future of warfare may focus on cyber systems (White, 2016). For example, some militaries are in the process of developing computer systems that can fight and kill autonomously. Using such systems, a bored teenage hacker can start a global war through carefully orchestrated cyberattacks. Therefore, cybersecurity and prevention of hacking continue to increase in importance in the future. Perhaps computer experts should try to develop cyber systems that cannot be hacked, instead of trying to prevent systems from being hacked.

Conclusion 

Computer and computerized devices are one of the leading industries in the world, making them an invaluable tool for modern society. However, this tool can also be dangerous, more so when it falls in the hands of malicious elements such as black hackers. Security systems have failed to keep networks secure, yet cybersecurity is indispensable. To remedy the situation, the industry has come up with the concept of white hackers. White hackers are ethical computer experts who attempt to breach secure cyber systems with the intent of enhancing the security of these systems. Even with the help of white hackers, absolute computer security is impossible to guarantee. Cybersecurity is an important future problem as the use of computer systems continues to advance including in military applications.

References

Hiner, J. (2007, June 8). Securing your network: Think like a hacker. Retrieved from https://www.techrepublic.com/article/securing-your-network-think-like-a-hacker/ .

Zurier, S. (2016, June 24). 5 Ways To Think Like A Hacker. Retrieved from https://www.darkreading.com/vulnerabilities---threats/5-ways-to-think-like-a-hacker-/d/d-id/1326043 .

Marsh, D. (2017).  Are Ethical Hackers the Best Solution for Combating the Growing World of Cyber-Crime?  (Doctoral dissertation, University Honors College, Middle Tennessee State University).

Watkins, J. (2018). No Good Deed goes Unpunished: The Duties Held by Malware Researchers, Penetration Testers, and White Hat Hackers.  Minn. JL Sci. & Tech. 19 , 535.

Marcus, D. J. (2018). The Data Breach Dilemma: Proactive Solutions for Protecting Consumers' Personal Information.  Duke LJ 68 , 555.

Georgescu, C., & Tudor, M. (2015). Cyber Terrorism Threats to Critical Infrastructures NATO'S Role in Cyber Defense.  Knowledge Horizons. Economics 7 (2), 115.

di Vimercati, S. D. C., Foresti, S., Livraga, G., & Samarati, P. (2016). Practical techniques building on encryption for protecting and managing data in the cloud. In  The New Codebreakers  (pp. 205-239). Springer, Berlin, Heidelberg.

White, J. (2016). Cyber Threats and Cyber Security: National Security Issues, Policy and Strategies.  Global Security Studies 7 (4).

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 15). Thinking Like a Hacker to Protect Your Network.
https://studybounty.com/thinking-like-a-hacker-to-protect-your-network-research-paper

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

Security Implication of the Internet of Things

The Internet of Things (IoT) can be described as s system of interconnected devices that have the ability to transfer information over a computer network without the need of human-to-computer or human-to-human...

Words: 892

Pages: 3

Views: 96

Modern Day Attacks Against Firewalls and VPNs

Introduction The need to have an enhanced security of the computer connectivity happens to be one of the reasons that attract companies and organizations towards wide usage of VPNs. Several simple techniques...

Words: 2025

Pages: 7

Views: 134

How to Deploy and Administer Windows Server 2012

Securing a reliable, and expandable configuration for a company is important to build a strong network. The new and enhanced features of the Windows Server 2012 can be used to implement the network. In this...

Words: 1673

Pages: 6

Views: 88

Deployment Model in Cloud Computing

Deployment model is a representation of a cloud environment primarily distinguished by parameters such as accessibility, proprietorship, and storage size. The National Institute of Standards and Technology gives the...

Words: 254

Pages: 1

Views: 82

How to Use Web Search Engines for Business Research

The advancement of technology has made it possible for many people around the world to have easy access to information whenever they want. The development of the Wide World Web-enabled different kinds of information...

Words: 773

Pages: 3

Views: 87

Distributed Database Management System (DDBMS)

Introduction Data management has been a headache to many technology enthusiasts for quite a long period of time. They have successfully managed to logically collect interrelated data and share it. If the data is...

Words: 799

Pages: 3

Views: 128

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration