Course Paper Rough Draft Instructions Instructions: First, submit your complete Course Paper Rough Draft as approved by your GRST instructor on the Course Approval Form. Your Course Paper Rough Draft

RESEARCH PREPARATION OUTLINE 9








Thesis Statement, Outline and Annotated Bibliography

Trevor Henry

Liberty University












THESIS STATEMENT

The term 'ethics' encompasses many things, including and not limited to morals, truth, and respect for other people. Ethical principles of hacking do not preclude any of those, as mentioned above, but adds confidentiality as another point of focus. Ethical hacking trainees and trained personnel are therefore supposed to guarantee adherence to the principles to ensure they do not use or propagate nor assist in endeavors that might cause harm to others via the internet or computer networks. The increased hacks into organizations such as Equifax and JP Morgan in the last ten years have raised concerns into the principles of ethical hacking, could it be that ethical hacking trainees turn around to abet crimes, in essence, hack organizations in the world? Should ethical hacking principles be re-checked?













OUTLINE

  1. Introduction

  1. Ethical hacking

  2. What are ethical hacking principles/

  3. Reasons for ethical hacking principles

  4. History of ethical hacking principles development

  5. Should ethical hacking principles be re-checked to confirm that they do not assist in the raring of criminal hackers?

  1. Same tools, same hacking paths

  1. The logic of having ethical and non-ethical hackers using the same hacking tools.

  2. System security and privacy control comparisons.

  3. The concern of course leaders, "are they teaching students to improve on their intrusion" (Jamil et al, 2011).

  1. Ethics of teaching attacker tools

  1. Are students taught the cautiousness of attacker tools?

  2. The consequences of failing to adhere to the precautions given (Wulf, 2003).

  3. Is ethical hacking a way of providing students with a loaded gun? (Wulf, 2003).

  4. Randal Schwartz case evaluation.

  1. Understanding the intentions of any hacker

  1. Confidential and crucial information theft?

  2. Fraud

  3. KPMG recorded that "42% of frauds in the UK are insider assisted or perpetrated by the insider" (Jamil, 2011).

  1. Ethical hacking in risk management

  1. Need for a firm security

  2. The worry/fear of organizations while deploying computer experts in firm security (Saleem, 2006).

  3. Importance of ethical hacking in organizational planning.

  1. Conclusion

  2. Summary

  1. Ethical hacking principles re-checks to address concerns raised by the thesis statement should start at the teaching of computer attacker tools, evaluating the tools and hacker paths while also probing the intentions of ethical and unethical hackers. As much as trust issues exist, ethical hacking is still a very relevant course in firms' risk management.


Thesis restatement: In a world full of technological advancements, technological threats such as hacks are due to occur, thereby necessitating mitigation efforts from ethically trained hackers. However, could give information on hacking procedures to trainees prove to be weapon equipping persons for future criminal hacks? Should ethical principles be readdressed from time to time then?






ANNOTATED BIBLIOGRAPHY

Wulf, T. (2003). Teaching ethics in undergraduate network security courses: the cautionary tale of Randal Schwartz. Journal of Computing Sciences in Colleges, 19(1), 90-93.

Tom Wulf is a renowned author at the college of applied sciences, Cincinnati. In this literal work, he presents a case study model aimed at explaining the consequences of negating from ethical hacking principles. As a research question, probes 'could ethical hacking be a raring ground for future criminal hackers?' The reference above gives a clear articulation of ethical hacking studies or, instead, teaching students the usage/viability of attacker tools in the computer world as giving them a loaded gun (Wulf, 2011). Some believe that teaching offensive hacking skills increases the risk to society by drawing students toward criminal acts (Pike, 2013). Network security studies are necessary as the need for specialized defensive systems operators rises in tandem with unethical hacks in organizations across the world. Tom further emphasizes and supports the continuous updating of ethical principles to ultimately re-enforce students' understanding of the need for extreme caution while working with network attacker tools and consequences of failing to do so.

Jamil, D. A. N. I. S. H., & Khan, M. N. A. (2011). Is ethical hacking ethical. International Journal of Engineering Science and Technology, 3(5), 3758-3763.

The authors in this reference pose a direct question that relates to the research topic on ethical principles. Despite the need for risk management efforts to shield firms from external hack threats, the authors suggest that insider's hacking could be a problem too. A firm could employ an ethical hacker, but the critical part is the identification of his/her real intentions at the firm. The authors further outline the fundamental questions of trust, privacy, and possibilities of putting corporate security responsibility in the wrong hands. Understanding the true intentions of the general public is quite a hard task these days, and it is even harder so, to understand the intentions of every single hacker getting into vulnerable systems or networks (Jamil et al., 2011). Having established that 42% of frauds in the UK were from the inside of organizations as per the statistics provided in this article, it is then worth re-looking at the principles of ethical hacking to make sure they cover intent and motives of insider attacks.

Palmer, C. C. (2001). Ethical hacking. IBM Systems Journal, 40(3), 769-780.

The principles of ethical hacking exist and continue to be developed because 'ethical hacking' as an acceptable practice exists. The authors in this article have enlisted details answering the probe of what ethical hacking consists. Technology has brought with it goodies that allow for fast, easy, and efficient tools of performance and usage. However, increased use of technology has served opportunities to many, including criminals out to steal vital information, bully online users, or even divert organizational controls. The authors of this literature give a better and more in-depth understanding of how firms deploy ethical hacking skills in mitigation of hacking threats. Indeed, the process of ethical hacking is long and should be well studied to ensure that firms find and plug up security holes (Palmer, 2001). The basic understanding of operational procedures of ethical hacking at the Global security analysis lab in this article is a good recipe for an appreciation of ethical hacking principles.

Saleem, S. A. (2006, September). Ethical hacking as a risk management technique. In Proceedings of the 3rd annual conference on Information security curriculum development (pp. 201-203).

Computer systems organization uses networks for communication and linkage at different stages. The susceptibility of networks to hacks and breach necessitates defense mechanisms plans for organizations. The question of how ethical computer security experts are in their undertaking of assignments still pops up a lot. Businesses are scared of computer experts who will penetrate their web servers and change their logo, steal private emails or credit card numbers, or put in software that will transmit their organizational data to somebody in another country (Saleem, 2006). However, since firm security is paramount, organizations must seek protective measures, among them being ethical hacking personnel hiring. Risk management, as the authors of this article outline, has its dilemmas primarily based on the integrity of ethical hackers. Integrity, respect, and commitment to work are all principles requiring regular re-checking and updates for ethical hacking training.















References

Jamil, D. A. N. I. S. H., & Khan, M. N. A. (2011). Is ethical hacking ethical. International journal of Engineering Science and Technology, 3(5), 3758-3763.

Palmer, C. C. (2001). Ethical hacking. IBM Systems Journal, 40(3), 769-780.

Pike, R. E. (2013). The "ethics" of teaching ethical hacking. Journal of International Technology and Information Management, 22(4), 4.

Saleem, S. A. (2006, September). Ethical hacking as a risk management technique. In Proceedings of the 3rd annual conference on Information security curriculum development (pp. 201-203).

Wulf, T. (2003). Teaching ethics in undergraduate network security courses: the cautionary tale of Randal Schwartz. Journal of Computing Sciences in Colleges, 19(1), 90-93.