Question

In: Computer Science

Answer the question: Some IT security personnel believe that their organizations should employ former computer criminals...

Answer the question:
Some IT security personnel believe that their organizations should employ former computer criminals to identify weaknesses in their organizations’ security defenses. Do you agree? Why or why not?


Notes:
answer by using your own words, please.
the name of the course is "Professional Computing Issues."

Solutions

Expert Solution

Yes, I do agree with this strategy due to the following reasons:

(i) This kind of out of the box thinking can help to observe the organization's security details from a hacker's point of view.

(ii) Some of these computer criminals should have experience to gain unauthorized access to sensitive information as they know the loopholes of that system. So, the organization can use this kind of thinking to enhance the security.

(iii) As the security defence system of an organization is dynamic in nature, so it can improve always as nothing is perfect. The same is applied for hackers and cyber criminals. So, it will be very useful for that organization to have an enhanced security system with someone who knows all the loopholes from the other side also.

(iv) It can help the organization to develop some new security threats detection and prevention strategies.

Please comment in case of any doubt.
Please upvote if this helps.


Related Solutions

Answer one of the following question: 1- Some IT security personnel believe that their organizations should...
Answer one of the following question: 1- Some IT security personnel believe that their organizations should employ former computer criminals to identify weaknesses in their organizations’ security defenses. Do you agree? Why or why not? 2- Develop a strong argument against the adoption of a bring your own device (BYOD) policy for a large financial services organization. Now develop a strong argument in favor of the adoption of such a policy. 3- A successful distributed denial-of-service attack requires the downloading...
Nurses and license personnel should have a basic knowledge of computer and computer fluency (KSA: Knowledge,...
Nurses and license personnel should have a basic knowledge of computer and computer fluency (KSA: Knowledge, skills, and attitudes) before working with patient. By having this knowledge, the nurse will eventually be more credible, provide accurate and reliable source of information to the patient and family member during administration and patient education. For example, the nurse during the patient education should provide resource for more information such as government health web page, video, or article on previous or ongoing research...
Many people believe that computer security relies on firewalls, programs, and policies. However, much of computer...
Many people believe that computer security relies on firewalls, programs, and policies. However, much of computer security is dependent on the corporate culture, and their view on security. For instance: Is it normal for people to leave their desks with their computer unlocked? You want to improve the security in your organization without using negative reinforcement (i.e. policing). What are some ways you can help drive a culture of security in an organization? Try to be unique and novel in...
Should organizations be concerned with internal security threats? Why? (e-business)
Should organizations be concerned with internal security threats? Why? (e-business)
Workstation security can be an issue in many organizations. What are some of the things a...
Workstation security can be an issue in many organizations. What are some of the things a health care organization can do to secure a workstation to ensure no PHI is viewed by someone who is not authorized to view it?
explain whether you believe we should privatize Social Security or not.
explain whether you believe we should privatize Social Security or not.
Answer the question below: In your own words, do you believe that more companies today should...
Answer the question below: In your own words, do you believe that more companies today should enforce and invest more in a social media care team? Why do you think more companies today are utilizing a social media care team?
Computer Security Consider a desktop publishing system used to produce documents for various organizations. a. Give...
Computer Security Consider a desktop publishing system used to produce documents for various organizations. a. Give an example of a type of publication for which confidentiality of the stored data is the most important requirement. b. Give an example of a type of publication in which data integrity is the most important requirement. c. Give an example in which system availability is the most important requirement.
Write a question and answer it. (Question should not be a textbook type, it should be...
Write a question and answer it. (Question should not be a textbook type, it should be interpretation type question) I'm a first grader molecular biology and genetics student
There are some politicians in the U.S. Congress that believe the Federal Reserve should be less...
There are some politicians in the U.S. Congress that believe the Federal Reserve should be less independent from the U.S. government. Some say this would be a disaster for the U.S. economy. Do you agree or not with those who seek to reduce central bank independence? Why? Explain your answer in a comprehensive way, providing any data available and making reference to studies available on this issue.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT