Question

In: Computer Science

Answer one of the following question: 1- Some IT security personnel believe that their organizations should...

Answer one of the following question:
1- Some IT security personnel believe that their organizations should employ former computer criminals to identify weaknesses in their organizations’ security defenses. Do you agree? Why or why not?
2- Develop a strong argument against the adoption of a bring your own device (BYOD) policy for a large financial services organization. Now develop a strong argument in favor of the adoption of such a policy.
3- A successful distributed denial-of-service attack requires the downloading of software that turns unprotected computers into zombies under the control of the malicious hacker. Should the owners of the zombie computers be fined or otherwise punished as a means of encouraging people to better safeguard their computers? Why or why not?
Notes:
answer by using your own words please ..
the name of course is "Professional Computing Issues"


There is no year in any of the questions. Are you sure that you have read the questions?

Solutions

Expert Solution

Question 1)
Answer:

Yes, I agree some IT security personnel believe that their organizations should employ former computer criminals to identify weaknesses in their organizations’ security defenses. In fact, some of the organizations have already done this and it has even ended up, positively and constructively.
To effectively fight against cyber attackers and hackers, the defenders should think, act, and attack exactly the same as their opponent or enemy cyber attackers and hackers. Hence, there are white hat hackers who hack systems exactly the same as black hat hackers however, the white hat hackers are professional and ethical hackers, who do it officially and legally. In fact, many organizations, governments, companies, enterprises, etc., are even seeking help from grey hat hackers who sometimes violate laws or typical ethical standards, however with no malicious intent, unlike black hat hackers.

Organizations give this ethical hacking job to grey hat and white hackers through agencies and third-party vendors. Now, some of these grey hat hackers would have hacked systems earlier illegally or unofficially. What some IT security personnel believe is these grey or white hat hackers, and even some black hat hackers who indulged in hacking systems illegally or unofficially before could now work for their organizations’ security defenses. Of course, all these can be arranged legally, officially, per law, and the organization's policy with proper security and safety from these hackers. Everything and every action of such (black hat hackers) hackers working for the organization should be documented and should be per the agreement, with the written consent of the organization permitting the hacker to hack their systems or networks.

Such organizations should also be responsible for monitoring the actions and job of such hackers, as a precautionary step. Necessary monitoring, controlling, regulating, and surveillance would be required to keep an eye on such hackers working for the organization's security defenses.

This is exactly the same as any police or FBI investigating a thief who indulged in a physical robbery, heist, etc., in person, who now elaborates to the police how he carried out such a malicious act, what pattern the thief uses, how he/she finds out the weaknesses of a person, building, commercial store, shop, company, etc. Similarly, a previous black hat hacker, who is now living an innocent life or who has already undergone punishment for his earlier bad actions, can now help governments, organizations, companies, the public, etc., figuring out the weaknesses, vulnerabilities, and other loopholes in the systems, networks, etc. This would give an opportunity for the former computer criminals to seek redemption, can have a new career, earn decent money, help society, work for a good cause, help organizations catch current computer criminals, secure organization's security defenses, and make it stronger. Only former computer criminals can think like the current computer criminals, and this is required and this is a method of working, in fact, it is the best method of working.

The only thing that these former computer criminals should be taught and trained on is professional ethics by the IT security personnel of the organization. This would be very productive and effective only provided, the former computer criminals do not indulge in any computer crimes any more within or outside the organization. They should be made to understand any attempt to indulge in any computer crime with respect to the organization's data, systems, or networks, they will be legally handled.

This is difficult but can be achieved, only if those former computer criminals co-operate with the organization, as it completely depends on the former computer criminals' minds, intentions, and actions.


Related Solutions

JUST DO QUESTION 2 and 3, not 1. The answer to one is 4% I believe....
JUST DO QUESTION 2 and 3, not 1. The answer to one is 4% I believe. Ann gets a fully amortizing 30-year fixed rate mortgage with quarterly payments for $1,000,000. The interest rate is 4%, compounded quarterly. She prepays the mortgage in 1 quarter (i.e. she makes the 1st payment and immediately prepays the remaining balance). What is Ann’s APR? Notes: a quarter equals 3 months, one year consists of 4 quarters, APR is annual. Modify question 1: At the...
1. Give examples of security measures that might be used to control information security, personnel security,...
1. Give examples of security measures that might be used to control information security, personnel security, and health hazard security issues. 2. Should the federal and state governments enact tougher laws or regs to deal with security violators? If so, what are your recommendations?
Topic Obesity Answer the following question Question 1 part a) List stakeholders, agencies, and community organizations...
Topic Obesity Answer the following question Question 1 part a) List stakeholders, agencies, and community organizations that might benefit or be interested in the community of obesity. Question 1 part b) Community Characteristics of obesity. Q
Each student should answer question 1 A and 1 B. Answer to the question 1 is...
Each student should answer question 1 A and 1 B. Answer to the question 1 is related to your actual age. Simplify your age to the month, if for example your age is 20 years 1 month and 19 days, use 20 years and 2 months. If your age is 34 years and one month and 3 days, use 34 years and one month, in other words, bring your age to closest month. (Age is 28 years and 6 months)...
1. Followers of the random walk hypothesis believe that Select one: a. security analysis is the...
1. Followers of the random walk hypothesis believe that Select one: a. security analysis is the best tool to utilize when investing in the stock market. b. the price movements of stocks are unpredictable, and therefore security analysis will not help to predict future market behavior. c. support levels and resistance lines, when combined with basic chart formations, yield both buy and sell signals. d. that traders can earn higher than normal returns by exploiting market anomalies such as the...
Should organizations be concerned with internal security threats? Why? (e-business)
Should organizations be concerned with internal security threats? Why? (e-business)
Workstation security can be an issue in many organizations. What are some of the things a...
Workstation security can be an issue in many organizations. What are some of the things a health care organization can do to secure a workstation to ensure no PHI is viewed by someone who is not authorized to view it?
explain whether you believe we should privatize Social Security or not.
explain whether you believe we should privatize Social Security or not.
Please answer the following question with at least one paragraph for each answer: 1. Explain the...
Please answer the following question with at least one paragraph for each answer: 1. Explain the functions of a treaty.
Write a one page essay, on each of the following organizations. The essay should discuss the...
Write a one page essay, on each of the following organizations. The essay should discuss the organization’s purpose, structure, and anything else you found interesting. 1-Financial Accounting Standard’s Board 2-International Accounting Standard’s Board 3-The Securities and Exchange Commission 4-The Government Accounting Standards Board
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT