Question

In: Computer Science

1- Is there such a thing as an ethical reason for unauthorized access to a computer...


1- Is there such a thing as an ethical reason for unauthorized access to a computer system?


2- One way to secure a network from attack is by blocking all incoming traffic. But is such a measure practical? Imagine running a network in different types of organizations (a bank, a university, and others). Would this be the ideal way to protect the organization's network from attack? Why or why not?

Solutions

Expert Solution

1) the key word here is "unauthorized". Accessing an Unauthorized system by law, can be ethical, i think, although not legal. I think this is the point where you use your judgment of right and wrong. If it meant getting into some criminals personal file to catch him then i would feel its right.

2) Yes, you're stopping someone exploiting vunerabilities in services you expose through your router to the Internet, by not having any.

But, there are other possible attacks. What if you initiate a connection from inside, and the attacker has compromised the other end? Or if the attacker is pretending to be the other end (man in the middle). Or what if the attacker exploits a vulnerability in your router software? Or breaks into your house? Or social engineers you into telling them your mail password? Or steals your offsite backups?

So yes, it works as described, and if you do not need to expose any services to outside you should block everything incoming: but there are other ways to attack your network.

Hope this helps you. Please give an upvote. Thank you.


Related Solutions

Kevin is accused by his employer of unauthorized access to a company computer. The employer pursues...
Kevin is accused by his employer of unauthorized access to a company computer. The employer pursues this as a private action. Which of the following are true about this dispute? Select all that apply. A. Based on a shared relationship, like employer and employee B. Requires evidence admissible in court c. May require a third party to resolve the issue, like a mediator, judge, and/or jury D. May be resolved informally between the perpetrator and victim, or their legal representatives...
QUESTION 1 How does a firewall protect a computer network from unauthorized access? Discuss the difference...
QUESTION 1 How does a firewall protect a computer network from unauthorized access? Discuss the difference between types of firewalls.
Is it acceptable for the U.S. government to support unauthorized network access to obtain information about...
Is it acceptable for the U.S. government to support unauthorized network access to obtain information about other countries including terrorist activities?
What is the difference between logical access to the computer and physical access to the computer?...
What is the difference between logical access to the computer and physical access to the computer? Why is the security of both important?
An attacker is attempting to gain unauthorized access to a WiR network that uses WPA2-PSK. Which...
An attacker is attempting to gain unauthorized access to a WiR network that uses WPA2-PSK. Which of the following attack vectors would the attacker MOST likely use? Capture a three-way handshake and crack it. Capture a mobile device and crack its encryption. Create a rogue wireless access point. Capture a four-way handshake and crack it.
         21. Unauthorized Access. Ted Munice has recently been fired. He had been the...
         21. Unauthorized Access. Ted Munice has recently been fired. He had been the payroll accountant at Texas Shipping in Galveston, Texas. The systems administrator had determined that someone had logged into the payroll system twice on December 25. A forensic investigator hired by Texas Shipping questioned Ted. Ted admitted that he had logged onto the network, but denied that he had done anything while on the network. The Company wants to take legal action against Ted and...
How to gather requirements and plan to identify unauthorized access attempts and block compromised systems from...
How to gather requirements and plan to identify unauthorized access attempts and block compromised systems from accessing the network without an antivirus scan.
Suppose a department has determined that some users have gained unauthorized access to the computing system....
Suppose a department has determined that some users have gained unauthorized access to the computing system. Managers fear the intruders might intercept or even modify sensitive data on the system. Cost to reconstruct correct data is expected to be $2,000,000 with 5% likelihood per year. One approach to addressing this problem is to install a more secure data access control problem. The cost of access control software is is $50,000 with 80% effectiveness. Here is the summary of risk and...
Explain how you would secure your company’s internal wireless network to prevent unauthorized access, including how...
Explain how you would secure your company’s internal wireless network to prevent unauthorized access, including how it’s configured and what policies might need to be created and enforced to ensure employee compliance.
true or false give reason language in java 1.A static inner class can access the instance...
true or false give reason language in java 1.A static inner class can access the instance variables and methods of its outer non-static class 2.executeQuery from statement may return more than one resultset object 3.Connection is java.sql interface that establishes a session with a specific database 4.Writable is an interface in Hadoop that acts as a wrapper class to almost all the primitive data type 5.Text is the wrapper class of string in Hadoop
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT