Question

In: Computer Science

1- Is there such a thing as an ethical reason for unauthorized access to a computer...


1- Is there such a thing as an ethical reason for unauthorized access to a computer system?


2- One way to secure a network from attack is by blocking all incoming traffic. But is such a measure practical? Imagine running a network in different types of organizations (a bank, a university, and others). Would this be the ideal way to protect the organization's network from attack? Why or why not?

Solutions

Expert Solution

1) the key word here is "unauthorized". Accessing an Unauthorized system by law, can be ethical, i think, although not legal. I think this is the point where you use your judgment of right and wrong. If it meant getting into some criminals personal file to catch him then i would feel its right.

2) Yes, you're stopping someone exploiting vunerabilities in services you expose through your router to the Internet, by not having any.

But, there are other possible attacks. What if you initiate a connection from inside, and the attacker has compromised the other end? Or if the attacker is pretending to be the other end (man in the middle). Or what if the attacker exploits a vulnerability in your router software? Or breaks into your house? Or social engineers you into telling them your mail password? Or steals your offsite backups?

So yes, it works as described, and if you do not need to expose any services to outside you should block everything incoming: but there are other ways to attack your network.

Hope this helps you. Please give an upvote. Thank you.


Related Solutions

Kevin is accused by his employer of unauthorized access to a company computer. The employer pursues...
Kevin is accused by his employer of unauthorized access to a company computer. The employer pursues this as a private action. Which of the following are true about this dispute? Select all that apply. A. Based on a shared relationship, like employer and employee B. Requires evidence admissible in court c. May require a third party to resolve the issue, like a mediator, judge, and/or jury D. May be resolved informally between the perpetrator and victim, or their legal representatives...
QUESTION 1 How does a firewall protect a computer network from unauthorized access? Discuss the difference...
QUESTION 1 How does a firewall protect a computer network from unauthorized access? Discuss the difference between types of firewalls.
Is it acceptable for the U.S. government to support unauthorized network access to obtain information about...
Is it acceptable for the U.S. government to support unauthorized network access to obtain information about other countries including terrorist activities?
What is the difference between logical access to the computer and physical access to the computer?...
What is the difference between logical access to the computer and physical access to the computer? Why is the security of both important?
An attacker is attempting to gain unauthorized access to a WiR network that uses WPA2-PSK. Which...
An attacker is attempting to gain unauthorized access to a WiR network that uses WPA2-PSK. Which of the following attack vectors would the attacker MOST likely use? Capture a three-way handshake and crack it. Capture a mobile device and crack its encryption. Create a rogue wireless access point. Capture a four-way handshake and crack it.
         21. Unauthorized Access. Ted Munice has recently been fired. He had been the...
         21. Unauthorized Access. Ted Munice has recently been fired. He had been the payroll accountant at Texas Shipping in Galveston, Texas. The systems administrator had determined that someone had logged into the payroll system twice on December 25. A forensic investigator hired by Texas Shipping questioned Ted. Ted admitted that he had logged onto the network, but denied that he had done anything while on the network. The Company wants to take legal action against Ted and...
How to gather requirements and plan to identify unauthorized access attempts and block compromised systems from...
How to gather requirements and plan to identify unauthorized access attempts and block compromised systems from accessing the network without an antivirus scan.
Having security policies and procedures that document and manage access to critical data and technology is one thing, but actually controlling the access is another.
Authentication, Authorization, AccountingHaving security policies and procedures that document and manage access to critical data and technology is one thing, but actually controlling the access is another. Describe and evaluate how authentication controls can enforce security policies within an organization.
true or false give reason language in java 1.A static inner class can access the instance...
true or false give reason language in java 1.A static inner class can access the instance variables and methods of its outer non-static class 2.executeQuery from statement may return more than one resultset object 3.Connection is java.sql interface that establishes a session with a specific database 4.Writable is an interface in Hadoop that acts as a wrapper class to almost all the primitive data type 5.Text is the wrapper class of string in Hadoop
What is the ethical issue? Provide and discuss the reason for your recommendation.
  Question Raffie’s Kids, a nonprofit organization that provides aid to victims of domestic violence, low-income families, and special-needs children, has a 30-year, 5% mortgage on the existing building. The mortgage requires monthly payments of $3,000. Raffie’s bookkeeper is preparing financial statements for the board and, in doing so, lists the mortgage balance of $287,000 under current liabilities because the board hopes to be able to pay the mortgage off in full next year. Of the mortgage principal, $20,000 will...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT