Explore BrainMass
Share

Hacking Techniques

This content was STOLEN from BrainMass.com - View the original, and get the already-completed solution here!

Need help writing an essay on the comfort levels in using hacking techniques to spy on competitors.

© BrainMass Inc. brainmass.com October 24, 2018, 9:22 pm ad1c9bdddf
https://brainmass.com/business/capital-budgeting/hacking-techniques-124741

Solution Preview

Please see response attached, which is also presented below.

RESPONSE:

Interesting topic! Your tentative outline might be something to the effect...

I. Introduction (introduce topic; include purpose statement: The purpose of the paper is to discuss the comfort level of using hacking technique to spy on your competitors.)
II. Legal techniques (high comfort levels, e.g., legal and ethical)
III. Illegal techniques (little or not comfort levels e.g., both illegal and unethical)
IV. Conclusion (sum up main points)

Now, let's look at some research that you can draw on to fill in the above outline. I also added an extra reading section at the end of the response to consider (see attached response).

Let's take a closer look.

1. I need HELP writing an essay on the comfort levels in using hacking techniques to spy on competitors.

Introduction

The term "hacker" originally meant someone who understood computers deeply; however, as computers became popular, the media used hacker to refer to those who committed computer crimes, and so the population at large learned the term in the context of the computer criminal. This bothered the ethical hackers, so people began calling malicious hackers "crackers" in order to differentiate them from ethical hackers. So far, it hasn't worked very well most people outside the computer security world don't understand the ...

Solution Summary

Provides assistance with an essay on the comfort levels in using hacking techniques to spy on competitors. References are provided.

$2.19
See Also This Related BrainMass Solution

Professional Issues in Computing: Ethical Hacking

"White Hat Cracking" involves security testing by arrangement. "Grey Hat Cracking" seeks to identify insecure systems and inform administrators/users of vulnerabilities. "Black Hat Cracking" involves accessing systems.

Counterattacks on phishing servers, spam sources, and malware distributors are held up as "ethical cracking". And "hacktivism" involves cracking for a "higher purpose".

Is it possible to crack systems and still be ethical? Support your position.

View Full Posting Details