Monday, December 30, 2019

Ethical Hacking Final Challenges Free Essay Example, 1000 words

Both ports 20 and 21 are known as random ports. While 21 is known as the TCP and is well designed for FTP control, the port 20 is the active FTP type and is designed for the actual transfer of data. Ports 23, 25, 53 and 110 are ports outside the range and they would be used to transfer actual data without the specified range. 23 is the Telnet, 25 acts for the simple mail transfer, 53 is the domain name saver and 110 acts as the Post Office Protocol version 3 (Simpson, 2006). In analyzing the services currently running for the Alexander Rocco Corporation, the ports being used must be keenly looked at to enhance the recovery of the ways to be used to curb the vulnerabilities. Challenge 3 Ethics and morality most so in the computer environment more or less revolves around the same thing that is ethics being a moral philosophy where one makes a moral choice and sticks to it. In our case it refers to the moral guidelines that an individual sticks to when using computers and computers networks including the encryption algorithms. We will write a custom essay sample on Ethical Hacking Final Challenges or any topic specifically for you Only $17.96 $11.86/pageorder now It is unethical and therefore against the law to do the following when it comes to computers and computer networks. An individual should not indulge into using office computers to do personal work, one should never read information not theirs either form email or from a friends networking sites without the friends permissions. Plagiarism which is the use of another persons work from the net without recognizing them is a crime that none should be found committing. As has been recorded in the past from computer crackers and hackers, one should never be found sending any form of computer virus via email to any computer or computer network. One should never hack into the systems of other individuals or organization, at the same time pirated software should never be sold in the market whether at night or at day time (Simpson, 2006). It should be noted that the learning and the reimplementation from open source software is a violation of the licence hence against the law whether morally or legally and it attracts a penalty of more than $25,000 or both. When and algorithm licence expires it ought to be replaced with another given that learning from search open source projects will be regarded as plagiarism. The illegality is also reinforced from the fact that such information is not enforced by the copyright laws. Derived from this, people who posses the ability to break into a hashing algorithm and post their findings into the internet must be arrested and arraigned in court given the extent of the illegality of their acts.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.