Thursday, 31 January 2013

The Security Arguments


The Security Arguments

Argument

According to hackers, actual break-ins illustrate security problems to a
community that will not otherwise notice those very problems.

Counterargument
Reporting and explaining a vulnerability to the owner of a system
would illustrate the problem as well; breaking in cannot be justified.
Should burglars be allowed to break into houses in order to
demonstrate that door locks are not robust enough?
The Idle System Argument
Argument
System hackers often claim they are merely making use of idle
machines. Because a system is not used at any level near capacity, the
hacker is somehow entitled to use it.
Counterargument
Clearly, a remote intruder is not in the position to properly qualify
whether a systems is being underused or not. In any case, unused
capacity is often present for future needs and sudden surges in system
activity.
The Student Hacker Argument
Argument
Some trespassers claim they do no harm, and do not change anything;
they are merely learning how systems and system security work.
Counterargument
Hacking has nothing to do with proper computer science education.
Furthermore, ignorant users can unwittingly severely damage systems
they break into. Also, one cannot expect a system administrator to
verify that a break-in is done for educational purposes, and hence
should not be investigated.

No comments:

Post a Comment