Do We Really Want to Reward People Who Hack? Cyber Security Essay

Paper Type:  Essay
Pages:  5
Wordcount:  1209 Words
Date:  2022-02-16
Categories: 

Introduction

Cybersecurity is a term widely used to refer to approaches, methods, and practices used by organizations to safeguard systems, data, networks, and programs from malicious attacks. It focuses on shielding these components from unauthorized access orchestrated through digital attacks. The practices of cybersecurity are aimed at ensuring the safety, integrity, and confidential nature of any information that may be prone to attacks (Whitelegg, 2017). It is essential to note that businesses are hiring hackers to boost their cyber security processes, in order to fortify their information technology systems. This paper will, therefore, discuss whether individuals need to reward hackers for their role in cybersecurity.

Do We Really Want to Reward People Who Hack?

Protection of systems is aimed at enhancing safety in specific areas in the computer systems. Usually, cyber practices seek to improve the security of applications and the safety of information available on existing databases. Aspects such as data recovery and protection of networks area priority concern for those in charge of cybersecurity. With the continued innovations in the world of technology and communication, computer systems have become more vulnerable to attacks. The number of smart devices is relatively higher than that of people. These advances in technology have become a challenge in protecting systems, data, and applications (Von & Van, 2013). People with evil intentions have equally become smarter as a result of the improvements in technology.

Trust banner

Is your time best spent reading someone else’s essay? Get a 100% original essay FROM A CERTIFIED WRITER!

Intrusions by hackers have become stealthier, subtle, well-executed, and deadlier. The impact of a cyber-breachon any organization is often profound. A lot of aspects are compromised in the event of a successful breach. For instance, businesses in the present-day place high value in proprietary information that sets them above their competitors. If such information were to leak or fall into the hands of hackers, a business would no longer dominate market forces and enjoy profits as before. As a result, they often seek the services of hackers to identify and seal loopholes in current cybersecurity systems (Whitelegg, 2017).

Notably, rewarding of hackers takes many forms. Apart from offering them employment, organizations often provide cash rewards, which are often handed out to winners in contests organized by businesses. As part of security assessment procedures, organizations sometimes conduct simulations or real-time activity to test for undetected weaknesses of systems. Hackers are invited, with the promise of a reward, to challenge one another to gain illegal access to specific information (Esteves, Ramalho, & Haro, 2017). Those who successfully break into the systems are rewarded as they provide insight into what is to be improved. However, the laws of the land dictate that such individuals act in violation, and thus, should be held accountable.

Ethically, people with the intent of spreading malice through digital means should be arrested and prosecuted for compromising organizations. Nevertheless, their unique abilities to manoeuvre through the set security configurations makes them candidates for boosting security systems (Esteves et al., 2017). The practice of hacking is unethical and illegal. However, hackers should not be jailed, but rather employed to improve digital security. Most of them are talented, gifted individuals, with unique knowledge and abilities above an average person. Their zeal and persistence to get into systems, while immoral, is an ability that few possess.

I am of the opinion that hackers can be rewarded to deliver some services but under close supervision (Esteves et al., 2017). Alternatively, organizations can invest in ethical studies to counter criminal desires and tendencies of hackers. They are uniquely able to beat even the smartest defenses. Businesses can take advantage of their rare skillsets and delegate some cyber-related tasks to them. However, not all would agree or be comfortable with staff conducting hacking activities. Cybersecurity in its entirety requires the input of three major components. These are technology, processes, and people. Thus, people needed to enhance the safety of systems should have a thorough understanding of how it works.

Having hackers in an organization fills the unconventional expertise gap that is often an unstated requirement in the industry. Many people believe that it is by thinking in the same framework as a thief that individuals can apprehend one. Consequently, by having a hacker rewarded, a business can use his or herservices to test how strong their preventive measures are. It is an illegal activity, but it can primarily be used to establish any underlying weaknesses. The mentality of a hacker is that of a criminal (Esteves et al., 2017). As such, when tasked to test systems' security, their resourcefulness comes in handy in identifying areas that need to be worked on. Thus, they can go further to develop codes that minimize vulnerability.

Business heads often reward hackers with essential, temporary positions within the company or organization. These jobs revolve around the roles of personnel such as risk assessors, cryptographers, as well as developers of software dealing with security (Hansen & Nissenbaum, 2009). The hackers can also serve in capacities such as specialists on network security and information officers. Such responsibilities are likely to occupy their minds as they are motivated to work in the fields that they are passionate about. Whereas some business leaders may feel the compulsion to continually monitor progress made by the hacker members of a unit, their results may speak for themselves. They can also be productive in educating staff how to be secure. As such, workers can learn common security practices such as choosing long passwords and continuously backing up data.

A constant rise in cyber-recruitment has not significantly helped in mitigating crises that cripple businesses whenever an attack is orchestrated. Enterprises are more susceptible to collapse due to the stolen ideas, corrupted, deleted or manipulated data (Hansen & Nissenbaum, 2009). The lack of digital skills to counter the effects of such attacks causesgrave concerns. This would not be the case if organizations could embrace the use of hackers, as they offer exceptional abilities to rectify and reinforce cyber systems. These members are referred to as white hat hackers, and they try to portray the positive side of hacking. They establish the advantage of providing information on vulnerabilities in a security system as well counter malicious entry.

Conclusion

In conclusion, I support the rewarding of hackers in a bid to improve cybersecurity. They have a lot of untapped potential, which if properly motivated, can of great benefit to many organizations. Their unique abilities and skills grant them access to the most sensitive information. By recognizing their illegal acts, businesses can make use of them to test and identify the strengths and weaknesses of the existing security systems. Such hackers facilitate the availability of an organization's information, even in the case of a power outage, a failure in systems or foreign, or unauthorized and malicious intrusion. They, therefore, provide unrivaled protection, insight, and understanding of cyber security systems in an organization, and thus they should be rewarded.

References

Esteves, J., Ramalho, E., & De Haro, G. (2017). To improve cybersecurity, think like a hacker. MIT Sloan Management Review, 58(3), 71.

Hansen, L., & Nissenbaum, H. (2009).Digital disaster, cybersecurity, and the Copenhagen School. International Studies Quarterly, 53(4), 1155-1175.

Von Solms, R., & Van Niekerk, J. (2013).From information security to cybersecurity. Computers & Security, 38, 97-102.

Whitelegg, D. (2017). What is cyber security, and who are the ethical hackers protecting the world's websites? Agency Central. Retrieved from https://www.agencycentral.co.uk/articles/2017-08/cyber-security-why-businesses-are-employing-ethical-hackers.htm

Cite this page

Do We Really Want to Reward People Who Hack? Cyber Security Essay. (2022, Feb 16). Retrieved from https://proessays.net/essays/do-we-really-want-to-reward-people-who-hack-cyber-security-essay

logo_disclaimer
Free essays can be submitted by anyone,

so we do not vouch for their quality

Want a quality guarantee?
Order from one of our vetted writers instead

If you are the original author of this essay and no longer wish to have it published on the ProEssays website, please click below to request its removal:

didn't find image

Liked this essay sample but need an original one?

Hire a professional with VAST experience and 25% off!

24/7 online support

NO plagiarism