Zibererasoetatik babesteko, hacking etikoaren balioa

نویسندگان

چکیده

2020an, teknologiak bultzatutako gizarte batean bizi gara, eta datuak komunikatzeko sistemak funtsezkoak bihurtu dira gure eguneroko bizitzaren alderdi guztietan. Covid19-k erakutsi digu ezagutzen ez dugunak eszenatoki bizimodu berrietara eraman gaitzakeela, duela hilabete batzuk imajinatu ere ezin genituen lekuetara. Gaur egun, pertsonen, enpresen erakundeen arteko harremanak inoiz baino gehiago oinarritzen telekomunikazio-sareetan, eta, beraz, zibersegurtasun sofistikatuaren beharra oso garrantzitsua bihurtzen ari da gero handiagoak diren zibererasoetatik babesteko. Enpresak erakundeak diru kopuru handiak inbertitzen beren segurtasun zibernetikoan. Egoera horretan, hacking etikoa ohiko tresna behar den segurtasun-maila zehazteko. Hacking etikoaren helburua sare informatikoetan ahuleziak kalteberatasunak aurkitzea, hackerrek sareetan sartzeko softwarearen azaltzeko erabiltzen dituzten ezagutza berberak erabiliz. Dibulgazio-artikulu honek zer den, onura dituen zergatik beharrezkoa azaltzen du. etikoari buruzko artearen egoera bat aurkezten du, erakusten du enpresek erakundeek nola inplementa lezaketen etikoa, sarbide-testetan (Penetration Testing Execution Standard, PTES) oinarritutako metodologia

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cognitive Hacking

In this chapter, we define and propose countermeasures for a category of computer security exploits which we call "cognitive hacking." Cognitive hacking refers to a computer or information system attack that relies on changing human users' perceptions and corresponding behaviors in order to be successful. This is in contrast to denial of service (DOS) and other kinds of well-known attacks that ...

متن کامل

Hacking Davidson

Scheme,” Donald Davidson argues against the logical possibility of conceptual schemes. Believing it a remnant of the incomplete eradication of dogma in the empiricist tradition, Davidson wishes to undermine what he believes is the source of talk of conceptual relativism: the third dogma of scheme-content duality. Building on Quine, he constructs an argument intended to illustrate the peculiar p...

متن کامل

Hacking Cyberspace

Knowledge about cyberspace is shaped and delimited by the questions we ask and the kinds of inquiries we pursue. Questioning, of course, is never objective or neutral. As Martin Heidegger demonstrates, a question, no matter how carefully articulated, necessarily harbors preconceptions and pre-understandings that direct and regulate inquiry (24). When we ask, for example, whether cyberspace port...

متن کامل

Ethical hacking

The explosive growth of the Internet has brought many good things: electronic commerce, easy access to vast stores of reference material, collaborative computing, e-mail, and new avenues for advertising and information distribution, to name a few. As with most technological advances, there is also a dark side: criminal hackers. Governments, companies, and private citizens around the world are a...

متن کامل

Hacking NIMEs

NIMEs typically focus on novelty but the cost of novelty is often to ignore other non-functional requirements and concerns such as usability or security. Digital security has probably not been a concern for performers due to the duration of their performances and lack of disrespectful hackers, known as crackers, in attendance carrying the appropriate equipment and software necessary to hack a p...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Ekaia

سال: 2021

ISSN: ['0214-9001', '2444-3255']

DOI: https://doi.org/10.1387/ekaia.21939