REALTORS Pledge of Performance and Service - Web Hosting ...

ovenforksqueeΑσφάλεια

3 Νοε 2013 (πριν από 3 χρόνια και 7 μήνες)

62 εμφανίσεις

Alison Toothman

Professor Ballentine

English 303: Multimedia Writing

December 6, 2012

(Revised Copy)


Hackers


Red Hat’s Security Guide makes a distinction between three types of hackers. The types
of hackers are separated by colors. There are the white,

black, and grey hat hackers. Each of the
white, black, and grey hackers has a distinction about what they focus on with computers

systems and their motivations. The definition of a hacker is complex. For example according to
Red Hat, “a common trait among

most hackers is a willingness to explore in detail how computer
systems and networks function with little or no outside motivation” (Redhat; 2.1. A Quick
History of Hackers). Red Hat’s Security Guide categorizes these hackers into

three

types.


First, the

white hat hacker, “Is one who tests networks and systems to examine their
performance and determine how vulnerable they are to intrusion” (Redhat; 2.1.1. Shades of
Grey). One of the main focuses of the white hat hacker is determining if the companies they

are
employed by have a secure security system and what adjustments need to be made. Mostly they
are checking to make sure the website is secure from intrusion.
In 2008, an article in USA Today
by Greg Wiles, had the idea that there was a need for white ha
t hackers. “According to a survey
by the Computer Security Institute, organizations reported $52.5 million in losses in 2006
because of computer security breaches” (Miles). White Hat Hackers are the only type out of
three that do not have a personal agenda

but work strictly to test the system and report their
findings.


Second, the black hat hackers

“Often

rely on available cracking programs and exploit
well known vulnerabilities in systems to uncover sensitive information for personal gain or to
inflict d
amage on the target system or network” (Redhat; 2.1.1. Shades of Grey). This black hat
hacker is like the mainstream thought of what a hacker is, which is called a, “cracker” by most
computer programmers.


Lastly, is the grey hat hacker, “Who has the skil
ls and intent of a white hat hacker in most
situations but uses his knowledge for less than noble purposes on occasion” (Redhat; 2.1.1.
Shades of Grey). Out of the three
the grey hat hacker is more difficult to understand. There is
insufficient information

to determine what work the grey hat hacker takes into consideration to
act upon.


The Red Hat’s Security Guide does have distinctions between each of the three types of
hackers. However, their actions overlap on a non academic approach to the grey hat hac
ker,
including some things the black hat hacker takes action i
n. They have a distinction with

each in
categories but they overlap.
Since the Red Hat’s Security Guide color coordinates all of these
hackers it is thought that people can distinguish the hacke
rs based on colors and the
representation of the colors through history. Looking at the color interpretation through the mood
rings symbolism of each color. Black signifies, “This person is stressed and tense. Black is the
sign of someone who is overworked

and harried.” The tense feeling behind black can be
synonymous with the definition of a black hat hacker. The black hat hacker is someone who
breaks into systems without the thought of an academic purpose. So, the black hat hacker is a
villain out of the
three types of hat hackers.


Moving on to the white hat mood denotes, “This person is very frustrated, possibly bored
,

and may even be continued.” For the white mood person to be confused and bored can fit into
the definition for white hat hackers
, since
they are just there to do a job and that’s it.


The three forms of hackers that Red Hat’s Security Guide discusses

are aimed towards
the colors associated with each hacker. There is some hope for the use of the color spectrum with
a code of conduct or cod
e of ethics or how we conduct ourselves in the world of remix. One
could argue that a moral principle could appear with all the ranges of hackers and how one does
it for an academic purpose and others for private advances in their skill set. However, it is

hard to
debate the use of colors and what they accredit with the changes of moods. The association of a
moral code to the mood rings to each use of their skill set works by connecting each with all
points.


The color spectrum helps to understanding the c
odes of ethics people perceive goes with
the hacker and to differentiate between

codes of ethics

like with the pledge of REALTORS
. All
three types of hackers have a tense feeling or stress at the same time

associating them along side
the conduct of ethics. There are different forms of ethics that people affiliate with. One form of
conduct of ethics is the conduct realtors take. In the first article of
REALTORS Pledge of
Performance and Service

it states, “REALTORS protect and promote t
heir clients’ interests
while treating all parties honestly” (Board of Realtors
; Article 1). Treating all parties with
honesty is not discussed in any of the types of hackers, there is no moral for honesty. The color
spectrum differentiates from the code
o
f ethics for realtors.


Another code of ethics that associates more with hacking computer systems and
network
functions is ethics in computing. Web designers focus on, “Many codes of ethics discuss the
responsibility of the engineer to the safety of the p
ublic” (Ethics in Computing). The code of
ethics has similarities with the safety of the public because public can include everyone who is
involved in the programming and the hacking.


The three types of hackers, color spectrum, and being capable to admini
ster certain codes
of ethics on each gives a complexity to each hacker type. When looking at past articles that
discuss the forms of hacker,
the articles give the people an idea of what each hacker does or
doesn’t do pertaining to their interests. It is co
ncluded that there are key points where hackers
take moral principles into consideration when performing their work. Furthermore, color moods
and placing them with the skill sets each hacker acts on shows that the colors that the Red Hat
gives
matches up

w
ith the feelings behind the specific colors of white, black, and grey.










Works Cited:

“2.2.A Threats to Network Security


Red Hat Customer Portal.”

2.2.A Threats to Network
Security. Red Hat Incorporated, 2012. Web. 08 Nov. 2012.


“Code of Ethics.”
Codes of Ethics.

NC State University, n.d. Web. 05 Nov. 2012.


“Code of Ethics Forms.”
Codes of Ethics Forms.

Board of Realtors, 2007. Web. 06 Nov. 2012.

Wiles, Greg. “White Hat’ Hackers in Demand.” ‘White Hat’ Hackers in Demand


USATODA
Y.com USA TODAY, n.d. Web. Jan
-
Feb. 2008.










Alison Toothman

Professor Ballentine

English 303

November 8, 2012

(Original Copy)


Reflection 5


Hackers & Remix


Red Hat’s Security Guide makes a distinction between specific types of
hackers. The type
of hackers are separated by colors. There are white, black, and
grey hackers. Each of the white, black, and grey hackers has a distinction about
what they focus on with computer systems and their motivations. The definition of
a hacker is complex. For exam
ple according to Red Hat, “a common trait among
most hackers is a willingness to explore in detail how computer systems and
networks function with little or no outside motivation.” (Redhat; 2.1. A Quick
History of Hackers). Red Hat’s Security Guide categor
izes these hackers into
types.


First, the white hat hacker “Is one who tests networks and systems to
examine their performance and determine how vulnerable they are to intrusion.”
(Redhat; 2.1.1. Shades of Grey). One of the main focuses of the white hat h
acker is
determining if the companies they are employed by have a secure security system
and what adjustments

need to be made. Mostly they are checking to make sure the
website is secure from intrusion. In 2008, an article in USA Today by Greg Wiles,
had t
he idea that there was a need for white hat hackers. In the article, “According
to a survey by the Compute security Institute, organizations reported $52.5 million
in losses in 2006 because of computer security breaches” (Miles, Greg). White hat
hackers ar
e the only type out of the three that do not have a personal agenda but are
strictly to test the system.


Second, the black hat hackers, “Often rely on available cracking programs
and exploit well known vulnerabilities in systems to uncover sensitive
information
for personal gain or to inflict damage on the target system or network” (Redhat;
2.1.1. Shades of Grey). This type of hat hacker is like the mainstream thought of
what a hacker is, which called a, “cracker” by most computer programmers.


Lastly
, is the grey hat hacker, “who has the skills and intent of a white hat
hacker in most situations but uses his knowledge for less than noble purposes on
occasion.” (Redhat; 2.1.1. Shades of Grey). Out of the three the grey hat hacker is
more difficult to u
nderstand. There is insufficient information to determine what
duties the grey hat hacker takes into consideration to act upon.


The Red Hat’s Security Guide does have distinctions between each of the
three types of hackers. However, they do overlap some o
f the actions on a non
-
academic approach to the grey hat hacker; including some things the black hat
hacker takes action in. They have a distinction with each in categories but they
overlap. Overlapping does not help for someone who doesn’t understand the
terminology Red Hat uses. Since the Red Hat’s Security Guide color coordinates
all of these hackers it is thought that people can distinguish the hackers based on
colors and the representation of the colors through history. Looking at the color
interpretat
ion through a mood rings symbolism of each color. Black signifies,
“This person is stressed and tense. Black is the sign of someone who is overworked
and harried.” The tense feeling behind black can be synonymous with the
definition of a black hat hacker.
The black hat hacker is someone who breaks into
systems without the thought of an academic purpose. So, for the person hacking to
be tense could certainly be because of the repercussions from hacking a program
without permission.


Moving on to the white mo
od denotes, “This person is very frustrated,
possibly bored, and may even be confused.” For the white mood person to be
confused and bored can fit into the definition for white hat hacker, since they are
just there to do a job and that’s it. Moving on to t
he last color being grey it states,
“The individual is experiencing lower level stress and is feeling anxious and
nervous.” The grey mood also fits well with the grey hat hacker because a grey hat
hacker has academic purposes but they also don’t always use

their hacking skills
for academic purposes.


The three forms of hackers that the Red Hat’s Security Guide discusses
include the mood that aims towards the colors associated with each hacker. There
is some help for the use of the color spectrum with a code

of conduct or code of
ethics or how we conduct ourselves in the world of remix. One could argue that a
moral principle could appear with all the ranges of hackers and how one does it for
an academic purpose and others for private advances in their skill s
et. However, it
is hard to debate the use of colors and what they accredit with the changes of
moods. The association of a moral code to the feelings of each hacker to each use
of their skill set works by connecting each with all points.


The color spectru
m helps to understanding the codes of ethics people
accompany with the hacker and to differentiate between codes of ethics. All three
of the hacker types include a form of tense feeling or stress at the same time
associating them along side of the conduct
of ethics. There are different forms of
ethics that people affiliate with. One form of conduct of ethics is the conduct
realtors take. In the first article of
REALTORS Pledge of Performance and Service
it states, “REALTORS protect and promote their clients’ interests while treating all
parties honestly” (Board of Realtors; Article 1). Treating all parties with honesty is
not discussed in any of the type of hackers, there is no moral for honesty. The colo
r
spectrum differentiates from the code of ethics for realtors.


Another code of ethics that associates more with hacking computer systems
and network functions is ethics in computing. The ethics of computing focus on,
“Many codes of ethics discuss the re
sponsibility of the engineer to the safety of the
public” (Ethics in Computing). The code of ethics has similarities with the safety
of the public because public can include everyone who is involved in the
programming and the hacking.


The three types of
hackers, color spectrum, and being capable to administer
certain codes of ethics on each gives a complexity to each hacker type. When
looking at past articles that discuss the forms of hacker, it gives the people an idea

of what each hacker does or doesn’t

do pertaining to their interests. It is concluded
that there are key points where hackers take moral principles into consideration
when performing their work. Furthermore, color moods and placing them with the
skill sets each hacker acts upon shows that t
he colors that the Red Hat gives each
matches up with the feelings behind the specific colors of white, black, and grey.




Works Cited:

“2.2.A Threats to Network Security


Red Hat Customer Portal.” 2.2.A Threats to Network
Security. Red Hat Incorporated
, 2012. Web. 08 Nov. 2012.


“Code of Ethics.”
Codes of Ethics.

NC State University, n.d. Web. 05 Nov. 2012.


“Code of Ethics Forms.”
Codes of Ethics Forms.

Board of Realtors, 2007. Web. 06 Nov. 2012.

Wiles, Greg. “White Hat’ Hackers in Demand.” ‘White Hat’

Hackers in Demand


USATODAY.com USA TODAY, n.d. Web. Jan
-
Feb. 2008.