It is debatable, if hacking can be ethical or not, the term “Hacking” over time has been associated with destructive activity. These are some of the terms used in the context of hacking which provides better clarity, Hacker is somebody who enjoys learning hacking for a defensive purpose; an ethical hacker is the security professional who exercises his skills for a defensive purpose. The term Cracker refers to a person who uses his hacking skills for destructive purpose. The ethical question here is in regard to the physical activity of hacking which is sometimes hard to differentiate from cracking. The main difference being, Ethical hacker just identifies vulnerabilities and does not exploit them unlike a cracker. Ethical hacking is the process adopted by ethical hackers to discover the vulnerabilities existing in information systems operating environments. With the growth of internet, computer security has become a major concern for business. Organizations Continue reading
Information Systems Management
Introduction to Grid Computing
The popularity of the Internet as well as the availability of powerful computers and high-speed network technologies as low-cost commodity components is changing the way we use computers today. These technology opportunities have led to the possibility of using distributed computers as a single, unified computing resource, leading to what is popularly known as Grid computing. Grid computing is a term referring to the combination of computer resources from multiple administrative domains to reach a common goal. The grid can be thought of as a distributed system with non-interactive workloads that involve a large number of files. What distinguishes grid computing from conventional high performance computing systems such as cluster computing is that grids tend to be more loosely coupled, heterogeneous, and geographically dispersed. Although a grid can be dedicated to a specialized application, it is more common that a single grid will be used for a variety of different Continue reading
What is Enterprise Application Integration (EAI)?
Supply Chain Management (SCM) applications (for managing inventory and shipping), Customer Relationship Management (CRM) applications (for managing current and potential customers), Business Intelligence (BI) applications (for finding patterns from existing data from operations), and other types of applications (for managing data such as human resources data, health care, internal communications, etc) typically cannot communicate with one another in order to share data or business rules throughout a company. Enterprise Application Integration (EAI) is the process of linking such applications within a single organization together in order to simplify and automate business processes to the greatest extent possible, while at the same time avoiding having to make sweeping changes to the existing applications or data structures. Enterprise Application Integration (EAI) is defined as the unrestricted sharing of data and business processes among any connected applications and data source in the enterprise. It is considered as a framework that is formed of Continue reading
Ethical Hacking – Need, Types, Applications and Problems
The word hacking is defined as an illegal use of the other’s computer system or the network resources. Hacker is the term which is formerly meant for the skillful programmer. The word hacker refers to the names of the persons who enjoys the work in learning the details of the computer systems and stretch the capabilities from the system. The system of hacking describes the fast improvement in the new programs that make the codes for the providing a better security to the system with more efficiency. The word cracker also belongs to the same field it make use of the hacking skills for the unlawful purposes like email id, intruding into other’s system. Hacking is of different types such as back door hacking, viruses and worms, Trojan horses, Denial of Services, anarchists, crackers, kiddies and ethical hacking. In the types of hacking system one of the most common hacking Continue reading
Blockchain Technology – Features, Types and Benefits
A Short History of the Blockchain Technology When an unknown scientist under the pseudonym Satoshi Nakamoto published his white paper about Bitcoin – a “purely peer-to-peer version of electronic cash”– in 2008, it was not the cryptocurrency itself but its underlying mechanism, known today as the blockchain, that was considered revolutionary. But overall awareness of the blockchain technology remained rather limited, as Bitcoin itself was not yet widely known. Starting in the year 2012, increasing activity surrounding Bitcoin could be observed, as the cryptocurrency’s market capitalization grew and start-ups in the field of payments and coin wallets started to emerge. But still, Bitcoin and the underlying blockchain remained subject to a general scepticism, being associated mainly with the financing of rather sketchy online activities and other misconceptions. Nonetheless, by the year 2014, over 80 uses of blockchains had been reported. Slowly, the initial scepticism gave way to the increasing efforts of Continue reading
Data Ethics – Meaning, Risks and Mitigation
In the world of today, there is a rising increase in the amount of data being collected each day. This data is further being divulged across several environments, sectors, and industries. In most scenarios, the process of collecting data is really not a big deal but the ability and technicality of managing the large amount of data collected become an unending struggle. The struggle to effectively manage the exploding volume of data has led to increased prominence in the ethical use of data. For this reason and more, it has caused the establishment of policies to ensure there is a check and balance as to how data is being shared with the sole purpose of protecting the integrity of people who own this information. In addition, people or organizations who are charged with the role of gathering, distributing, and using this data keep exploring the ethics of their practices and, Continue reading