Our job as it security professionals is to ensure an


Article

Our job as IT security professionals is to ensure an ethical approach to the safety and integrity of the data. We have been given laws to guide us on the path of ethics.

Laws were crafted to provide an entity the ability to prosecute those that hack them. A problem with the laws is that it also covers the illegal activities of those entities that are being hacked. When the entities go beyond their original scope of intent, their intentions are for selfish gain.

The entities must be put back in check, which is why groups like Anonymous have risen. On Anonymous' website it states, "We always fight for people rights. We want every citizens of the world is equal. We harm anyone at any time who doing wrong things" (anonymoushackers.net, 2017)

The idea of keeping powers in check reminds me of how our nation's founding fathers setup the three branches of government. The three branches are, "The legislative Branch enacts legislation" (usa.gov), while "The executive branch carries out and enforces laws" (usa.gov) and "The judicial branch interprets the meaning of laws" (usa.gov).

They are designed to keep each other in check and prevent one from becoming more power than the other. The integrity of the three controlling government bodies is only as good as the integrity of the members. This can be said of any government of the world. Anonymous is a self-appointed group for unofficial checks and balances for the governments of the world.

I do have reservations about the information Anonymous is presenting to the world, which is the integrity of that evidence. Is it being modified to make it more juicy and enticing? Can power corrupt? The 1st Baron Acton seemed to think so when he said, "Power tends to corrupt, and absolute power corrupts absolutely" (Britannica, 2012).

This does not mean anyone in power is corrupt, it just means that there is a greater chance with the more power they have. God himself has his own system of ethical checks and balances.

Jesus says in Luke 8:17, "For there is nothing hidden that will not be disclosed, and nothing concealed that will not be known or brought out into the open" (NIV, 2011).

References A. Walter James, (May 07, 2012) John Emerich Edward Dalberg Acton, 1st Baron Acton,

Retrieved from https://www.britannica.com USA.Gov, (April 3, 2017),

Retrieved from https://www.usa.gov Anonymous, (2017)

Retrieved from https://www.anonymoushackers.net

Solution Preview :

Prepared by a verified Expert
Software Engineering: Our job as it security professionals is to ensure an
Reference No:- TGS02258205

Now Priced at $10 (50% Discount)

Recommended (93%)

Rated (4.5/5)