We Write Essays for Students
Tell us about your assignment and we will find the best writer for your paper
Get Help Now!Ethical and legal issues are the issues concerned with distinguishing whether a behavior is bad or good. They justify the morality of human beings in relation to the societal ethical principles. They set guideline within which professional codes should fall. Computer security is a branch of computer science that is concerned with provision of security application that ensure protection in computer systems. Computer scientist who deal with this field are dedicated to protecting system resources as well as information.
Lack of computer security poses adverse effects to users. An example of such effects is economic harm. When a computer system security is invaded, important software and hard ware might be corrupted which might in turn result to loss of valuable resources. Computer insecurity can also result to extreme cases injury and death. This is especially observed in safety critical systems. These are systems which have direct relationship in life-threatening effects. Examples are systems used in medical diagnosis. Poor management of computer security in medical systems might result to loss of life of the patient.
It is so unfortunate that the computer scientists themselves are the initiators of the problems in computer security. The computer professionals should be in the forefront in enforcing policies ethical use of computer systems. They instead use their skills irresponsibly to attract selfish gains from their customers. For instance, it stands out an ill motive to introduce virus. Computer scientists have subjected their customers to manipulations necessitated by complexity of the field. Therefore, it is a responsibility of the people in the profession to ensure maximum computer security. Of course there are prescribed codes of conduct in the software security industry. Otherwise, the professionals should adopt self-conscience that promote efficiency and trust in computer system so that they can protect their profession.
In this case, Johnny appreciates and opts for abundance of wireless hotspots in the town. He portrays patriotism for his town as well as his profession as a computer scientists. He would wish that the town residents have access to wireless internet. This would enable convenience in access to information. Jonny shows dedication to his profession when he intends to improve the life in the town where he lives. Johnny already has got the problem statement and the objective that he wants to achieve. What matters is the procedure of navigating to the destination objective. The steps that he would take to achieve his dream has to be within the prescribed codes of conduct.
One evening Johnny decided to wardrive around the town with two of his friends. Wardriving is a situation whereby hackers drive around an area to make use of poorly protected network systems. The network did not belong to Johnny. This implied that he was trying to intrude into other people’s networks. Wardriving involves moving around with a laptop computer and a wireless LAN adapter with an aim of finding unprotected wireless LAN. The principle behind this is the computer wireless being set to the specific required mode that enables it to receive packets that are within its range. The target computer network contains SSID, a wireless network, which gets constantly transmitted by access points. The constant transmission enables the moving computer detect the presence of wireless network. The practice can be used by people with evil intentions to have access to other people’s data. In this case Johnny uses wardriving to have access to free internet service. It so challenging by the fact that Johnny has no interest in doing this for himself but does it for the sake of the community.
The wardriver application uses software like Cismet or Netstumbler to track the access points by scanning the airwaves produced by SSID. The program is able to check if the target network contains encryptions and configures itself to log into the particular signals. As a result, GPS receiver records the coordinates of the signals followed by the wardriver getting connected to the access points. Consequently, shared files in the private network get availed.
Despite the intention of the professional, taking into consideration the moral standards necessary for a given practice remains important. Johnny is obliged to abide by the ethical requirement in availing internet access across the town. There are better and acceptable ways of accomplishing this project. Network owners are therefore posed with the risk of network insecurity which comes along with secondary adverse effects as far as information systems is concerned.
Fortunately, there are a number of precautionary measures that one can undertake to towards protecting the computer system against wardrivers. The first precautionary measure is, people should avoid broadcasting there SSID. This would pose challenge in detecting the network by outsiders. Secondly, if one is not broadcasting but the SSID can be guessed, it is advisable to change the SSID form factory default. One can also there wireless communication by using EAP encryption on routers as opposed to WEP encryption.
After identifying internet access points, Johnny engages in warchalking. This is the act of making marks on walls, pavements or buildings to show availability of wireless networks. Warchalking can be done by the owner of the given network. If it is within the owner’s knowledge, then it is acceptable. Otherwise, warchalking without the permission of the owner of the network is both illegal and unethical.
Johnny has got a good idea for the town. However, he should approach it with much intellect. He can express his idea inform of a project. He is patriotic about his town and would love the town prosper in line with his field of practice. He can design a network system for the town. He write a proposal of the project to make wireless hotspots available at the identified points. He can present the proposal to the government or any appropriate organization. Since it concerns community development it would be easier to access funding in order to accomplish the project. Approaching the problem in that manner makes the idea viable in the society.
On the other hand, users should advance their computer security to protect their networks and information systems. This can be done by using latest encryption methods. It is advisable to use Wireless Protected Access as opposed to Wired Equivalent Privacy which was cracked ten years ago. Users should protect their routers with passwords. Finally, computer professionals should act within acceptable practices and protect computer security. It is their responsibility to establish trust of users on using computer systems with confidence. They should act ethically and stop collecting selfish gains as a result of manipulating software. Furthermore, the government should set strict laws that protect users of computer systems.
PLACE THIS ORDER OR A SIMILAR ORDER WITH GRADE VALLEY TODAY AND GET AN AMAZING DISCOUNT
The post Wardriving and warchalking in computer science appeared first on Brook Writers.
Welcome to originalessaywriters.com, our friendly and experienced essay writers are available 24/7 to complete all your assignments. We offer high-quality academic essays written from scratch to guarantee top grades to all students. All our papers are 100% plagiarism-free and come with a plagiarism report, upon request
Tell Us “Write My Essay for Me” and Relax! You will get an original essay well before your submission deadline.
