1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mnenie [13.5K]
3 years ago
15

You acquire a network vulnerability-scanning tool and try it out on a network address segment belonging to people at your univer

sity of business. The scanner identifies one computer named Prince Hal that has many serious vulnerabilities. You deduce to whom the machine belongs. Explain the ethical implication of:________.
a. telling the owner what you have found,
b. telling you local administrator or security officer what you have found
c. exploiting one of the relatively minor vulnerabilities to show the owner how serious the exposure is
d. exploiting a relatively minor vulnerability as a prank without telling the owner,
e. telling the owner what you have found and the demanding money for details on the vulnerabilities
f. using one of the vulnerabilities to acquire control of the machine, downloading and installing patches and changing settings to address all the vulnerabilities, and never telling anyone what you have done.
Computers and Technology
1 answer:
inna [77]3 years ago
8 0

Answer and Explanation:

  • The speculates on either the morality of transmitting vulnerabilities to an individual over all the internet. The node is a very possible target of a criminal charge, these are highly recommended in terms of the problem not just ethical.
  • The question argues the etiquette of telling a compromised network infrastructure to something like a domain admins or security guard. Throughout this case the primary admin issue is power. Informing individuals about both the potential problem is prudent or legal, which is also preferable to recommend the future course of action.
  • The speculates on either the moral values of leveraging the infrastructure for a mild vulnerability. This same proprietor including its node is truly likely to be victims of a prospective infringement, and therefore it is advantageous to notify him including its problem that the equitable access is considered to become an ethical manipulate susceptibility for possessor data as well as potential threats to understanding.
  • The theories a small flaw throughout the channel's ethics. The device's leader is the likely guilty party of even a future offense to notify him of both the actual problem. The law is ridiculous as well as comparable to trying to hack without permission vulnerability it's immoral vulnerability.
  • The content upon the ethical principles of manipulating the channel's small susceptibility. The device's owner seems to be the likely casualty of such a future offense to instruct him including its subject. As well as trying to sell him much farther documents socially responsible borders. It's the holder who has so far notified the weakness she perhaps she has just one option to obtain products and services. Having clear data on the sale still seems to be ethical.
  • The issue argues mostly on ethics with repairing security flaws without channel assent. Although the controlled variable of the modules has been the true likely target of such a future infringement, exploiting susceptibility without permission is appropriate as well as unethical, this same objective being honorable as well as noble.
You might be interested in
Clive wants to print the numbers 1 through 10, so he uses the following code.
snow_tiger [21]

If Clive wants to print the numbers 1 through 10 with the code:

for x in range(10):

    print (x)

He will not get the output he wants because python begins counting at 0, so the numbers 0 through 9 will print.

<h3>Code explanation</h3>

The code is represented in python.

  • We loop through the number in the range 10.
  • Then print the the looped numbers.

Generally, python begins counting from 0. Therefore, the numbers that will be printed are as follows:

  • 0
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9

learn more on python here: brainly.com/question/26104476?referrer=searchResults

8 0
2 years ago
Claim: Raising the minimum wage does not help most minimum wage employees Reason: Many small businesses cannot afford high minim
marishachu [46]

Companies will have to raise prices in order to be able to pay employees, which would mean consumers would buy less, meaning that more employees would have to get laid off, and so on, and so on.

7 0
4 years ago
Read 2 more answers
Write and run a Python program that asks the user for a temperature in Celsius and converts and outputs the temperature in Fahre
adelina 88 [10]

Answer:

Program :

celsius_input= float(input("Enter the value of celcius"))#It is used for the input from the user.

print((celsius_input * 1.8) + 32) # it prints the value of fahrenheit for the user.

Output:

  • If the user gives the input as 23.6, then the output is 74.48.
  • If the user inputs is 45, then the output is 113.

Explanation:

  • The above code is in python language, in which the first line is used to generate the message for the user, take the input from the user and store it into the "celsius_input" variable after converting it into float data type.
  • Then the second line will print the value of Fahrenheit by the help of formula "(celsius_input * 9/5) + 32". The 9/5 will become 1.8. hence we used 1.8 in the place of 9/5.
6 0
3 years ago
Image below please help
Serjik [45]

Answer:

  1. Open original document
  2. Place cursor
  3. Highlight text
  4. Ctrl+C
  5. Switch to new document
  6. Ctrl+V

4 0
3 years ago
At the moment i am tackling the cs50x projects and i need a little bit of help with problem set 1, the 'greedy algorithm'. I am
mars1129 [50]
That you have to multiply first and then divide
6 0
3 years ago
Other questions:
  • Which css property controls the space between an html element and the next nearest element?
    7·1 answer
  • What do the points on this website do?
    14·2 answers
  • When using a function to preform a calculation how would you select the range of numbers to use
    13·1 answer
  • Explain why computer systems utilize digital instead of analog signals
    8·1 answer
  • A collection is a container object (data structure) that represents a group of objects often referred to as data or elements of
    6·1 answer
  • If we assume the modern view of existential import, why is the following syllogism invalid? No computer is made of clay. All com
    15·1 answer
  • 7.3.4: Find the Error
    7·1 answer
  • These operating systems use a graphical user interface.
    8·1 answer
  • The ability to use various design software such as Adobe Photoshop, InDesign, and Illustrator would be MOST beneficial to which
    6·1 answer
  • One of the most notable impacts of IT on business is improved
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!