Verified Document

IT Systems Technology Has Now Become A Essay

IT Systems Technology has now become a euphemism for the information age. As individuals, information rarely escapes our grasp as now anybody can have access to its vast array of knowledge. More importantly, in the midst of our global society, technology has a profound role on our nation's ability to participate in a more competitive environment. As the age old adage states, "Knowledge is power," and in many instances this statement is correct. Information allows individuals to make better informed decisions regarding projects that can have grave implications on society if the solution is incorrect. Further, information allows more convenience in regards to access and search of particular concepts. Technology allows humans to live longer while allowing them to live more productive lives (Gregg, 2006). The benefits that technology derives are as difficult to enumerate as they are to fully comprehend. However, it is my contention that the information age has grave consequences on society, especially if society is dependent on specialized individuals to conduct and oversee IT systems. This is particularly true if these entities lack strong ethical value or virtue. As such, it is my belief that companies should not hire experienced hackers to protect their coveted information systems. If experience is indeed needed on the part of companies, strong oversight, and protections should be used to guard against fraudulent activities. By hiring experienced hackers, evidence has proven that more harm can potentially be done than any amount of potential good (Hammond, 2005).

One aspect constantly neglected when discussing the issue of IT protection, are the values and virtues of the individuals who oversee the system. Those in charge to protect confidential information should possess characteristics...

Two such characteristics are honesty and integrity. By hiring experience hackers, companies are violating this principle by placing questionable individuals in positions of power. This concept is akin to putting an alcoholic in a room full of liquor but requiring him no to partake of the substance. It simply doesn't make sense from a logical standpoint. I understand the opposition's argument, that hackers have a unique skillset that other IT professionals lack. Due in part to this skillset and advanced knowledge, hackers will provide utility to companies who attempt to guard themselves from other hackers around the world (Stoll, 1990). However, I personally find it very difficult to delineate between those who will serve with virtue and those who simply want access to the world's information systems. Due primarily to this difficulty in ascertaining virtue, or lack thereof, I believe it better to simply not allow this individuals to hold positions of power in regards to our information systems.
The risks are simply too great. This is especially true in regards to vital aspects of society that rely heavily on information technology to prosper. Banking, for instance, with the advent of mobile banking, online transactions, and ATMs, rely heavily on information systems. To place an experienced hacker in charge of the banking systems protection places millions of individual accounts at risk. The same can be said about any information system that utilizes personal account information in which to identify an individual. Social security numbers, credit card accounts and much more, all can used to harm society if placed in the wrong hands (McClure, 2009).

I am aware of societal implications of hiring hackers to protect information systems. Many…

Sources used in this document:
References

1) Bill Apro & Graeme Hammond (2005). Hackers: The Hunt for Australia's Most Infamous Computer Cracker. Five Mile Press. ISBN 1-74124-722-5.

2) Stuart McClure, Joel Scambray & George Kurtz (1999). Hacking Exposed. Mcgraw-Hill. ISBN 0-07-212127-0.

3) Michael Gregg (2006). Certfied Ethical Hacker. Pearson. ISBN 978-0-7897-3531-7.

4) Clifford Stoll (1990). The Cuckoo's Egg. The Bodley Head Ltd. ISBN 0-370-31433-6.
Cite this Document:
Copy Bibliography Citation

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now