wst 111 - final essay pt 4

Upload: razorblademk2

Post on 02-Jun-2018

216 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/11/2019 WST 111 - Final Essay PT 4

    1/2

    Since the queer method or lens is more general than specific, we can apply it to a multitude of

    subjects such as computer science. More specifically we are going to view network security through a

    queer lens. he subject of network security refers to the study of protecting data, particularly from

    hackers or malicious users. Several people have wondered why we give potential hackers the tools

    to hack by letting the software be open sourced. !ut peering through our queer lens, we see that

    there are positive outcomes into letting the community have this software. "riginally, the term hacker

    was to denote people who found joy in understanding how computer systems and networks work or

    someone that work to debug or fi# security problems. $ believe that certain hackers are being

    oppressed and discriminated against because they are viewed as criminals that focus on malicious

    activities .%ow, people are worried that giving everyone the tools to hack will increase the amount of

    grey hat hackers &'rey hat refers to illegal or malicious hackers(. )es, there are stories all the time of

    young teens either robbing a bank using their hacking skills or using simple *%S spoofing to garner

    information. *%S spoofing refers to redirecting a victim to a different website than they originally

    intent to visit. his enables hackers to create fake email, bank account, and other fake websites which

    can be used to get their information. !ut, there are also numerous cases in which hackers found

    methods to get around attacks such as the *%S spoofing $ described earlier. hese hackers figured out

    that you could use end+to+end validation to prevent against these attacks. o put on a queer lens means

    to look at something at a different direction. ackers are treated as outcasts because their activities are

    often malicious. owever, in order to combat hackers, we need to understand their techniques. $f we

    never release the hacking software as open source code, then programmers will not be able to build

    adequate defenses against hacking.he hackers are given one label which gives people assumptions

    about them. $t is similar to the situation of certain homose#ual groups. -ust because a part of the group

    may act one way, it doesnt represent the entire population or community. $t is easy to judge hackers

    harshly, but if you look with a different point of you, one can see that they can help society as much as

    a small part of them can hurt society. $n a sense, the hackers move out of the charm circle. he

  • 8/11/2019 WST 111 - Final Essay PT 4

    2/2

    government started hiring these hackers which could show them as moving back into the inner circle.

    /t a first glace all hackers seem terrible, but with a different point of view we can see that they are

    being discriminated against.