November 16th, 2012
Professor Riede
English 1101
The Risks and Dangers of Computer Hacking
Computer hackers become more intelligent every day. Companies attempt to make technology hacker-free, which is not plausible. All this does is provide the hacker with more assentive to figure out how to get around it. The growth of technology causes new threats and new problems. The consequences hackers face can be extremely severe, or minimal if lucky. Many “elite” hackers get off with minimum consequences such as probation. Sometimes, on rare occasions, if the hacker is skilled enough, the FBI will drop their sentence as long as they agree to work undercover for them. Hackers thrive for a challenge; many of them hack just to see if they can actually achieve it. In today’s society, people are becoming more and more reliant on technology, causing the hacker industry to rise. Despite “professional” opinions, every piece of technology has a weak point.
Computer hacking in many individuals start at an early age and seems like innocent fun. As the hacker gets older, they realize it has turned from a little fun into a horrible addiction. A computer hacker is defined as “a person who enjoys exploring the details of programmable systems and how to stretch their capabilities, as opposed to most users, who prefer to learn the minimum necessary” (Stone, 1999). To a hacker, the internet is a playing field.
Computer hacking is a game to which it is their mind against the system. The internet is their tool to gain access to passwords, files, programs, and other valuable information. In addition, all hackers are linked in some way even if they never meet face to face. Hackers tend to cooperate to take down websites, companies, etc. which makes them harder to track.
Today’s society believes that every hacker is a “bad” hacker. The media has distorted the word “hacker,” to assume that all hackers want to steal data, deface websites, and exploit important
Cited: "Computer Hackers." World of Forensic Science. 2005. Encyclopedia.com. 10 Apr. 2012 <http:// www.encyclopedia.com>. Conway, Richard, and Julian Cordingley. CODE HACKING: A Developer 's Guide to Network Security. Ed. James Walsh. Massachusetts: Charles River Media, INC, 2004. Print. Cybercrime: Piercing the darkness Erickson, Jon. Hacking : The Art of Exploitation. San Francisco, CA, USA: No Starch Press, Incorporated, 2003. Web. Judson, K Knittel, J., & Soto, M. (2000). The dangers of computer hacking. New York, NY: The Rosen Publishing Group, Inc. McFly, M. (2011, January 17). The dangerous evolution of the script kiddie. Retrieved from http://backtosecurity.com/the-dangerous-evolution-of-the-script-kiddie/ Raymond, E. (2001). How to become a hacker. Retrieved from http://www.catb.org/~esr/faqs/ hacker-howto.html Stone, D. (1999, March 07). Computer hacking. Retrieved April 10, 2012 from http:// www.ed.uiuc.edu/wp/crime/hacking.htm The top ten famous hackers of all time. (1996). Retrieved from http://www.itsecurity.com/ features/top-10-famous-hackers-042407/