Preview

Computer Hacking

Powerful Essays
Open Document
Open Document
4083 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Computer Hacking
English Composition II
Eng112-1002A-10
Final Project
Computer Hacking
May 7, 2010

Computer Hacking
My field of study is Computer Information Security Networking; I chose this field because I enjoy working with computers and creating a safe environment in accessing data. One of the common problems in this field is hacking. Throughout my essay I plan on explaining what motivates hackers, what the definition of hacking is? What effects’ hacking has on society? And the solutions that could help people with hacking. The Oxford English Dictionary defines hacking as "cut or chop roughly; mangle: cut (one 's way)" to its present definition as "gain unauthorized access (to data in a computer)". Banks (1997:11) defines hacking as "something that boring mainframe computer operators did to improve performance and battle boredom." Here banks focus on boredom as the reason of hacking. A more technical definition of hacking according to Digital Guards data base (2001) is "unauthorized use, or attempts to circumvent or bypass the security mechanisms of an information system or network." Darlington (2001) believes hacking is not limited to accessing data or information but also includes an attack on the privacy of all people. Almost all different opinions agree on the illegality of hacking. On the other hand the word hacker is the agent of hack or hacking and it was defined as a person who enjoys accessing files whether for fun, imposing power or the interest related to the accessed files or data according to Taylor (1999). While Marotta (in Taylor, 1993) has a negative view of the hacker as a data lord, a barbarian who takes what he wants. Himanen (2001) defines hacker as any person who performs illegal actions whether they were related to computer or not which means the usage of a device apart from its functionality. Seems hacking according to Himanen is related to any illegal or unauthorized action. Seebach (1999) finds hacker as a



Bibliography: 1. Banks, Michael A. (1997), Web psychos, stalkers, and pranksters: How to protect yourself online, Arizona (USA), The Coriolis group. 2 3. CNET (2001), FBI "hack" raises global security concerns [online]. Available from: http://news.com.com/FBI+%22hack%22+raises+global+security+concerns/2100-1001_3-256811.html [Accessed 14th December 2004]. 4 5. Darlington, Roger. (2001) Crime on the net [online], United Kingdom, Darlington, Roger. Available from: http://www.rogerdarlington.co.uk/crimeonthenet.html [Accessed 4th December 2004]. 6 7. Furnell, Steven. (2002), Cybercrime: Vandalizing the information society, Boston; London: Addison-Wesley. 8 9. Levy, S. (1984), Hacker: Heroes of the computer revolution, New York: Bantam Doubleday dell. Cited in: Taylor, Paul A. (1999), Hackers: Crime in the digital sublime, London, Routledge. 10 11. McClure, Stuart. Et al. (2003), Hacking exposed: Network security secrets & solutions, Fourth edition, Berkley, California (USA), McGraw-Hill/Osborne. 12 13. Ninemsn (2004), North Korea `has 600 computer hackers ' [online], [national Nine news]. [SCI Tech news]. Available from: http://news.ninemsn.com.au/article.aspx?id=19653 [Accessed 10th December 2004]. 14 15. Pipkin, Donald L. (1997), Halting the hacker: A practical guide to computer security, United States of America, Prentice Hall. 16 17. Seebach, Peter. (1999), Care and feeding of your hacker [online], Seebach, Peter. Available from: http://web.demigod.org/~zak/geek/hack.shtml [Accessed 6th December 2004]. 18 21. Sterling, Bruce. (2004), the hacker crackdown: (Law and disorder on the electronic frontier), McLean, Virginia (USA), Indypublish.com. 22 23. Thomas, Douglas and Loader, Brian D (eds.) (2000), Cybercrime: Law enforcement, security and surveillance in the information age, London: Routledge. 24

You May Also Find These Documents Helpful

  • Powerful Essays

    McClure, S., Scambray, J., & Kurtz, G. (2009). Hacking Exposed 6: Network Security Secrets & Solutions. New York, NY: McGraw-Hill.…

    • 2643 Words
    • 11 Pages
    Powerful Essays
  • Satisfactory Essays

    Nt1310 Final Exam

    • 393 Words
    • 2 Pages

    Computer Hacking in 1960’s up to 1970’s – an individual working with computers who were technically gifted and skilled it was defined by computer ethicist Duncan Langford (1995).…

    • 393 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Cmgt 400 Week 2

    • 1100 Words
    • 3 Pages

    Conklin, A., White, G., Williams, D., Davis, R., & Cothren, C. (2012). Principles of Computer Security: CompTIA Security+ and Beyond (Exam SY0-301) (3rd ed.). New York, NY: McGraw-Hill Company.…

    • 1100 Words
    • 3 Pages
    Better Essays
  • Satisfactory Essays

    Crt 205 Final Project

    • 2361 Words
    • 10 Pages

    | |author. If none exist, explain how you |However, hacking is a process use be Information Technology (IT) |…

    • 2361 Words
    • 10 Pages
    Satisfactory Essays
  • Better Essays

    References: Conklin, W. A., White, G., Williams, D., Davis, R., & Cothren, C. (2012). Principles of computer security: CompTIA Security+™ and beyond (3rd ed.). New York, NY: McGraw Hill.…

    • 1432 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Tim J. Watts goes more into the dark side of the “hacker” community by bringing up the constant back in forth between computer security officers and the so called hackers. This article, being written this year is able to reflect on the events of September 11, 2001 and new homeland security measures. He represents this viewpoint of a dangerous hacker in his definition: “While some hackers are harmless, others break into systems with the intent to steal information or to do destruction to the system. Hackers performing the latter pose a serious threat to the economic future of the United States” (Watts). Tim Watt outright blames the hacker community of accessing information that should be private. Only looking and reflecting on the serious threat…

    • 154 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    Stallings, W., & Brown, L. (2012) Computer security: Principles and practice (2nd ed.). Boston, MA: Pearson.…

    • 1167 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Computer Memory Hacking

    • 820 Words
    • 2 Pages

    Who Are Hackers ­ A Hacker 's Tools Of The Trade | Hackers | FRONTLINE | PBS. (n.d.).…

    • 820 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Kim, D., & Solomon, M. (2012). Fundamentals of information systems security. Sudbury, MA: Jones & Bartlett Learning.…

    • 1049 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Digital Crime

    • 5203 Words
    • 21 Pages

    Carter, David. (1995). Computer crime categories: how techno-criminals operate. The FBI Magazine, Retrieved from http://www2.fiu.edu/~cohne/Theory%20S09/Ch%2014%20-%20Types%20of%20computer%20crime.pdf…

    • 5203 Words
    • 21 Pages
    Powerful Essays
  • Good Essays

    Peter Krapp Analysis

    • 703 Words
    • 3 Pages

    Peter Krapp builds a well-constructed argument designed to persuade readers that computer hacking is a danger that steals our most valuable possession—personal information—from our most vulnerable people--students. The article focuses on personal information about college students stolen from college computer networks. The writer builds his argument brick by brick. He starts by giving an example of student data stolen from a college by hackers in China, relating his topic to an event that really happened. The writer quickly establishes himself as an expert in the topic so readers can trust his information. Krapp asks and answers questions about the theft of data, goes into more depth about the type of information stolen from college networks, and then briefly touches on the laws, or the lack of laws, to protect students. He points out that data is stolen from students by not only foreign hackers, but also by American companies. The writer finishes with a call for colleges to protect student data, clearly stating his purpose.…

    • 703 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Jaeger, C. (2006). Cyberterrorism and information security. In B. Hussein, Handbook of Information Security (Vol.…

    • 483 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Password Theft

    • 6445 Words
    • 26 Pages

    The authentication system (used during login) stores enciphered images of user passwords but not the actual passwords. This protects passwords from being divulged if an attacker happens to read the file.…

    • 6445 Words
    • 26 Pages
    Powerful Essays
  • Powerful Essays

    Hacktivism Ethics

    • 7214 Words
    • 29 Pages

    E. Spafford, "Are Computer Hacker Break-ins Ethical?," in Computers and Ethics in the Cyberage, D. M. Hester and P. J. Ford, Eds. Upper Saddle River, New Jersey: Prentice Hall, 2001, pp. 332-344.…

    • 7214 Words
    • 29 Pages
    Powerful Essays
  • Best Essays

    Corporate Espionage

    • 2258 Words
    • 10 Pages

    The integration of technology into business transactions has allowed many organizations to provide better service while using fewer resources, but has also allowed unscrupulous individuals and organizations with a potential method of accessing information illegitimately. The cyber-criminal is often perceived to be “a computer hacker, sitting alone in his room, spending hours attempting to identify passwords, breach firewalls, and…

    • 2258 Words
    • 10 Pages
    Best Essays