Preview

Ethical Computer Hacking

Good Essays
Open Document
Open Document
1026 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Ethical Computer Hacking
Have you ever been a victim of a cyber crime? Something as simple as a weird pop up that won 't go away? Or maybe something a little bit more serious like your personal web page gets hi-jacked? All this "malicious" damage that causes you much grief isn 't so much the work of a hacker, per se, but more the work of a "cracker" or a "script kiddie". Now you 're confused right? Well let 's just say everyone who knows how manipulate a computer isn 't doing it on bad and evil terms, like writing a virus to deploy on a certain date to permanently delete certain file extensions. But maybe they 're the people sitting hours on end to deploy a fix for that certain virus someone else is writing, or safeguarding a local bank 's network to make sure that virus cannot access the banks database. Hacking can be ethical by providing the Internet world with a tightened sense of security by detecting and preventing security flaws before it is too late. There are a many types of hacks, and hackers in the cyber world. A hack can be any modification done to virtually anything, to make it do something better, or something completely different. Many hackers are hackers of electronic equipment, mostly computers, but even cell phones, routers, iPods, digital cameras, and even the Toyota Prius have been hacked to get better gas mileage with the hybrid-electric engine (Rupley). But besides modifying computers themselves or gadgets, hackers play a significant role in the networking world. The Internet is a large collection of interconnected networks in which share files with each other, and hackers have been deemed the one 's who steal, delete, or compromise these networks and files, which is not completely true. This type of crime is most likely the work of a script kiddie, or a "cracker", who is an inexperienced, unskilled "hacker" who attempts to infiltrate or disrupt computer systems by running pre-fabricated scripts designed to crack those systems (Script Kiddie). These are the


Cited: Kastor, Ginger. "Computer Hacking ." 2 Aug. 2002. 8 Mar. 2007 <http://lrs.ed.uiuc.edu/wp/crime-2002/hacking.htm>. Lo , Joseph. "Denial of Service or "Nuke" Attacks." 12 Mar 2005. 2 Apr 2007 <http://www.irchelp.org/irchelp/nuke/>. Palmer, C. C.. "Ethical Hacking." IBM. 13 Apr. 2001. IBM. 15 Mar 2007 <http://www.research.ibm.com/journal/sj/403/palmer.html>. (Script Kiddie. WordSpy. 07 Oct.1998. Paul McFedries and Logophilia Limited . 20 Mar. 2007 <http://www.wordspy.com/words/scriptkiddie.asp>.) "SearchSecurity." Ethical Hacker. 05 Jul. 2006. 15 Mar 2007 <http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci921117,00.html>. Rupley , Sebastian. "Hack Everything." PC Magazine 30 Aug. 2006 22 Mar. 2007 <http://www.pcmag.com/article2/0,1895,2010280,00.asp>. "The Year Hacking Became a Business." The Australian 30 Jan. 2007: 31. Newspaper Source. EbscoHost. Pittsburgh Technical Institute. 15 Mar. 2007 <http://search.ebscohost.com/login.aspx?direct=true&db=nfh&AN=200701301031832081&site=ehost-live>. "White Hat/Black Hat Hackers." CSO Online. The Resource for Security Executives. 22 Mar 2007 <http://www.csoonline.com/glossary/term.cfm?ID=1094>.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Nt1310 Final Exam

    • 393 Words
    • 2 Pages

    The Motives Behind Hacking: Vandalism, Public Interest, Reveal Wrongdoing, Financial Gain, As a Protest, The Challenge (fun).…

    • 393 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Nt1310 Unit 3 Essay

    • 1872 Words
    • 8 Pages

    There are cybercriminals who commit crimes using the computers and networks. They spread malicious viruses through the networks such as worms and Trojan horses. They hack other people's computers to steal important data and identity or destroy data. A hacker uses a packet sniffer to intercept the unencrypted network traffic and capture the passwords or other important information which was communicated through the network. Botnet or a Zombie computer is a computer which a hacker uses to spread viruses and to commit cybercrimes while the owner of the computer is unaware of it.…

    • 1872 Words
    • 8 Pages
    Better Essays
  • Good Essays

    Hacking is when a highly technical skilled individual or a group pass their way into a computer network or program without permission. This ends up in important data being stolen by the hacker which is illegal.…

    • 769 Words
    • 4 Pages
    Good Essays
  • Good Essays

    James Naismith

    • 287 Words
    • 2 Pages

    Being a high school basketball coach, and with the vision of being a college coach one day, I thought that it would be interesting to write about the founder of basketball.…

    • 287 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Tim J. Watts goes more into the dark side of the “hacker” community by bringing up the constant back in forth between computer security officers and the so called hackers. This article, being written this year is able to reflect on the events of September 11, 2001 and new homeland security measures. He represents this viewpoint of a dangerous hacker in his definition: “While some hackers are harmless, others break into systems with the intent to steal information or to do destruction to the system. Hackers performing the latter pose a serious threat to the economic future of the United States” (Watts). Tim Watt outright blames the hacker community of accessing information that should be private. Only looking and reflecting on the serious threat…

    • 154 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Computer Memory Hacking

    • 820 Words
    • 2 Pages

    Who Are Hackers ­ A Hacker 's Tools Of The Trade | Hackers | FRONTLINE | PBS. (n.d.).…

    • 820 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    ARTICLE SUMMARY

    • 1028 Words
    • 7 Pages

    Some hackers are skillful computer operators, but others are younger inexperienced people who experienced hackers refer to as ____.…

    • 1028 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Hacker: An individual who enjoys breaking systems or software without causing harm, presumably with the intent to better understand and improve security.…

    • 413 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Causes Of Identity Theft

    • 1108 Words
    • 5 Pages

    Hackers are people who hack into other people’s computers or electronic devices so they can take control over their things. A book titled Net Crimes and Misdemeanors written by J. A. Hitchcock takes us through many different aspects of how people take and control our things. She explains to us “When you’re connected to the internet, your computer is part of a worldwide network and anyone can try to connect to your system. The best way to describe it is by contrasting it to your television, a one-way communication mechanism” (Hitchcock 237). Hackers can reach any personal information located on an individual’s computer. Any accounts or credit card numbers in the system, they can get ahold of. We use many internet softwares today that can help prevent hackers, but not all the time. Hackers are extremely knowledgeable with computers and can find their way in. Hitchcock also gives us a little background information on when many viruses and softwares were introduced. She states, “…there was a good enough market for a security suite that included a personal firewall and antivirus capability. They were right. When NIS was introduced in December 1999, the U.S. retail market for internet security software grew more than 140 percent” (Hitchcock 236). Throughout the years, many software updates came out to help protect people and their information. The problem is that the more…

    • 1108 Words
    • 5 Pages
    Good Essays
  • Better Essays

    “I have a very strict gun control policy: if there's a gun around, I want to be in control of it (Eastwood). Statistics are proving that we need to prevent gun violence and get rid of all access to all guns. In this country, anybody can get a gun, statistics prove gun violence is increasing, we need to prevent gun violence. Banning guns completely will make America safe again. Every day, 306 people in America are shot in murders, assaults, suicides and suicide attempts, unintentional shootings, and police intervention. Every day, 90 people die from gun violence: 31 are murdered. 56 kill themselves (Key Gun Violence Statistics). Private gun ownership should be banned.…

    • 626 Words
    • 3 Pages
    Better Essays
  • Satisfactory Essays

    In the 1990’s, Kevin Mitnick, aka Condor, was the most-wanted hacker in America. He got his start at the early age of 12, using a workaround to the L.A. transit punch card system. Condor’s notoriety increased after gaining his first successful unauthorized access to a computer network in 1979. His actions give him the title of hacker as defined in the course textbook because he has intentionally entered computer systems to which he would otherwise not have access. After spending time on the run for his crimes and in prison, he is now one of the most sought-after consultants in the industry.…

    • 358 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    How has computer hacking inferred modern society? In this passage I will be talking briefly about the fundamentals of computer hacking from the past to the present. Computer hacking has changed more over time resulting in computer emergences to corporate system shutdowns. This research paper will be talking about three major parts of computer hacking. The first concept of hacking is the origin of creation. The next part will be how hacking has affect on the present-day society. Finally, the last piece of information will be going over the future of system hacking.…

    • 1291 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Computer Ethics

    • 897 Words
    • 4 Pages

    Another ethical problem with computers is hacking. Hacking is the computer equivalent of breaking and entering. A computer hacker uses his or her skills to gain unauthorized access to another computer or computer network and, once inside, can wreak havoc by altering important information, deleting essential files, or just crashing the whole system. Many hackers who break into commercial Web sites are looking for…

    • 897 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Stevens, T., & Jusko, J. (2001). Cyber-terrorists under attack. Industry Week/IW, 250(2), 11. Retrieved from EBSCOhost.…

    • 2860 Words
    • 12 Pages
    Powerful Essays
  • Powerful Essays

    Hactivism

    • 4539 Words
    • 19 Pages

    Hacktivism is the fusion of hacking and activism; politics and technology. More specifically, hacktivism is described as hacking for a political cause. In this context, the term hacker is used in reference to its original meaning. As defined in the New Hacker's Dictionary, a hacker is "a person who enjoys exploring the details of programmable systems and how to stretch their capabilities" and one who is capable of "creatively overcoming or circumventing limitations". (1) Activism is defined as "a policy of taking direct and militant action to achieve a political or social goal". (2) Therefore, a clinical definition of hacktivism is: Hacktivism: a policy of hacking, phreaking or creating technology to achieve a political or social goal.(3) However, both hacking and activism, and thus hacktivism, are loaded words ripe for a variety of interpretation. Therefore it is preferable not to clinically define hacktivism but rather to describe the spirit of hacktivism. Hacktivism is root. It is the use of one's collective or individual ingenuity to circumvent limitations, to hack clever solutions to complex problems using computer and Internet technology. Hacktivism is a continually evolving and open process; its tactics and methodology are not static. In this sense no one owns hacktivism - it has no prophet, no gospel and no canonized literature. Hacktivism is a rhizomic, open-source phenomenon. In the Beginning... Since hacktivism is a recombinant initiative comprised of two divergent communities (hackers and activists) it is necessary to understand their respective backgrounds in order to analyze this historic merger and to examine its challenges and future capabilities. "Hacker" was originally a term that encapsulated an individual's deep understanding of computer systems and networks and the ability to invent, modify, and refine such systems. It is a…

    • 4539 Words
    • 19 Pages
    Powerful Essays