Preview

Hacker

Better Essays
Open Document
Open Document
1123 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Hacker
Many people believe that a hacker is not a dangerous person and is not causing harm. What do you think? (1000 words)

The advancement of information technology spans a lot of areas of our lives. Information technology has made a huge difference in industry, agriculture and services. This in turn boosts up the productivity of the society. However, the development of computer technology also leads to many security problems in our modern society. There has emerged a group of computer savvy people who seeks and exploits weaknesses in a computer system or computer network. Their motivation has put many questions on debating table. On the one hand, many people contend that a hacker is a dangerous person who will probably destroy the whole world’s computer system. On the other hand, others argue that hackers are not dangerous and not causing harm. This essay will discuss the two sides of the coin with regard to hackers with relevant examples.

First of all, the definition of hacking and hackers need to be clearly understood so as to have an insight into hacking. Hacking can be defined as any kind of computer crimes. Pirating is the most popular form of hacking, which relates to the stealing information from written software programmes. In the computer security context, hackers are people who try to find the weaknesses of the computer network and exploit the information from software. Hackers may be encouraged by a variety of reasons, for instance profits, protests, or challenges. Hackers can be categorised into the three types, which are black hats, grey hats, and white hats. Black hat group or cracker is expertise in carrying out the harmful to the computer system. A grey hat is a hacking group that will not violate the law and help the government to defend the system. However, grey hat will apply the same methods to revert to black hat approaches. The white hat hacker has their own abilities and professional computing skills to protect the malicious threads and



References: * Eric C.,(2012). 7 Levels of Hackers: Applying An Ancient Chinese Lesson: Know Your Enemies", pp558-600. * Moore,R., (2005). Matthew Bender & Company Cybercrime: Investigating High Technology Computer Crime, p258. * Markoff, J., (2005). At Microsoft, Interlopers Sound Off on Security: New York Times. Viewed June 26, 2013. * Tim Jordan, Paul A. Taylor (2004). Wild West imagery has permeated discussions of cybercultures:Hacktivism and Cyberwars. Routledge,pp. 133–134.

You May Also Find These Documents Helpful

  • Good Essays

    As I read an article written by Mr. Mathew J. Schwartz, dated March 12. 2012, for InformationWeek via darkreading.com, and ponder the strength of the subject matter discussed, I asked myself the question when does attack prevention begin? The question does present an abstract yet requires that careful thought be exercised when approaching information security breaches, and how to prevent attacks; a technological melancholy with very expensive associations.…

    • 639 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Nt1310 Final Exam

    • 393 Words
    • 2 Pages

    Computer Hacking in 1960’s up to 1970’s – an individual working with computers who were technically gifted and skilled it was defined by computer ethicist Duncan Langford (1995).…

    • 393 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    From this book I take back lot of things related to computers, networks, the government, information security and its importance, and how to handle things under pressure and stress. There are many characters who teach us how to look at situations which actually shows us a way to solve the problem.…

    • 1586 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    Tim J. Watts goes more into the dark side of the “hacker” community by bringing up the constant back in forth between computer security officers and the so called hackers. This article, being written this year is able to reflect on the events of September 11, 2001 and new homeland security measures. He represents this viewpoint of a dangerous hacker in his definition: “While some hackers are harmless, others break into systems with the intent to steal information or to do destruction to the system. Hackers performing the latter pose a serious threat to the economic future of the United States” (Watts). Tim Watt outright blames the hacker community of accessing information that should be private. Only looking and reflecting on the serious threat…

    • 154 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Final Exam Paper

    • 491 Words
    • 2 Pages

    ____ are hackers of limited skill who use expertly written software to attack a system…

    • 491 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Kevin Mitnick

    • 1277 Words
    • 6 Pages

    The word hacker in today’s society has many meaning, but the definition that I will be talking about in this paper is best described by dictionary.com as, “One who uses programming skills to gain illegal access to a computer network or file.”[1] According to wikipedia.com there are three different types of hackers, white hat hackers, grey hat hackers and black hat hackers. A white hat hackers is, “. . .a person who is ethically opposed to the abuse of computer systems. Realizing that the Internet now represents human voices from all around the world makes the defense of its integrity an important pastime for many.”[2] A grey hat hacker is, “. . .a skilled hacker who sometimes acts legally and in good will and sometimes not. They are a hybrid between white and black hat hackers. They hack for no personal gain and do not have malicious intentions, but occasionally may or may not commit crimes in their actions.”[3] And lastly a black hat hacker is, “a malicious or criminal person whose correct label is "cracker". . .Usually a Black Hat refers to a person that maintains knowledge of the vulnerabilities and exploits they find as secret for private advantage, not revealing them either to the general public or manufacturer for correction.”[4]…

    • 1277 Words
    • 6 Pages
    Better Essays
  • Good Essays

    We live in the time of the World Wide Web and it brings the biggest changes ever. The effects from this powerful invention, the Internet, has made the world flat and the opportunities huge. Every big change can have an affect on people, it could be positive or negative. In early 2002, researchers evaluated the presence and role of hackers and their role in technological innovations. “A decade ago, people in the tech field were angry that hackers had been labeled the dangerous villains who threatened national security” (Nissenbaum, 2015). This negative association contrasts with the beginning days of the 1970’s when hackers “were seen as ardent if quirky programmers, capable of near-miraculous,…

    • 1234 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    A hacker is someone who seeks and exploits weaknesses in a computer system or computer network. Hackers may be motivated by a multitude of reasons, such as profit, protest, or challenge. The subculture that has evolved around hackers is often referred to as the computer underground and is now a known community.…

    • 4036 Words
    • 17 Pages
    Powerful Essays
  • Satisfactory Essays

    The concept of hacking was introduced in the 1950s and 1960s by M.I.T. engineers and was referred to as constructive, clever technical work (Mitchell, B., 2012). At that time, hacking was intended for learning activities and technical experiments, not necessarily related to computer systems. Those outside of M.I.T., began using their hacking skills for less honorable activities such as modifying telephone lines to make free, illegal, long-distance telephone calls. As the use of computers and the Internet became more popular, data networks became the most common target of hackers and hacking. Hacking is now associated with…

    • 360 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Internet Hacking

    • 2136 Words
    • 9 Pages

    Imagine this, anyone, anywhere has the ability to connect to almost every computer in the whole world without even leaving this own home. Most of these computers are connected to the Internet which is, with the Internet's growing popularity and widespread usage, one of the most susceptible targets to the continually growing hacking movement. The term hacker has caused much debate in regards to the actual meaning of it, but hacking by any definition is the art of thinking outside the box. In order to be a great hacker there is not necessarily a ton of technical computer knowledge that one must know, but more the less one must be creative and have an open mind and try to think outside of the box. Another big debate within the hacking movement is the argument that is there a difference between a hacker and a cracker. It is said to be that a hacker is one who uses their skill for the good of society and a cracker uses this same skill maliciously in the destruction of society. Be it a hacker or a cracker they still have the same rare skill but just choose to use it in different ways. The hacking culture does not have leaders, it is built strictly on reputation.…

    • 2136 Words
    • 9 Pages
    Good Essays
  • Powerful Essays

    This paper is prepared for Cyberspace Crime, CCST 9029, taught by Professor Dr. K. P. Chow and tutored by Raymond Chan.…

    • 1710 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    irish republican army

    • 1205 Words
    • 5 Pages

    President Obama once declared that Cyber attacks comprise one of the most severe economic and national security challenges that the nation is faced with . Hacktivism has heightened political conscience. People are reliant on computers and electronic operating systems to an extent that these attacks open up the risk to the public. Hacktivism has the possibility to have a positive or negative force on society.…

    • 1205 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    negative aspects

    • 254 Words
    • 2 Pages

    a. What is the term given to the act of downloading software illegally from the Internet or copying software without permission?…

    • 254 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Cyber Terrorism

    • 821 Words
    • 4 Pages

    As the main stakeholders in cyber terrorism, have played an important role whereby in a positive way they help in analyzing and providing consulting services to the experts to identify loopholes in a system by understanding the coding and protocols in cyberspace. Negatively, through selfish motives some hackers play the role of attacking the systems and gaining access to authorized information using either viruses or sperm software.…

    • 821 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Digital

    • 1898 Words
    • 8 Pages

    The modern world of technology could not have come about without the development of the computer. Different types and sizes of computers find use throughout society in the storage and handling of data, from secret government files to private household accounts. Computers have opened up a new era in manufacturing through the techniques of automation, and they have enhanced modern communication systems. They are essential tools in almost every field of research and applied technology, from constructing models of the universe to producing tomorrow's weather reports, and their use has opened up new areas of conjecture. Database services and computer networks make a great variety of information sources available. The same advanced techniques also make invasions of privacy and of restricted information sources possible, but computer crime has become one of the many risks that society must face to enjoy the benefits of modern technology.…

    • 1898 Words
    • 8 Pages
    Powerful Essays