Preview

Hacking, Piracy and Virus Creation

Good Essays
Open Document
Open Document
950 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Hacking, Piracy and Virus Creation
Hacking, Piracy and Virus Creation

“In this era of computer advancements and technological breakthroughs Hackers, Computer Pirates and Virus Creators while there actions are similar there motives can differ, Shamus Ford reports.”

In today’s society computer crimes such as Hacking, Computer Piracy and Virus Creation are on the rise. The internet is the most common place computer crimes occur with 77% of attacks occurring via the internet while 33% from an internal system. There are a variety of motives for computer crimes. Research conducted by the Computer Crime Research Center on march 10th 2004 http://www.crime-research.org/news/10.03.2004/126/ states that the main goals and motives of computer criminals are as follows: profit - 57.3%, hooligan motives - 18.3%, revenge - 9.2%, commercial espionage or sabotage 10.6%.

Hacking is the most commonly known computer crime; however people refer to hacking as committing any criminal act using a computer while this is not the case. Hacking is equivalent to breaking and entering however instead of breaking into a house you break some ones computer security and entering is equivalent to accessing someone’s computer files, once in, they steel you files and use them for personal befit. While it is not a prerequisite most hackers are also virus creators. There are two main kinds of hackers black hat and white hat hackers, black hat hackers are the ones who are there for malicious purposes such as steeling/storing or vandalising data. While white hat hackers are legally intrudes who are hired by administrators to test there system for security flaws. There are also many other variants such as gray hat hackers which is between black hat and white hat hackers.

Piracy or more commonly referred to as software piracy is any act that involves the unauthorized copying of computer software. While many people know that copying software is illegal some ignore this and proceeded with duplicating it anyway. The Image Below



Bibliography: BSA and IDC, Piracy Impact Study: the economic Benefits of reducing software piracy, www.bsa.org/piracyimpact, 4/11/2010 BSA, Software Piracy on the Internet: A Threat To Your Security, www.bsa.org, 4/11/2010 BSA and IDC, Seventh Annual BSA/IDC Global software 09 Piracy Study, www.bsa.org, 4/11/2010 http://www.computerhope.com/vlist.htmhttp://www.computerhope.com/vlist.htm, 8/11/2010 http://ecommerce.hostip.info, 26/10/2010 http://www.thocp.net/reference/hacking/hacking.htm, 27/10/2010 http://www.crime-research.org/news/10.03.2004/126/, 27/10/2010 http://www.brighthub.com/internet/security-privacy/articles/8647.aspx, 27/10/2010

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Nt1310 Final Exam

    • 393 Words
    • 2 Pages

    Computer Hacking – it is the act of bypassing ones account or database and hacking involves stealing of identity and use it in his/her own interest.…

    • 393 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    There has been an increase in global technology over the past few years. The increase in technology allows us to have access to many things from almost anywhere, such as the Internet. People can find information right at their fingertips faster and easier than ever before. However, with this increase in technology comes an increase in cybercrime.…

    • 780 Words
    • 3 Pages
    Better Essays
  • Powerful Essays

    1.1 Effective communication is very important as to be sure that no misunderstandings take place. You need to be clear in your communication whether it be spoken or written. We may need to double check what we are about to say to ensure the other person can understand effectively. When communication breaks down it can lead to an unhappy environment and bad feelings. We need to ensure that we behave in a particular way so the other person can follow suit. For example, if you are polite, the other person will be too. Effective communication helps to develop professional relationships.…

    • 1423 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Ancient Mesopotamia and the Indus River Valley civilization were two incredibly productive and successful empires. While Mesopotamian politics were slightly less focused on religion and more on other aspects, the two societies shared many social characteristics. They both had defined social hierarchies, as well as similar views on gender roles. These traits are helpful in explaining the similarities and differences between the two cultures.…

    • 700 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Digital Crime

    • 5203 Words
    • 21 Pages

    Computers are used for many different types of personal and work related activities. Getting on the Internet and researching a topic for a college paper, researching types of flat screen televisions and their various prices, or what about getting on the computer and playing games, or using computers to watch movies and chat with friends and family. From a work standpoint, computers assist in processing orders, calculating and tracking numbers, manufacturing vehicles, sending email, and literally millions of other computer related activities. But, what if computers were used to copy Microsoft’s Office software applications and sell them at 60% cost on the black market? What if computers were used to login to accounts that weren’t the owners and take unauthorized data to sell for identify theft purposes? What if computers were used to hack into databases and “borrowed” data that then provided “insider information” that endowed an unprecedented stock gain for Members of the Board of Directors? These examples would mean that computers were being used for cyber-crimes. There are four primary categories of these types of cyber-crimes that will be the focus of this research paper.…

    • 5203 Words
    • 21 Pages
    Powerful Essays
  • Satisfactory Essays

    This case is taking software piracy under the light that explained at the end of the third chapter of the book International Business environments and operations by Daniels in the 11th edition. Software piracy is the mislicensing, unauthorized reproduction and illegal distribution of software, whether for business or personal use. When someone copies software without buying the appropriate number of licenses, it is copyright infringement. Individual copying software for a friend is a form of software piracy. Types of software piracy may include: end-user piracy, pre-installed software, Internet piracy, and counterfeiting, online auction piracy.…

    • 631 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Cybercrime: Hacking

    • 1198 Words
    • 4 Pages

    With everything in society advancing rapidly, it should be of no surprise that technology is now used to commit crimes against other people. Those crimes include identity theft, stealing money, illegal gambling, and cyberstalking. This paper will review cybercrime and the differences there are from traditional crime and it will review the purpose of hackers. There will also be three cases reviewed to help bring light to what kind of cybercrimes are being committed around the world.…

    • 1198 Words
    • 4 Pages
    Powerful Essays
  • Better Essays

    Hacker

    • 1123 Words
    • 5 Pages

    The advancement of information technology spans a lot of areas of our lives. Information technology has made a huge difference in industry, agriculture and services. This in turn boosts up the productivity of the society. However, the development of computer technology also leads to many security problems in our modern society. There has emerged a group of computer savvy people who seeks and exploits weaknesses in a computer system or computer network. Their motivation has put many questions on debating table. On the one hand, many people contend that a hacker is a dangerous person who will probably destroy the whole world’s computer system. On the other hand, others argue that hackers are not dangerous and not causing harm. This essay will discuss the two sides of the coin with regard to hackers with relevant examples.…

    • 1123 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Computer crimes are criminal activities, which involve the use of information technology to gain an illegal or an unauthorized access to a computer system with intent of damaging, deleting or altering computer data. Computer crimes also include the activities such as electronic frauds, misuse of devices, identity theft and data as well as system interference. Computer crimes involve activities of software theft, whereas the privacy of the users is hampered. These criminal activities involve the breach of human and information privacy, as also the theft and illegal alteration of system critical information. The different types of computer crimes have caused the introduction and use of newer and more effective security measures.…

    • 1193 Words
    • 5 Pages
    Better Essays
  • Better Essays

    How has computer hacking inferred modern society? In this passage I will be talking briefly about the fundamentals of computer hacking from the past to the present. Computer hacking has changed more over time resulting in computer emergences to corporate system shutdowns. This research paper will be talking about three major parts of computer hacking. The first concept of hacking is the origin of creation. The next part will be how hacking has affect on the present-day society. Finally, the last piece of information will be going over the future of system hacking.…

    • 1291 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    Piracy is the unauthorized use or reproduction of music, movies, books, and other types of content that are granted protection under copyright law. This kind of protection typically gives the owner of the content the exclusive right to perform certain actions on the content or to authorize others to do so. We recognize that determining whether an action is…

    • 2251 Words
    • 10 Pages
    Powerful Essays
  • Better Essays

    Temple, L. (2010). Piracy: It’s wrong, don’t do it (Pt 1). Retrieved on May 2, 2010…

    • 1054 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Illegal digital downloading is sometimes called piracy. It is the downloading of content from the internet, without permission from the copywriter/s, in addition to not paying for it. Undertaking this activity is what we call a copyright infringement.…

    • 1520 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    Home software now includes a wide variety of programs that enhance the users productivity and creativity. The industry is thriving and users stand to benefit along with the publishers. The SPA (Software Publishers Association) reports that the problem of software theft has grown, and threatens to prevent the development of new software products. Unauthorized duplication of software is known as software piracy which is a "Federal offense that affects everyone" ("Software Use..." Internet). The following research examines software piracy in its various forms, its impact on the end user and the international industry as a whole, and the progress that has been made in alleviating the problem.…

    • 3512 Words
    • 15 Pages
    Powerful Essays
  • Best Essays

    As its name suggests, “Internet Piracy” refers to manufacturing and distributing unauthorized copies, ie. “pirate copies”, on the Internet. (Panethiere, 2005) While the term “File Sharing” means to share a file with another person physically, such as storing and distributing a file in a CD, DVD, or a drive, or via uploading to the Internet to be downloaded. Since people can get various files distributed without any authorization from the internet for free via file sharing host, file sharing have been considered as an act of Internet Piracy (Van Eijk, 2011), especially by the creative industries, or sometimes “cultural industries”, industries that produce commercial entertainment, such as films, music records, publishing, and broadcasting, which is distinct from “arts”, including visual and performing arts,…

    • 1483 Words
    • 6 Pages
    Best Essays