Preview

How Has Computer Hacking Interfered Modern Society?

Better Essays
Open Document
Open Document
1291 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
How Has Computer Hacking Interfered Modern Society?
How Has Computer Hacking Interfered Modern Society? By Angel Passament

How has computer hacking inferred modern society? In this passage I will be talking briefly about the fundamentals of computer hacking from the past to the present. Computer hacking has changed more over time resulting in computer emergences to corporate system shutdowns. This research paper will be talking about three major parts of computer hacking. The first concept of hacking is the origin of creation. The next part will be how hacking has affect on the present-day society. Finally, the last piece of information will be going over the future of system hacking. What is
…show more content…

A few of the members transfer their curiosity and rigging skills to the new mainframe computing systems being studied and developed on campus. Hacking groups begin to form. Among the first are Legion of Doom in the United States, and Chaos Computer Club in Germany. The movie "War Games" introduces the public to hacking. A computer hacker intends to ruin businesses performing an act much more unprincipled than an enthusiastic biologist 'hacking' away at work or theory. The truth is that computer hacking is in fact easy in the general sense, but more consideration must be given. Some aspects of hacking are used in everyday life and you may not know that accessing wireless internet from another person's account is considered wireless hacking even though your borrowing there connection. During the 1970's, a different kind of hacker appeared: the phreaks or phone hackers. They learned ways to hack the telephonic system and make phone calls for free. Within these group of people, a phreaker became famous because a simple discovery. …show more content…

Hackers have different opinions and motivations. However, they all share the spirit of challenge and always trying to prove their capabilities of doing what all believe is impossible maybe because they were mistreated, or doubts surrounded their abilities and past achievements. Hackers believe that information should be shared and they fight against information owning. Effects that hacking caused and still causing to the society can’t be ignored. Hacking nowadays is taking new phases and the danger is increasing because we are now living in a society that runs by ICT, and any attack to the ICT especially in advanced countries will cause vital consequences. ICT still lacks a powerful security tools that are capable of tracking, catching hackers, and protecting computer systems from their attacks. My own view is that the best way to protect ICT from hackers is to study their psychology and try to understand their way of thinking, because hackers are human beings, who have two sides; evil and good, and they used to show their good side but suddenly they turned to be evil. The reasons which caused the transformation from good to evil individuals should be studied and given the highest priority in the war against hackers because since we put our

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Nt1310 Final Exam

    • 393 Words
    • 2 Pages

    The Motives Behind Hacking: Vandalism, Public Interest, Reveal Wrongdoing, Financial Gain, As a Protest, The Challenge (fun).…

    • 393 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Hacking is when a highly technical skilled individual or a group pass their way into a computer network or program without permission. This ends up in important data being stolen by the hacker which is illegal.…

    • 769 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Digital Evidence

    • 353 Words
    • 2 Pages

    Computer systems, which consists of hardware and software that process data and is likely to include the case containing circuit boards, microprocessors, hard drive, memory, and interface connections, the monitor, keyboard, and mouse. A cybercrime suspect with a computer anywhere in the world can attempt to take control or “hack” into networks. For example, a hacker attempted to take control of an offshore oil rig manned by an unmanned robot platform, controlled wirelessly by onshore personnel (Grant, 2009).…

    • 353 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    In the 1990’s, Kevin Mitnick, aka Condor, was the most-wanted hacker in America. He got his start at the early age of 12, using a workaround to the L.A. transit punch card system. Condor’s notoriety increased after gaining his first successful unauthorized access to a computer network in 1979. His actions give him the title of hacker as defined in the course textbook because he has intentionally entered computer systems to which he would otherwise not have access. After spending time on the run for his crimes and in prison, he is now one of the most sought-after consultants in the industry.…

    • 358 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Running head: THE GROWING THREAT OF COMPUTER CRIME The Growing Threat of Computer Crime Diana Ritter Baker College of Cadillac May 9, 2001 Abstract Computers have been used for most kinds of crime, including fraud, theft, larceny, embezzlement, burglary, sabotage, espionage, murder, and forgery, since the first cases were reported in 1958. One study of 1,500 computer crimes established that most of them were committed by trusted computer users within businesses; persons with the requisite skills, knowledge, access, and resources. With the arrival of personal computers to manipulate information and access computers by telephone, increasing numbers of crimes--electronic trespassing, copyrighted-information piracy, vandalism--have been committed by computer hobbyists, known as hackers, who display a high level of technical expertise. For many years, the term hacker defined someone who was a wizard with computers and programming. It was a challenge to all hackers, and an honor to be considered a hacker. But when a few hackers began to use their skills to break into private computer systems and steal money, or interfere with the system's operations, the word acquired its current negative meaning. With the growing use of computers and the increase in computer crimes, early detection, deterring computer crimes, and new laws regulating and punishing these computer crimes are necessary. Without it, chaos will be the end result. The Growing Threat of Computer Crime Do you think your company’s computer systems are secure? Think again. Billions of dollars in losses have already been discovered due to computer crimes. Billions more have gone undetected. Trillions more will be stolen, most without detection, by the emerging master criminal of the twenty first century --The computer crime offender. What’s worse yet is that anyone with a computer can become a computer criminal. Crimes such as embezzlement, fraud and money laundering are not new. However, each of these crimes now…

    • 3261 Words
    • 14 Pages
    Powerful Essays
  • Powerful Essays

    Certified Ethical Hacking

    • 97757 Words
    • 392 Pages

    Ethics and Legality Understand ethical hacking terminology Define the job role of an ethical hacker Understand the different phases involved in ethical hacking Identify different types of hacking technologies List the 5 stages of ethical hacking What is hacktivism? List different types of hacker classes Define the skills required to become an ethical hacker What is vulnerability research? Describe the ways of conducting ethical hacking Understand the legal implications of hacking Understand 18 U.S.C. § 1030 US Federal Law Footprinting Define the term footprinting Describe information gathering methodology Describe competitive intelligence Understand DNS enumeration Understand Whois, ARIN lookup Identify different types of DNS records Understand how traceroute is used in footprinting Understand how email tracking works Understand how web spiders work Scanning Define the terms port scanning, network scanning, and vulnerability scanning Understand the CEH scanning methodology Understand Ping Sweep techniques Understand nmap command switches Understand SYN, Stealth, XMAS, NULL, IDLE, and FIN scans List TCP communication flag types Understand war dialing techniques Understand banner grabbing and OF fingerprinting techniques Understand how proxy servers are used in launching an attack How do anonymizers work? Understand HTTP tunneling techniques Understand IP spoofing techniques…

    • 97757 Words
    • 392 Pages
    Powerful Essays
  • Good Essays

    Computer hacking is the act of modifying computer hardware or software, in order to cause damage to sensitive data on a computer or to simply steal confidential information. Computer hackers often target home and office computers that are connected to the Internet. The Internet is a gateway for a computer to connect to the world, which also makes it vulnerable to attacks from hackers from across the globe. What are the consequences of computer hacking? Let us find out.…

    • 376 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Internet Hacking

    • 2136 Words
    • 9 Pages

    Imagine this, anyone, anywhere has the ability to connect to almost every computer in the whole world without even leaving this own home. Most of these computers are connected to the Internet which is, with the Internet's growing popularity and widespread usage, one of the most susceptible targets to the continually growing hacking movement. The term hacker has caused much debate in regards to the actual meaning of it, but hacking by any definition is the art of thinking outside the box. In order to be a great hacker there is not necessarily a ton of technical computer knowledge that one must know, but more the less one must be creative and have an open mind and try to think outside of the box. Another big debate within the hacking movement is the argument that is there a difference between a hacker and a cracker. It is said to be that a hacker is one who uses their skill for the good of society and a cracker uses this same skill maliciously in the destruction of society. Be it a hacker or a cracker they still have the same rare skill but just choose to use it in different ways. The hacking culture does not have leaders, it is built strictly on reputation.…

    • 2136 Words
    • 9 Pages
    Good Essays
  • Powerful Essays

    Computer Hacking

    • 4083 Words
    • 17 Pages

    My field of study is Computer Information Security Networking; I chose this field because I enjoy working with computers and creating a safe environment in accessing data. One of the common problems in this field is hacking. Throughout my essay I plan on explaining what motivates hackers, what the definition of hacking is? What effects’ hacking has on society? And the solutions that could help people with hacking. The Oxford English Dictionary defines hacking as "cut or chop roughly; mangle: cut (one 's way)" to its present definition as "gain unauthorized access (to data in a computer)". Banks (1997:11) defines hacking as "something that boring mainframe computer operators did to improve performance and battle boredom." Here banks focus on boredom as the reason of hacking. A more technical definition of hacking according to Digital Guards data base (2001) is "unauthorized use, or attempts to circumvent or bypass the security mechanisms of an information system or network." Darlington (2001) believes hacking is not limited to accessing data or information but also includes an attack on the privacy of all people. Almost all different opinions agree on the illegality of hacking.…

    • 4083 Words
    • 17 Pages
    Powerful Essays
  • Powerful Essays

    Network Security Analysis

    • 5047 Words
    • 21 Pages

    The lure of wealth that hackers attack is no longer a kind of personal interest, but more and more become an organized, interest driven career crime. Its main means has: online professor viruses, Trojan horses production technology and various network attack technology; Online exchange, trafficking and rental viruses, Trojan horses, zombie network; Online customized viruses, Trojan horses; Internet theft behavior (account Numbers game, bank accounts, QQ number, etc.), sell the…

    • 5047 Words
    • 21 Pages
    Powerful Essays
  • Good Essays

    Computer hacking isn't something you here about everyday on the news. Really people don't have any knowledge about computer hacking. Everyday our identities go through about eight hundred computers a day. Every time we swipe a card, make a telephone call or connect to the internet our digital identities are recorded to keep track of who is doing what. Now the records are kept by different companies. The government also takes part in this game. These company computers are supposedly protected by anti-hacking programs. Well, unfortunately hacker can still get through. And when they get through your identity is up for grabs. This is what happening everyday and no one knows but the hacker and you. Until a hacker get control of a major corporate company, and then everybody in the world is talking about Enron's bank account being hacked into and sucked dry of all its money. Most people say hackers are greedy creatures that only want money. That is not always the case some hackers do it for fun, some do it for power, others do it because they don't won't to be ruled by the government. So, really and truly what are hacking programs? Where do they come from and what are the type's hackers?…

    • 794 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Hack

    • 1715 Words
    • 7 Pages

    The use of computers in everyday life is becoming more and more common, but how safe is it to use these computers? The problem is more and more people are wanting to gain access to your information for whatever reason, fun , revenge, or even just because they can. These people, called hackers, intend to make money off of you or your company. They have created hacks, that take advantage of flaws in computer systems to gain access to new information or increase their privileges on your computer. So how do we go about protecting our computers? By understanding who is behind these threats, how they get into our systems and cause problems, and lastly what you can do to help stop these threats.…

    • 1715 Words
    • 7 Pages
    Better Essays
  • Powerful Essays

    Hacking

    • 3915 Words
    • 20 Pages

    The first bona fide appearance of a computer hacker occurs nearly 100 years later, in the…

    • 3915 Words
    • 20 Pages
    Powerful Essays
  • Powerful Essays

    Nn Fir Nn

    • 3883 Words
    • 16 Pages

    References: Audit Commission (1994), Opportunity Makes a Thief – an Analysis of Computer Abuse, HMSO Publications Centre, London. Collier, P.A. and Spaul, B.J. (1992), “The Woolwich Centre for Computer Crime Research: addressing the need for UK information,” Computer Fraud & Security Bulletin, August, pp. 8-12. Culf, A. (1996), “BBC acts to thwart political hackers,” The Guardian, February 9, p. 1. Evans, D. (1994), “BA in dock over hacking,” Computer Weekly, April 28, p. 6.…

    • 3883 Words
    • 16 Pages
    Powerful Essays
  • Powerful Essays

    Computer Crimes

    • 4386 Words
    • 15 Pages

    M. E. Kabay, PhD, CISSP-ISSMP (2008). A Brief History of Computer Crime: An Introduction for Students.…

    • 4386 Words
    • 15 Pages
    Powerful Essays

Related Topics