Preview

Nt1310 Final Exam

Satisfactory Essays
Open Document
Open Document
393 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Nt1310 Final Exam
Chapter II
Test I
Identification

1. It is the act of bypassing ones account or database and hacking involves stealing of identity and use it in his/her own interest.
Answer: Computer Hacking

2. Who is the computer ethicist that defines computer hacker as an individual working with computers who was technically gifted and skilled?
Answer: Duncan Langford

3. It is considered as an act of trespassing, it is an unauthorized viewing of someone’s computer private or confidential documents.
Answer: Computer Hacking/Hacking

4. It is a program in which malicious or harmful code is disguised inside some apparently harmless programming or data.
Answer: Trojan Horse/s

5. This is a standalone malware computer program that replicates itself in order
…show more content…
Give the four destructive or malicious computer programs.

Answer: Trojan Horses, Worms, Time or Logic Bombs, and Denial-of-service

12-17. Enumerate the motives behind computer hacking.

Answer: Vandalism, Public Interest, Reveal Wrongdoing, Financial Gain, As a Protest, and The Challenge (fun).

Test III

Definition

18-20. Define Computer Hacking.

Answer: Computer Hacking it is the act of bypassing ones account or database and hacking involves stealing of identity and use it in his/her own interest.

PREPARED BY: GROUP II

Chapter II
SUMMARY:
Computer Hacking – it is the act of bypassing ones account or database and hacking involves stealing of identity and use it in his/her own interest.
Computer Hacking in 1960’s up to 1970’s – an individual working with computers who were technically gifted and skilled it was defined by computer ethicist Duncan Langford (1995).
Forester and Morrison Hacker Terms
The Motives Behind Hacking: Vandalism, Public Interest, Reveal Wrongdoing, Financial Gain, As a Protest, The Challenge (fun).
Destructive or Malicious Programs: Trojan Horses, Worms, Time or Logic Bombs, and Denial-of-service.
Hacker Ethics
Hacker As Public Watchdogs
Hacker As Security

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Hacking: Hacking is using a modified minecraft version that gives you an extreme advantage over other players in the server. The punishment for hacking is a 48h tempban tell the proof is reviewed by other staff members then is changed to a permanent ban.…

    • 238 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Hacking is when a highly technical skilled individual or a group pass their way into a computer network or program without permission. This ends up in important data being stolen by the hacker which is illegal.…

    • 769 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Kingpin Ananlytical Essay

    • 377 Words
    • 2 Pages

    Introduction: Below I will present an argument that that shows the computer hacking by Max Butler, the main character, demonstrated in the book Kingpin by Kevin Poulsen, was unethical in nature. Max’s actions illustrate computer crime defined as, “any incident involving an intentional act where a victim suffered or could have suffered a loss, and a perpetrator made or could have made a gain and is associated with computers” (Parker, 1976). Max utilized his hacking skills in a malicious manner to victimize individuals by taking their personal property.…

    • 377 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Crt 205 Final Project

    • 2361 Words
    • 10 Pages

    | |author. If none exist, explain how you |However, hacking is a process use be Information Technology (IT) |…

    • 2361 Words
    • 10 Pages
    Satisfactory Essays
  • Good Essays

    Anyone who knowingly hacks into a computer with intent to steal information is going against this act. Anyone who misuses the computer in this way is going against the law as they are using it for criminal acts.…

    • 1633 Words
    • 7 Pages
    Good Essays
  • Satisfactory Essays

    Tim J. Watts goes more into the dark side of the “hacker” community by bringing up the constant back in forth between computer security officers and the so called hackers. This article, being written this year is able to reflect on the events of September 11, 2001 and new homeland security measures. He represents this viewpoint of a dangerous hacker in his definition: “While some hackers are harmless, others break into systems with the intent to steal information or to do destruction to the system. Hackers performing the latter pose a serious threat to the economic future of the United States” (Watts). Tim Watt outright blames the hacker community of accessing information that should be private. Only looking and reflecting on the serious threat…

    • 154 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Computer Memory Hacking

    • 820 Words
    • 2 Pages

    unauthorized access) has shown that the security of the computer system can be penetrated. This…

    • 820 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Final Exam Paper

    • 491 Words
    • 2 Pages

    ____ are hackers of limited skill who use expertly written software to attack a system…

    • 491 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Hacker: An individual who enjoys breaking systems or software without causing harm, presumably with the intent to better understand and improve security.…

    • 413 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Cybercrime is defined as a crime in which a computer is the object of a crime or is used as a tool to carry out a crime. Cybercriminals may use computer technology to access personal information, business trade secrets, or use the Internet for exploitive or malicious purposes. Offenders who perform these unlawful actions are often referred to as hackers (Janssen, 2010). There are several different types of cybercrimes, however four of the most common cybercrimes are: cyber fraud, cyber theft, stalking, and hacking.…

    • 853 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Computer Misuse Act

    • 277 Words
    • 2 Pages

    This act covers hacking which is when someone illegally gains access to a computer with someone else's username or password which you do not have permission to use being unauthorised access, modify files or data without the consent of the creator, or commit illegal acts such as fraud while using the stolen username or password.…

    • 277 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    How has computer hacking inferred modern society? In this passage I will be talking briefly about the fundamentals of computer hacking from the past to the present. Computer hacking has changed more over time resulting in computer emergences to corporate system shutdowns. This research paper will be talking about three major parts of computer hacking. The first concept of hacking is the origin of creation. The next part will be how hacking has affect on the present-day society. Finally, the last piece of information will be going over the future of system hacking.…

    • 1291 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    IT security

    • 43660 Words
    • 366 Pages

    Ethical H acking a n d C o u n te rm e a s u re s…

    • 43660 Words
    • 366 Pages
    Satisfactory Essays
  • Good Essays

    Facebook Hacking

    • 686 Words
    • 3 Pages

    Facebook is an ideal source of information of hackers. In this analysis and expose ' of Facebook…

    • 686 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Hacking

    • 10303 Words
    • 42 Pages

    We are approaching for me as an IT Student I’m assume for my technical works and ideology about hacking, hacking is prevent and studies in programming, troubleshooting and etc.…

    • 10303 Words
    • 42 Pages
    Powerful Essays