Preview

Rogerain Essay on Computer Hacking

Good Essays
Open Document
Open Document
1042 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Rogerain Essay on Computer Hacking
Yadhu Khatri
Professor Wilson
ENGL 1301
23 June 2013
Computer Hacking: is it an acceptable? Computer hackers are always using new technologies in today’s world although it was started after the establishment of computer. While it is considered as an ethical, but study of internet checking trends, most hackers are motivated by profit when they attack computer network and files. Forty two percent of hackers were trying to steal sensitive information, such as personal records, which could be sold or exploited for profit. The hackers do not just crack down, they also put much pressure on software developments and internet based businesses to improve and their security procedures and make their product less vulnerable to hacking. It seems that hacking is a reasonable because it helps to developed the technology and stay people alert on security purpose. Hackers attack others computer remotely that are via by the internet. Hackers use wide varieties of methods to infiltrate computers that includes virus, malware, Trojan and worm. The Government Intervention against hacking says, white “hat” hackers mean who also break into networks without authorization, usually have more identical goals; for example, a white hat hacker might infiltrate a network in order to discover its security weakness, and then inform the networks operators of those weakness so they can be fixed. In same way, some other hackers believe and concern that hacking is improving computer systems and did not necessarily have malicious intent, indeed, the term “hack” initially had many positive connotations and was applied to variety of intellectual activities.
On the other hand, everyone would not probably believes that hacking has had given us some of the positive things to humans. In the same sense, hacking remains a particularly controversial and complex issue. Malicious hackers, called "black hats", break into computer networks in order to steal potentially valuable information (such as



Cited: "Update: Computer Hacking." Issues & Controversies. Facts On File News Services, 16 June 2011. Web. 23 June 2013. . "Key Events in the History of Computer Hacking (sidebar)." Issues & Controversies On File: n. pag. Issues & Controversies. Facts On File News Services, 6 June 2008. Web. 24 June 2013. . "Computer Hacking." Issues & Controversies On File: n. pag. Issues & Controversies. Facts On File News Services, 18 July 2005. Web. 24 June 2013.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Nt1310 Final Exam

    • 393 Words
    • 2 Pages

    Computer Hacking in 1960’s up to 1970’s – an individual working with computers who were technically gifted and skilled it was defined by computer ethicist Duncan Langford (1995).…

    • 393 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Spyware

    • 2042 Words
    • 9 Pages

    References: Hinde, Stephen. "Spyware: The Spy In The Computer." Computer Fraud & Security 2004.12 (2004): 15-16. Academic Search Premier. Web. 15 June 2013.…

    • 2042 Words
    • 9 Pages
    Better Essays
  • Satisfactory Essays

    Tim J. Watts goes more into the dark side of the “hacker” community by bringing up the constant back in forth between computer security officers and the so called hackers. This article, being written this year is able to reflect on the events of September 11, 2001 and new homeland security measures. He represents this viewpoint of a dangerous hacker in his definition: “While some hackers are harmless, others break into systems with the intent to steal information or to do destruction to the system. Hackers performing the latter pose a serious threat to the economic future of the United States” (Watts). Tim Watt outright blames the hacker community of accessing information that should be private. Only looking and reflecting on the serious threat…

    • 154 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    The rapidly evolving economy has led to companies being largely controlled by an IT infrastructure as it is an important part of business operations, and it bridges communication gaps well. Those corporations that pay no heed to the necessity of computer forensics in the modern age risk damage to digital resources and intellectual property. A singular breach into the system can lead to massive financial loss[1]; subsequently leading to bad publicity of the business and prolonged losses in the long run. The methods used by attackers to breach into networks are constantly advancing as a result of experts who are able to fend off attacks. This is a cause for concern for experts worldwide. It is important to bear in mind that threats can be both…

    • 217 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    References: Britz, Marjie T. (2003). Traditional Problems in Computer Investigations. Computer Forensics and Cyber Crime: An Introduction, 144. New Jersey: Pearson Education, Inc.…

    • 1568 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Digital Crime

    • 5203 Words
    • 21 Pages

    Podgor, Ellen. (n.d.). COMPUTER CRIME. encyclopedia of crime and justice entries. Retrieved (2010, May 6) from http://www.highbeam.com/doc/1G2-3403000048.html…

    • 5203 Words
    • 21 Pages
    Powerful Essays
  • Good Essays

    Peter Krapp Analysis

    • 703 Words
    • 3 Pages

    Peter Krapp builds a well-constructed argument designed to persuade readers that computer hacking is a danger that steals our most valuable possession—personal information—from our most vulnerable people--students. The article focuses on personal information about college students stolen from college computer networks. The writer builds his argument brick by brick. He starts by giving an example of student data stolen from a college by hackers in China, relating his topic to an event that really happened. The writer quickly establishes himself as an expert in the topic so readers can trust his information. Krapp asks and answers questions about the theft of data, goes into more depth about the type of information stolen from college networks, and then briefly touches on the laws, or the lack of laws, to protect students. He points out that data is stolen from students by not only foreign hackers, but also by American companies. The writer finishes with a call for colleges to protect student data, clearly stating his purpose.…

    • 703 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Gang Control Model

    • 599 Words
    • 3 Pages

    As a professor who is an expert on gangs and delinquent behavior, and tasked with the responsibility of addressing a growing gang problem, I would seek to develop a gang control model based upon the most effective practices. Four options are available to control organized criminal activity: suppression, social programs and education, as well as the option of taking no action at all. These options will be used to develop responses to particular scenarios that are presented in light of the growing gang problem. A rationale for the chosen action plan will be given so as to support the suggested gang control model.…

    • 599 Words
    • 3 Pages
    Good Essays
  • Best Essays

    McClure, S., Scambray, J., & Kurtz, G. (2009). Hacking exposed 6: Network security secrets & solutions. New York: McGraw-Hill.…

    • 4737 Words
    • 19 Pages
    Best Essays
  • Powerful Essays

    Computer Fraud Act Of 1984

    • 2247 Words
    • 9 Pages

    Due to the advance technology of the Internet, the government, private industry and the everyday computer user have fears of their data or private information being comprised by a criminal hacker. C.C. Palmer, who manages the Network Security and Cryptography department at the IBM. Thomas J. Watson Research Center writes, “They are afraid that some hacker will break into their Web server and replace their logo with pornography, read their e-mail, steal their credit card number from an on-line shopping site, or implant software that will secretly transmit their organization’s secrets to the open Internet”. This hacking is not only widespread, but is being executed so flawlessly that the attackers compromise a system, steal everything…

    • 2247 Words
    • 9 Pages
    Powerful Essays
  • Better Essays

    World Phone Hacking Scandal

    • 2502 Words
    • 11 Pages

    Small, M. (2011, November/December). The Lessons of the Hacking Scandal. Information World Review, 268, 14. Retrieved from Business Source Complete database. (72887448)…

    • 2502 Words
    • 11 Pages
    Better Essays
  • Better Essays

    Kevin Mitnick

    • 1277 Words
    • 6 Pages

    The word hacker in today’s society has many meaning, but the definition that I will be talking about in this paper is best described by dictionary.com as, “One who uses programming skills to gain illegal access to a computer network or file.”[1] According to wikipedia.com there are three different types of hackers, white hat hackers, grey hat hackers and black hat hackers. A white hat hackers is, “. . .a person who is ethically opposed to the abuse of computer systems. Realizing that the Internet now represents human voices from all around the world makes the defense of its integrity an important pastime for many.”[2] A grey hat hacker is, “. . .a skilled hacker who sometimes acts legally and in good will and sometimes not. They are a hybrid between white and black hat hackers. They hack for no personal gain and do not have malicious intentions, but occasionally may or may not commit crimes in their actions.”[3] And lastly a black hat hacker is, “a malicious or criminal person whose correct label is "cracker". . .Usually a Black Hat refers to a person that maintains knowledge of the vulnerabilities and exploits they find as secret for private advantage, not revealing them either to the general public or manufacturer for correction.”[4]…

    • 1277 Words
    • 6 Pages
    Better Essays
  • Better Essays

    Subramanian, R. (2008). Computer Security, Privacy, and Politics: Current Issues, Challenges, and Solutions. Hershey • New York: IRM Press.…

    • 1684 Words
    • 7 Pages
    Better Essays
  • Good Essays

    • The information in the following searches, and from Google hacking in general, has the possibility of being used for malicious purposes. This demonstration is delivered for illustrative purposes, not as a way of enabling illegal and/or harmful actions. However, it is our hope that this demonstration enables administrators to locate and resolve insecurities in their environments.…

    • 554 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Cyber Espionage

    • 3191 Words
    • 13 Pages

    Cyber espionage is the use of software tools to obtain secret or private information about another government or business competitor. According to a study by research firm SANS Institute, cyber espionage is ranked Number 3 on its Top Five Menaces for 2008. Hence cyber espionage is an increasing concern in today’s society. Over the past decade, globalization has led to an increase in espionage activities. As businesses become global and competition intensifies, the tendency to steal information to gain a competitive edge increases. Another explanation for a rise in espionage levels is the growth of computer technologies. Computers have shortened the time spent to steal data as individuals can download information and save it in a few seconds, as opposed to spending hours secretly duplicating documents. Computers are interconnected via the company’s network, which is linked to an internet, thus increasing the points of entry through which hackers can gain access to information. Besides making confidential information easier to steal, the computer has enhanced the theft. A group of Russian hackers who stole US$10 million from the Citibank computer network commented “A computer is a much better tool than a handgun… it would take us a long time to get $10 million with a handgun.” In the remaining sections of our report,…

    • 3191 Words
    • 13 Pages
    Powerful Essays