Preview

The Dangerous of Computer Hacking

Better Essays
Open Document
Open Document
4210 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
The Dangerous of Computer Hacking
Christian Rupe 5/25/09 Research Essay: Final Draft
Professor Wilson

Hackers and Security Measures

A diverse group of people often referred to as “hackers” have been stereotyped as unethical, irresponsible, and a serious threat to society for their actions of breaching of computer systems in an undesirable manner. I will attempt to construct a picture of what a computer crime is, as well as a portrait of what a hacker is, their concerns, and how most hacking occurs. I will also cover the best security measures against undesirable hacking. It is my intent to argue that, most hackers are learners and explorers who want to help rather than cause harm. Additionally, my research will suggests that the general principle of hacking is part of larger conflicts in life that we are experiencing at every level of society and business in an information age in which many of us aren 't computer savvy. These conflicts lie on the issue of whether information should be made publicly available or not (whether we should centralize or decentralize government) and on issues of law enforcement. Hackers have recently raised serious issues about values and practices in an information society. When I first started researching hacking I knew next to nothing about the subject, I was not and am still not an expert on hacking, I was and still am an average person, much like yourself that knows the Internet is a dangerous place. My paper is merely a byproduct of the research that I followed to the most logical explanation of this pandemic. Computers and telecommunication networks have become a substantial aspect of our society and subsequently our lives. This type of technology can be used to carry out unlawful as well as legal activities. Personal computers and especially the Internet consist of a collection of tools, which attract people from all social classes. People like housewives, workers and chief executives. The Internet cuts all racial, social, gender, and religious

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Nt1310 Final Exam

    • 393 Words
    • 2 Pages

    The Motives Behind Hacking: Vandalism, Public Interest, Reveal Wrongdoing, Financial Gain, As a Protest, The Challenge (fun).…

    • 393 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Tim J. Watts goes more into the dark side of the “hacker” community by bringing up the constant back in forth between computer security officers and the so called hackers. This article, being written this year is able to reflect on the events of September 11, 2001 and new homeland security measures. He represents this viewpoint of a dangerous hacker in his definition: “While some hackers are harmless, others break into systems with the intent to steal information or to do destruction to the system. Hackers performing the latter pose a serious threat to the economic future of the United States” (Watts). Tim Watt outright blames the hacker community of accessing information that should be private. Only looking and reflecting on the serious threat…

    • 154 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    In presenting this project, in partial fulfillment of the requirements for graduate degree from the University of Central Arkansas, I agree that the Library of this University shall make it freely available for inspections. I further agree that permission for extensive copying for scholarly purposes may be granted by the professor who supervised my thesis work, or, in the professors absence, by the Chair of the Department or the Dean of the Graduate School. It is understood, that due recognition shall be given to me and to the University of Central Arkansas in any scholarly use which may be made of any material in my project.…

    • 5250 Words
    • 21 Pages
    Powerful Essays
  • Powerful Essays

    CSS350 IP5

    • 6832 Words
    • 19 Pages

    In today’s world it is an indisputable fact that computers and digital devices are a part of our everyday lives. As such they are a part of our society whether they are used for business or for personal reasons. There are many uses for computers. We can use them to track our finances, keep databases of information about our clients, and use them to save pictures and documents. Sometimes computers are used in the commission of a crime like hacking systems for credit card information or launching computer viruses against a target. Sometimes they are used to communicate with others about the details of a crime, plan a crime, or share illegal media like child pornography. Other times computers can be misused and lead to loss or theft of data resulting in system downtime or monetary losses for an organization.…

    • 6832 Words
    • 19 Pages
    Powerful Essays
  • Better Essays

    20142321 SIYIWANG TACC403

    • 2051 Words
    • 7 Pages

    4. K. Himma. (2004). The Ethics of Tracing Hacker Attacks Through the Machines of Innocent Persons. International Journal of Information Ethics. vol. 2, pp. (4), p1-13.…

    • 2051 Words
    • 7 Pages
    Better Essays
  • Powerful Essays

    Final English 122

    • 1481 Words
    • 6 Pages

    Protecting your personal information both on your personal computer and in other places such as your bank, or your job, has become more difficult with the massive growth of the internet and the expertise of some unsavory characters called hackers, crackers, and phreakers. Whatever they choose to call themselves, they are all thieves, plan and simple. Some people still question whether or not hacking should be illegal. It’s obvious that what hackers do is illegal. A personal computer is personal, and the information on it private. When a hacker invades that privacy, he is trespassing, and when they take your personal information, their committing a form of thievery. In addition to hackers, we now have marketers invading our privacy through the use of cookies.…

    • 1481 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    The article “Inside America’s Hacking Epidemic,” shows the destructive power and capability of cyberwarfare. Cyberwarfare has grown increasingly common over the years, and is one of the few areas where combat is on a level playing field. With the widespread use and access to internet, hackers and cases of hacking are continuing to grow at an alarming rate. Not only, but these hacks are usually targeted at important government facilities like the Pentagon, State Department, and the White House. Attacks substantial as this not only have the capability breach classified information, but they also carry a large risk of harming the infrastructure and national security.…

    • 445 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Manufacturing Audit Risk

    • 1585 Words
    • 7 Pages

    As Information Systems become more complex and business organizations become better prepared at protecting these systems so has the means in which attacks on these systems evolved. Many new issues have emerged and are changing the way in which or world views hackers and the chaos that these individuals can cause. The purpose of this section is to discuss some of the most visual and controversial of these issues. Finding solutions to avoid these attacks are what drives the need for security and security systems to constantly evolve and adapt to new threats and avoid being overrun and or shut down due to malicious actions of hackers who only wish…

    • 1585 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    Digital Crime

    • 5203 Words
    • 21 Pages

    Computers are used for many different types of personal and work related activities. Getting on the Internet and researching a topic for a college paper, researching types of flat screen televisions and their various prices, or what about getting on the computer and playing games, or using computers to watch movies and chat with friends and family. From a work standpoint, computers assist in processing orders, calculating and tracking numbers, manufacturing vehicles, sending email, and literally millions of other computer related activities. But, what if computers were used to copy Microsoft’s Office software applications and sell them at 60% cost on the black market? What if computers were used to login to accounts that weren’t the owners and take unauthorized data to sell for identify theft purposes? What if computers were used to hack into databases and “borrowed” data that then provided “insider information” that endowed an unprecedented stock gain for Members of the Board of Directors? These examples would mean that computers were being used for cyber-crimes. There are four primary categories of these types of cyber-crimes that will be the focus of this research paper.…

    • 5203 Words
    • 21 Pages
    Powerful Essays
  • Good Essays

    Peter Krapp Analysis

    • 703 Words
    • 3 Pages

    Peter Krapp builds a well-constructed argument designed to persuade readers that computer hacking is a danger that steals our most valuable possession—personal information—from our most vulnerable people--students. The article focuses on personal information about college students stolen from college computer networks. The writer builds his argument brick by brick. He starts by giving an example of student data stolen from a college by hackers in China, relating his topic to an event that really happened. The writer quickly establishes himself as an expert in the topic so readers can trust his information. Krapp asks and answers questions about the theft of data, goes into more depth about the type of information stolen from college networks, and then briefly touches on the laws, or the lack of laws, to protect students. He points out that data is stolen from students by not only foreign hackers, but also by American companies. The writer finishes with a call for colleges to protect student data, clearly stating his purpose.…

    • 703 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Computer Fraud Act Of 1984

    • 2247 Words
    • 9 Pages

    Due to the advance technology of the Internet, the government, private industry and the everyday computer user have fears of their data or private information being comprised by a criminal hacker. C.C. Palmer, who manages the Network Security and Cryptography department at the IBM. Thomas J. Watson Research Center writes, “They are afraid that some hacker will break into their Web server and replace their logo with pornography, read their e-mail, steal their credit card number from an on-line shopping site, or implant software that will secretly transmit their organization’s secrets to the open Internet”. This hacking is not only widespread, but is being executed so flawlessly that the attackers compromise a system, steal everything…

    • 2247 Words
    • 9 Pages
    Powerful Essays
  • Powerful Essays

    When we hear the word hacker we think of a person who has gained access to a system they do not have permission to access. “The first generation of hackers who emerged in the 1960s was individuals who would be called technology enthusiasts today. These early hackers would go on to create the foundation for technologies and the Internet such as the ARPANET” (Oriyano and Michael 2). They also initiated many early software development movements that led to what is known today as open source. Hacking was motivated by intellectual curiosity; causing damage or stealing information was against the rules for this small number of people. In the 1980s, hackers started gaining more of the negative connotations by which the public now identifies them. Movies such as War Games and media attention started altering the image of a hacker from a technology enthusiast to a computer criminal (“Hacking History”). During this time period, hackers engaged in activities such as theft of service by breaking into phone systems to make free phone calls. In many respects, the 1980s formed the basis for what a hacker is today. “Over the past two decades, the definition of what a hacker is has evolved dramatically from what was accepted in the 1980s and even the 1990s” (Oriyano and Michael 3). Hacker has become such a universal term. However, there are experience hackers who never break the law, and who define hacking as producing an outcome the system designer never anticipated. Some act with good intentions, others with bad intentions, and yet others with a mixture of both. No matter what the intentions were, the outcomes of their actions affected the world in some way. When popular organizations such as Microsoft and Apple were founded, they open a new and free attitude towards software development evolved (“Hacking History”). However the good came along with the bad. Some hackers were more interested in their own personal gain and strived to circumvent…

    • 2845 Words
    • 12 Pages
    Powerful Essays
  • Good Essays

    Cyber Ethics

    • 1006 Words
    • 5 Pages

    Menn continues to elaborate on this idea by highlighting the so-called purpose of a hacker’s actions, which is to help by making “software more secure” (Hinman, 463). In their minds hackers believe they are helping because they are pointing out software’s weaknesses such as loopholes that allow them easy access to private information. Menn describes this concept by describing hackers as “the sort of people who set aside the instruction manual and take a machine apart to see how it works” (463). This description eliminates the negative image one typically associates with hackers, and instead it portrays them as curious individuals who seek a deeper understanding of how things operate. I, for one, disagree with this position because hackers are invading private information whether it is from a corporation or an individual. It is clear that corporations and people do not want an outsider viewing their confidential information. Therefore, the act of finding ways to view this type of data is equal to that of intruding.…

    • 1006 Words
    • 5 Pages
    Good Essays
  • Good Essays

    The 21st century has been dubbed ”the digital age” because of the monumental achievements witnessed in the Information, Communication and Technology (ICT) fields, which have impacted every aspect of human life. The internet has become one of the most lucrative Information Technology (IT) tool which has made communication and exchange of information faster and efficient. Consequently, it has transformed how people consume information. In spite of its benefits, the internet has led to a severe decline in ethics among internet users (Salman, Saad & Ali, 2013). The widespread use of internet has led to increased and sophisticated crimes, terrorism and wars (May, 2004). This essay will be based on a case involving hackers who hold Personal Computers (PC) hostage. It will outline the potential computer ethics issues associated with holding computers hostage. It will also highlight methods that computer users could use to prevent this type of attack. Moreover, it will highlight governmental legislations that could be enacted against this type of attack.…

    • 1067 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Cyber Hacking

    • 250 Words
    • 1 Page

    Cyber hacking is an act of modifying computer hardware and software, in order to cause damage to other computer system. People who engage in computer activities are known as hackers. What are their purposes to do so?…

    • 250 Words
    • 1 Page
    Satisfactory Essays