Abstract
Society relies heavily on technology for many things, but our use of technology opens us up to become victims of cybercrimes, like computer hacking. Hackers can be divided into three main categories: novice, intermediate, and elite. Hacking has been in the information technology (IT) field for a while. The first hackers appeared in the nineteen sixties and hackers have continued to make progress since then. People hack for a variety of reasons including ego, fun, knowledge, and profit. The first major hacking program, SATAN, caused controversy in 1995, and numerous hacking programs exist today. The future of hacking looks bright because people will only continue to rely even heavier on technology and as the IT field expands, so will the hacking community.
The Past, Present and Future of Computer Hacking Our society is increasingly relying on the internet and computers in order to complete numerous tasks. People can grocery shop, earn degrees, receive bank statements and pay bills from their laptop or PC. The possibilities are endless when it comes to simplifying life with the help of the world wide web, but at the same time possibilities are endless hackers to complicate your life with cybercrimes. The Merriam-Webster Dictionary defines a hacker as both “an expert at programming and solving problems with a computer” and “a person who illegally gains access to and sometimes tampers with information in a computer system” (Merriam-Webster Inc.,1997, 337). These two definitions mirror the two sides of hacking – cracking and hacking – that exist in the cyber world. The term cracker was developed by hackers in 1985 in response to the misuse of the word hacker. A White Hat hacker is someone who breaks into systems in order to expose weaknesses while a Black Hat cracker is a criminal who breaks security on a system for illegal purposes (Schell & Martin 2004, 1). Hackers can be broken up into
References: Crume, J. (2000). Inside Internet Security: What Hackers Don’t Want You to Know. Great Britain: Pearson Education Limited. Lilley, P. (2002) Hacked, Attacked & Abused Digital Crime Exposed. London: Kogan Page Limited. Merriam-Webster, Inc. (1997). Merriam-Webster Dictionary. Massachusetts: Merriam-Webster. Schell, B.H., Martin, C. (2004). Cybercrime A Reference Handbook. California: ABC-CLIO, Inc.