Preview

Effects of Computer Hacking

Good Essays
Open Document
Open Document
376 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Effects of Computer Hacking
Computer hacking is the act of modifying computer hardware or software, in order to cause damage to sensitive data on a computer or to simply steal confidential information. Computer hackers often target home and office computers that are connected to the Internet. The Internet is a gateway for a computer to connect to the world, which also makes it vulnerable to attacks from hackers from across the globe. What are the consequences of computer hacking? Let us find out.

Computer hacking is a breach of computer security. It can expose sensitive user data and risk user privacy. Hacking activities expose confidential user information like personal details, social security numbers, credit card numbers, bank account data and personal photographs. User information, in the hands of computer hackers, makes it vulnerable to illegitimate use and manipulation.

Hackers may even delete sensitive information on gaining access to it. Deletion or manipulation of sensitive data with intent to achieve personal gain is another effect of computer hacking. A user whose computer has been hacked is at the risk of losing all the data stored on his/her computer. Manipulation of sensitive user data is a grave consequence of hacking.

Identity theft is another important consequence of computer hacking. Identity theft is a fraud that involves pretension to be someone else, with intent to gain unauthorized access to information or property. It refers to an illegal use of someone else's identity for personal interest or gain.

The advances in technology have led to the evolution of key-logging software, which is capable of tracking and recording every key stroke by the user, thereby stealing passwords and account details. Another serious effect of computer hacking is the denial of service attack. The DOS attack, as it is called, refers to the attempt of making computer resources unavailable to authorized users. Often, websites fall prey to denial-of-service attacks, whereby they are

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Nt1310 Final Exam

    • 393 Words
    • 2 Pages

    Computer Hacking – it is the act of bypassing ones account or database and hacking involves stealing of identity and use it in his/her own interest.…

    • 393 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Hacking of random access memory (RAM) is a very basic idea. Hacking itself is defined as using a computer to gain unauthorized access to data within a system. Another way of defining hacking is the crashing a computer system. Following below is some information of how hacking RAM is useful as well as commonly used programs used by so-called ethical hackers.…

    • 838 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    Tim J. Watts goes more into the dark side of the “hacker” community by bringing up the constant back in forth between computer security officers and the so called hackers. This article, being written this year is able to reflect on the events of September 11, 2001 and new homeland security measures. He represents this viewpoint of a dangerous hacker in his definition: “While some hackers are harmless, others break into systems with the intent to steal information or to do destruction to the system. Hackers performing the latter pose a serious threat to the economic future of the United States” (Watts). Tim Watt outright blames the hacker community of accessing information that should be private. Only looking and reflecting on the serious threat…

    • 154 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Hacking is when a highly technical skilled individual or a group pass their way into a computer network or program without permission. This ends up in important data being stolen by the hacker which is illegal.…

    • 769 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Itc 101 Quiz

    • 2722 Words
    • 11 Pages

    An electronic storefront is a website on the Internet representing a single store. ( )…

    • 2722 Words
    • 11 Pages
    Good Essays
  • Good Essays

    Hacker: An individual who enjoys breaking systems or software without causing harm, presumably with the intent to better understand and improve security.…

    • 413 Words
    • 2 Pages
    Good Essays
  • Better Essays

    On March 10, 2012, thousands of people fell victim to having their social security numbers, birthdays, names, addresses, and even their medical diagnosis stolen by computer hackers. On April 2, 2012, the breach was realized and 780,000 people learned that their identities were stolen and would now need to monitor their credit. Computer and internet fraud is defined by the federal law as “the use of a computer to create a dishonest misrepresentation of fact as an attempt to induce another to do or refrain from doing something which causes loss” (www.law.cornell.edu).…

    • 1109 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Anthany Nilhas RN IU315

    • 533 Words
    • 2 Pages

    Hacking is activity by one who believes information sharing is a powerful positive good and it also is one who is programmed enthusiastically. Cracking is activity by someone who breaks security on a system. Crakers engage in vandalism, and theft once given access to a computer.…

    • 533 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    How has computer hacking inferred modern society? In this passage I will be talking briefly about the fundamentals of computer hacking from the past to the present. Computer hacking has changed more over time resulting in computer emergences to corporate system shutdowns. This research paper will be talking about three major parts of computer hacking. The first concept of hacking is the origin of creation. The next part will be how hacking has affect on the present-day society. Finally, the last piece of information will be going over the future of system hacking.…

    • 1291 Words
    • 6 Pages
    Better Essays
  • Better Essays

    Identity Theft Outline

    • 1438 Words
    • 6 Pages

    To accomplish this act, most thieves find a way in which they can compromise a computer, they can do this by creating spyware in some sites we want to download files or software, when we try to open email attachments or click on pop-ups when we visit devious websites. This spyware is able to quietly transmit one’s personal information, which can include: Credit card numbers, Bank account numbers, Social Security numbers, usernames and passwords, address books, including email addresses while connected to the…

    • 1438 Words
    • 6 Pages
    Better Essays
  • Better Essays

    Hacker

    • 1123 Words
    • 5 Pages

    The advancement of information technology spans a lot of areas of our lives. Information technology has made a huge difference in industry, agriculture and services. This in turn boosts up the productivity of the society. However, the development of computer technology also leads to many security problems in our modern society. There has emerged a group of computer savvy people who seeks and exploits weaknesses in a computer system or computer network. Their motivation has put many questions on debating table. On the one hand, many people contend that a hacker is a dangerous person who will probably destroy the whole world’s computer system. On the other hand, others argue that hackers are not dangerous and not causing harm. This essay will discuss the two sides of the coin with regard to hackers with relevant examples.…

    • 1123 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Identity Theft comes to mind when thinking about cyber or computer crimes. This crime includes hacking into your personal on-line accounts with the criminal intent to accrue financial gain via bank accounts and credit cards, as well as impersonation to open and max out new credit accounts in order to purchase everything from jewelry to travel to homes to cars. One such case is...are you kidding? That’s why I have Life-Lock.…

    • 819 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Computer crimes are criminal activities, which involve the use of information technology to gain an illegal or an unauthorized access to a computer system with intent of damaging, deleting or altering computer data. Computer crimes also include the activities such as electronic frauds, misuse of devices, identity theft and data as well as system interference. Computer crimes involve activities of software theft, whereas the privacy of the users is hampered. These criminal activities involve the breach of human and information privacy, as also the theft and illegal alteration of system critical information. The different types of computer crimes have caused the introduction and use of newer and more effective security measures.…

    • 1193 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Computer Ethics

    • 897 Words
    • 4 Pages

    Another ethical problem with computers is hacking. Hacking is the computer equivalent of breaking and entering. A computer hacker uses his or her skills to gain unauthorized access to another computer or computer network and, once inside, can wreak havoc by altering important information, deleting essential files, or just crashing the whole system. Many hackers who break into commercial Web sites are looking for…

    • 897 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    computer misuse

    • 408 Words
    • 2 Pages

    Computer hacking is a technique of taking access over the unpermitted network or modem or other devices and the internet. The hackers usually try to grant admittance to the passwords and several different security sites in order to view the confidential information. There some tools used for hacking the sites.…

    • 408 Words
    • 2 Pages
    Satisfactory Essays