Preview

Hacker

Better Essays
Open Document
Open Document
1123 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Hacker
Many people believe that a hacker is not a dangerous person and is not causing harm. What do you think? (1000 words)

The advancement of information technology spans a lot of areas of our lives. Information technology has made a huge difference in industry, agriculture and services. This in turn boosts up the productivity of the society. However, the development of computer technology also leads to many security problems in our modern society. There has emerged a group of computer savvy people who seeks and exploits weaknesses in a computer system or computer network. Their motivation has put many questions on debating table. On the one hand, many people contend that a hacker is a dangerous person who will probably destroy the whole world’s computer system. On the other hand, others argue that hackers are not dangerous and not causing harm. This essay will discuss the two sides of the coin with regard to hackers with relevant examples.

First of all, the definition of hacking and hackers need to be clearly understood so as to have an insight into hacking. Hacking can be defined as any kind of computer crimes. Pirating is the most popular form of hacking, which relates to the stealing information from written software programmes. In the computer security context, hackers are people who try to find the weaknesses of the computer network and exploit the information from software. Hackers may be encouraged by a variety of reasons, for instance profits, protests, or challenges. Hackers can be categorised into the three types, which are black hats, grey hats, and white hats. Black hat group or cracker is expertise in carrying out the harmful to the computer system. A grey hat is a hacking group that will not violate the law and help the government to defend the system. However, grey hat will apply the same methods to revert to black hat approaches. The white hat hacker has their own abilities and professional computing skills to protect the malicious threads and



References: * Eric C.,(2012). 7 Levels of Hackers: Applying An Ancient Chinese Lesson: Know Your Enemies", pp558-600. * Moore,R., (2005). Matthew Bender & Company Cybercrime: Investigating High Technology Computer Crime, p258. * Markoff, J., (2005). At Microsoft, Interlopers Sound Off on Security: New York Times. Viewed June 26, 2013. * Tim Jordan, Paul A. Taylor (2004). Wild West imagery has permeated discussions of cybercultures:Hacktivism and Cyberwars. Routledge,pp. 133–134.

You May Also Find These Documents Helpful

  • Powerful Essays

    From this book I take back lot of things related to computers, networks, the government, information security and its importance, and how to handle things under pressure and stress. There are many characters who teach us how to look at situations which actually shows us a way to solve the problem.…

    • 1586 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    Nt1310 Final Exam

    • 393 Words
    • 2 Pages

    Computer Hacking in 1960’s up to 1970’s – an individual working with computers who were technically gifted and skilled it was defined by computer ethicist Duncan Langford (1995).…

    • 393 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Final Exam Paper

    • 491 Words
    • 2 Pages

    ____ are hackers of limited skill who use expertly written software to attack a system…

    • 491 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    “We are at risk. Increasingly, America depends on computers. They control power delivery, communications, aviation, and financial services. They are used to store vital information, from medical records to business plans to criminal records. Although we trust them, they are vulnerable - to the effects of poor design and insufficient quality control, to accident, and perhaps most alarmingly, to deliberate attack. The modern thief can steal more with a computer than with a gun. Tomorrow’s terrorist may be able to do more damage with a keyboard than with a bomb.”(1)…

    • 2101 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    We live in the time of the World Wide Web and it brings the biggest changes ever. The effects from this powerful invention, the Internet, has made the world flat and the opportunities huge. Every big change can have an affect on people, it could be positive or negative. In early 2002, researchers evaluated the presence and role of hackers and their role in technological innovations. “A decade ago, people in the tech field were angry that hackers had been labeled the dangerous villains who threatened national security” (Nissenbaum, 2015). This negative association contrasts with the beginning days of the 1970’s when hackers “were seen as ardent if quirky programmers, capable of near-miraculous,…

    • 1234 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Eric S. Raymond (author of The New Hacker's Dictionary) advocates that members of the computer underground should be called crackers. Yet, those people see themselves as hackers and even try to include the views of Raymond in what they see as one wider hacker culture, a view harshly rejected by Raymond himself. Instead of a hacker/cracker dichotomy, they give more emphasis to a spectrum of different categories, such as white hat, grey hat, black hat and script kiddie.…

    • 4036 Words
    • 17 Pages
    Powerful Essays
  • Powerful Essays

    This paper is prepared for Cyberspace Crime, CCST 9029, taught by Professor Dr. K. P. Chow and tutored by Raymond Chan.…

    • 1710 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    The concept of hacking was introduced in the 1950s and 1960s by M.I.T. engineers and was referred to as constructive, clever technical work (Mitchell, B., 2012). At that time, hacking was intended for learning activities and technical experiments, not necessarily related to computer systems. Those outside of M.I.T., began using their hacking skills for less honorable activities such as modifying telephone lines to make free, illegal, long-distance telephone calls. As the use of computers and the Internet became more popular, data networks became the most common target of hackers and hacking. Hacking is now associated with…

    • 360 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    irish republican army

    • 1205 Words
    • 5 Pages

    President Obama once declared that Cyber attacks comprise one of the most severe economic and national security challenges that the nation is faced with . Hacktivism has heightened political conscience. People are reliant on computers and electronic operating systems to an extent that these attacks open up the risk to the public. Hacktivism has the possibility to have a positive or negative force on society.…

    • 1205 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    However, even in an artificial environment such as the cyberspace, it appears mankind cannot escape from its somewhat overwhelming natural attraction to wrongful behavior or criminal tendencies. In turn this alternative dimension has been infected with the same criminal behavior that plagues our physical reality. The information age has opened the doors to anti social, smart, and opportunistic people to find new and innovative ways to commit old crimes. These people are called hackers. Schamalleger (1999), stated that hackers are people…

    • 3567 Words
    • 15 Pages
    Powerful Essays
  • Satisfactory Essays

    Virtual Learning Environment

    • 4651 Words
    • 19 Pages

    Types of Hacker Attacks o Operating System attacks o Application-level attacks o Shrink Wrap code attacks o Misconfiguration attacks Hacktivism Hacker Classes Hacker Classes and Ethical Hacking What Do Ethical Hackers Do? Can Hacking be Ethical? How to Become an Ethical Hacker? Skill Profile of an Ethical Hacker What is Vulnerability Research? Why Hackers Need Vulnerability Research? Vulnerability Research Tools Vulnerability Research Websites How to Conduct Ethical Hacking? Approaches to Ethical Hacking Ethical Hacking Testing Ethical Hacking Deliverables Computer Crimes and Implications Legal Perspective o U.S. Federal Law o Japan’s Cyber Laws o United Kingdom’s Cyber Laws…

    • 4651 Words
    • 19 Pages
    Satisfactory Essays
  • Good Essays

    Internet Hacking

    • 2136 Words
    • 9 Pages

    Imagine this, anyone, anywhere has the ability to connect to almost every computer in the whole world without even leaving this own home. Most of these computers are connected to the Internet which is, with the Internet's growing popularity and widespread usage, one of the most susceptible targets to the continually growing hacking movement. The term hacker has caused much debate in regards to the actual meaning of it, but hacking by any definition is the art of thinking outside the box. In order to be a great hacker there is not necessarily a ton of technical computer knowledge that one must know, but more the less one must be creative and have an open mind and try to think outside of the box. Another big debate within the hacking movement is the argument that is there a difference between a hacker and a cracker. It is said to be that a hacker is one who uses their skill for the good of society and a cracker uses this same skill maliciously in the destruction of society. Be it a hacker or a cracker they still have the same rare skill but just choose to use it in different ways. The hacking culture does not have leaders, it is built strictly on reputation.…

    • 2136 Words
    • 9 Pages
    Good Essays
  • Powerful Essays

    Digital

    • 1898 Words
    • 8 Pages

    The modern world of technology could not have come about without the development of the computer. Different types and sizes of computers find use throughout society in the storage and handling of data, from secret government files to private household accounts. Computers have opened up a new era in manufacturing through the techniques of automation, and they have enhanced modern communication systems. They are essential tools in almost every field of research and applied technology, from constructing models of the universe to producing tomorrow's weather reports, and their use has opened up new areas of conjecture. Database services and computer networks make a great variety of information sources available. The same advanced techniques also make invasions of privacy and of restricted information sources possible, but computer crime has become one of the many risks that society must face to enjoy the benefits of modern technology.…

    • 1898 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    negative aspects

    • 254 Words
    • 2 Pages

    a. What is the term given to the act of downloading software illegally from the Internet or copying software without permission?…

    • 254 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Cyber Terrorism

    • 821 Words
    • 4 Pages

    As the main stakeholders in cyber terrorism, have played an important role whereby in a positive way they help in analyzing and providing consulting services to the experts to identify loopholes in a system by understanding the coding and protocols in cyberspace. Negatively, through selfish motives some hackers play the role of attacking the systems and gaining access to authorized information using either viruses or sperm software.…

    • 821 Words
    • 4 Pages
    Good Essays