Preview

How Has Computer Hacking Interfered Modern Society?

Better Essays
Open Document
Open Document
1291 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
How Has Computer Hacking Interfered Modern Society?
How Has Computer Hacking Interfered Modern Society? By Angel Passament

How has computer hacking inferred modern society? In this passage I will be talking briefly about the fundamentals of computer hacking from the past to the present. Computer hacking has changed more over time resulting in computer emergences to corporate system shutdowns. This research paper will be talking about three major parts of computer hacking. The first concept of hacking is the origin of creation. The next part will be how hacking has affect on the present-day society. Finally, the last piece of information will be going over the future of system hacking. What is
…show more content…
A few of the members transfer their curiosity and rigging skills to the new mainframe computing systems being studied and developed on campus. Hacking groups begin to form. Among the first are Legion of Doom in the United States, and Chaos Computer Club in Germany. The movie "War Games" introduces the public to hacking. A computer hacker intends to ruin businesses performing an act much more unprincipled than an enthusiastic biologist 'hacking' away at work or theory. The truth is that computer hacking is in fact easy in the general sense, but more consideration must be given. Some aspects of hacking are used in everyday life and you may not know that accessing wireless internet from another person's account is considered wireless hacking even though your borrowing there connection. During the 1970's, a different kind of hacker appeared: the phreaks or phone hackers. They learned ways to hack the telephonic system and make phone calls for free. Within these group of people, a phreaker became famous because a simple discovery. …show more content…
Hackers have different opinions and motivations. However, they all share the spirit of challenge and always trying to prove their capabilities of doing what all believe is impossible maybe because they were mistreated, or doubts surrounded their abilities and past achievements. Hackers believe that information should be shared and they fight against information owning. Effects that hacking caused and still causing to the society can’t be ignored. Hacking nowadays is taking new phases and the danger is increasing because we are now living in a society that runs by ICT, and any attack to the ICT especially in advanced countries will cause vital consequences. ICT still lacks a powerful security tools that are capable of tracking, catching hackers, and protecting computer systems from their attacks. My own view is that the best way to protect ICT from hackers is to study their psychology and try to understand their way of thinking, because hackers are human beings, who have two sides; evil and good, and they used to show their good side but suddenly they turned to be evil. The reasons which caused the transformation from good to evil individuals should be studied and given the highest priority in the war against hackers because since we put our

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Nt1310 Final Exam

    • 393 Words
    • 2 Pages

    Computer Hacking in 1960’s up to 1970’s – an individual working with computers who were technically gifted and skilled it was defined by computer ethicist Duncan Langford (1995).…

    • 393 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Tim J. Watts goes more into the dark side of the “hacker” community by bringing up the constant back in forth between computer security officers and the so called hackers. This article, being written this year is able to reflect on the events of September 11, 2001 and new homeland security measures. He represents this viewpoint of a dangerous hacker in his definition: “While some hackers are harmless, others break into systems with the intent to steal information or to do destruction to the system. Hackers performing the latter pose a serious threat to the economic future of the United States” (Watts). Tim Watt outright blames the hacker community of accessing information that should be private. Only looking and reflecting on the serious threat…

    • 154 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Hacking is when a highly technical skilled individual or a group pass their way into a computer network or program without permission. This ends up in important data being stolen by the hacker which is illegal.…

    • 769 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Crt 205 Final Project

    • 2361 Words
    • 10 Pages

    | |author. If none exist, explain how you |However, hacking is a process use be Information Technology (IT) |…

    • 2361 Words
    • 10 Pages
    Satisfactory Essays
  • Good Essays

    Computer Memory Hacking

    • 820 Words
    • 2 Pages

    Who Are Hackers ­ A Hacker 's Tools Of The Trade | Hackers | FRONTLINE | PBS. (n.d.).…

    • 820 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Certified Ethical Hacking

    • 97757 Words
    • 392 Pages

    Ethics and Legality Understand ethical hacking terminology Define the job role of an ethical hacker Understand the different phases involved in ethical hacking Identify different types of hacking technologies List the 5 stages of ethical hacking What is hacktivism? List different types of hacker classes Define the skills required to become an ethical hacker What is vulnerability research? Describe the ways of conducting ethical hacking Understand the legal implications of hacking Understand 18 U.S.C. § 1030 US Federal Law Footprinting Define the term footprinting Describe information gathering methodology Describe competitive intelligence Understand DNS enumeration Understand Whois, ARIN lookup Identify different types of DNS records Understand how traceroute is used in footprinting Understand how email tracking works Understand how web spiders work Scanning Define the terms port scanning, network scanning, and vulnerability scanning Understand the CEH scanning methodology Understand Ping Sweep techniques Understand nmap command switches Understand SYN, Stealth, XMAS, NULL, IDLE, and FIN scans List TCP communication flag types Understand war dialing techniques Understand banner grabbing and OF fingerprinting techniques Understand how proxy servers are used in launching an attack How do anonymizers work? Understand HTTP tunneling techniques Understand IP spoofing techniques…

    • 97757 Words
    • 392 Pages
    Powerful Essays
  • Good Essays

    Computer hacking isn't something you here about everyday on the news. Really people don't have any knowledge about computer hacking. Everyday our identities go through about eight hundred computers a day. Every time we swipe a card, make a telephone call or connect to the internet our digital identities are recorded to keep track of who is doing what. Now the records are kept by different companies. The government also takes part in this game. These company computers are supposedly protected by anti-hacking programs. Well, unfortunately hacker can still get through. And when they get through your identity is up for grabs. This is what happening everyday and no one knows but the hacker and you. Until a hacker get control of a major corporate company, and then everybody in the world is talking about Enron's bank account being hacked into and sucked dry of all its money. Most people say hackers are greedy creatures that only want money. That is not always the case some hackers do it for fun, some do it for power, others do it because they don't won't to be ruled by the government. So, really and truly what are hacking programs? Where do they come from and what are the type's hackers?…

    • 794 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Network Security Analysis

    • 5047 Words
    • 21 Pages

    The lure of wealth that hackers attack is no longer a kind of personal interest, but more and more become an organized, interest driven career crime. Its main means has: online professor viruses, Trojan horses production technology and various network attack technology; Online exchange, trafficking and rental viruses, Trojan horses, zombie network; Online customized viruses, Trojan horses; Internet theft behavior (account Numbers game, bank accounts, QQ number, etc.), sell the…

    • 5047 Words
    • 21 Pages
    Powerful Essays
  • Powerful Essays

    Computer Hacking

    • 4083 Words
    • 17 Pages

    9. Levy, S. (1984), Hacker: Heroes of the computer revolution, New York: Bantam Doubleday dell. Cited in: Taylor, Paul A. (1999), Hackers: Crime in the digital sublime, London, Routledge.…

    • 4083 Words
    • 17 Pages
    Powerful Essays
  • Good Essays

    Computer hacking is the act of modifying computer hardware or software, in order to cause damage to sensitive data on a computer or to simply steal confidential information. Computer hackers often target home and office computers that are connected to the Internet. The Internet is a gateway for a computer to connect to the world, which also makes it vulnerable to attacks from hackers from across the globe. What are the consequences of computer hacking? Let us find out.…

    • 376 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Hack

    • 1715 Words
    • 7 Pages

    To get started let us take a look at the people behind the curtain of computer hacking, into the different types of hackers. Not all hackers are the same they come from different places and different age groups and there are a few ways to describe a hacker. The first is the black hat hacker who as Wilson points out in his article are people who " set out to cause damage for the thrill - or other ulterior motives". So instead of trying to achieve something they are more mischievous like an imp, they have little regard for who you are or what you do with your computer. To the black hat hacker it is a means of having fun or proving to themselves that they are better than someone else. This is not to say that all black hackers are good at what they do; There is a huge subclass of black hat hackers who are made up of "script kiddies" who use "toolkits that are based on code they may not even understand"(Wilson). The problem with this is that it has created an influx of want to be hackers who don 't even know what they are doing. Wilson points out to that if the script kiddies do indeed make up the bulk of the black hats, their lack of skill should make them less of a threat. Yet Wilson directly states that this is not the case because their numbers, their persistence, and their…

    • 1715 Words
    • 7 Pages
    Better Essays
  • Powerful Essays

    Hacking

    • 3915 Words
    • 20 Pages

    The first bona fide appearance of a computer hacker occurs nearly 100 years later, in the…

    • 3915 Words
    • 20 Pages
    Powerful Essays
  • Powerful Essays

    Computer Crimes

    • 4386 Words
    • 15 Pages

    M. E. Kabay, PhD, CISSP-ISSMP (2008). A Brief History of Computer Crime: An Introduction for Students.…

    • 4386 Words
    • 15 Pages
    Powerful Essays
  • Good Essays

    Internet Hacking

    • 2136 Words
    • 9 Pages

    Imagine this, anyone, anywhere has the ability to connect to almost every computer in the whole world without even leaving this own home. Most of these computers are connected to the Internet which is, with the Internet's growing popularity and widespread usage, one of the most susceptible targets to the continually growing hacking movement. The term hacker has caused much debate in regards to the actual meaning of it, but hacking by any definition is the art of thinking outside the box. In order to be a great hacker there is not necessarily a ton of technical computer knowledge that one must know, but more the less one must be creative and have an open mind and try to think outside of the box. Another big debate within the hacking movement is the argument that is there a difference between a hacker and a cracker. It is said to be that a hacker is one who uses their skill for the good of society and a cracker uses this same skill maliciously in the destruction of society. Be it a hacker or a cracker they still have the same rare skill but just choose to use it in different ways. The hacking culture does not have leaders, it is built strictly on reputation.…

    • 2136 Words
    • 9 Pages
    Good Essays
  • Powerful Essays

    Nn Fir Nn

    • 3883 Words
    • 16 Pages

    References: Audit Commission (1994), Opportunity Makes a Thief – an Analysis of Computer Abuse, HMSO Publications Centre, London. Collier, P.A. and Spaul, B.J. (1992), “The Woolwich Centre for Computer Crime Research: addressing the need for UK information,” Computer Fraud & Security Bulletin, August, pp. 8-12. Culf, A. (1996), “BBC acts to thwart political hackers,” The Guardian, February 9, p. 1. Evans, D. (1994), “BA in dock over hacking,” Computer Weekly, April 28, p. 6.…

    • 3883 Words
    • 16 Pages
    Powerful Essays

Related Topics