Preview

Itrends

Powerful Essays
Open Document
Open Document
1536 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Itrends
HACKTIVIST: HACKING AS AN ETHICAL AND CONSIDER
AS UNETHICAL MOVE IN WORLD WIDE WEB

A Research Paper Presented to
Mr. Dustin Celestino
School of Multimedia Arts Asia Pacific College
Magallanes, Makati City

In Partial Fulfillment of the Requirements for the Course
ERESWRT ABMA-123
Term 3, school year 2012-2013

by
Krisleen June B. Rivera
February 2013

Chapter 1
INTRODUCTION

A. Background of the Study

Before the world of computers came up, the word hack is already used a long time ago. From the era of the creative minds, Socrates and Galileo, hack can be a different word to them but it means they have their own theory and techniques on how to manage to run not a system but the mind of others. Having a subject like Information Security, there are some chapters that will be discuss using .PDF files and there will also be a short documentary viewing about hacking. The word hack was already existed since then. It even started on the telephone lines. Some of the hackers are called “phreaks” or “Phone Phreaking”. It is the art and science of cracking the phone network (so as, for example, to make free long-distance calls). By extension, security-cracking in any other context (especially, but not exclusively, on communications networks).

Age does not matter on hackers. Hackers can be around their mid-20s or 30s and above. There are also teens who can hack different kind of system just by using their computers and doing some hacking skills. Many kind of attacks can be executed not just physically but also through the use of systems and computers. There is an article from outspan which is Meaning of Hacking and the Different Kind of Hackers. The author named outspan said that, “When you hear news about hackers penetrating a website, your reaction will typically involve dilating pupils and astonishment -- if the website is your own, symptoms may include a big deal of swearing and deep hate for the hacking community as well. What you probably

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Nt1310 Final Exam

    • 393 Words
    • 2 Pages

    Computer Hacking – it is the act of bypassing ones account or database and hacking involves stealing of identity and use it in his/her own interest.…

    • 393 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Hacking of random access memory (RAM) is a very basic idea. Hacking itself is defined as using a computer to gain unauthorized access to data within a system. Another way of defining hacking is the crashing a computer system. Following below is some information of how hacking RAM is useful as well as commonly used programs used by so-called ethical hackers.…

    • 838 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Hacking is when a highly technical skilled individual or a group pass their way into a computer network or program without permission. This ends up in important data being stolen by the hacker which is illegal.…

    • 769 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Hacker: An individual who enjoys breaking systems or software without causing harm, presumably with the intent to better understand and improve security.…

    • 413 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Heors

    • 1018 Words
    • 5 Pages

    How have you related, reacted, thought about the believability of those characteristics in reinforcing the definitions and connecting the characters to heroic cycle. (Mythic, Romantic, Tragic, Realistic)…

    • 1018 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Hackers: A hacker is someone who finds weaknesses in a computer or computer network, enters, and modifies or/and steals data this could slow down performance very much or even completely halt it.…

    • 555 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Anthany Nilhas RN IU315

    • 533 Words
    • 2 Pages

    Hacking is activity by one who believes information sharing is a powerful positive good and it also is one who is programmed enthusiastically. Cracking is activity by someone who breaks security on a system. Crakers engage in vandalism, and theft once given access to a computer.…

    • 533 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    How has computer hacking inferred modern society? In this passage I will be talking briefly about the fundamentals of computer hacking from the past to the present. Computer hacking has changed more over time resulting in computer emergences to corporate system shutdowns. This research paper will be talking about three major parts of computer hacking. The first concept of hacking is the origin of creation. The next part will be how hacking has affect on the present-day society. Finally, the last piece of information will be going over the future of system hacking.…

    • 1291 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Brian Knappenberger writes and creates a film which portrays a special and expert hacking group, their inside workings, plans and beliefs which they use and test to carry out their cyber-attacks.…

    • 771 Words
    • 4 Pages
    Good Essays
  • Good Essays

    hacktivists

    • 370 Words
    • 2 Pages

    Hackers have been around for a very long time. Hacks can range from disrupting websites, cracking data bases and releasing untold amounts of sensitive or private data. There are two different types of hackers, white hats and black hats. White hats are hackers that help prevent people that are on the other side of the law. Some white hats were once black hats that may have been caught and decided to work with government agency’s such as the FBI rather than go to jail. Black hats are hackers that hack for things such as personal gain or to simply disrupt or gain access to information that they want. Almost all hackers have an alias or a handle such as Dark Dante or C0mrade.…

    • 370 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Cyber crime paper

    • 1066 Words
    • 3 Pages

    A case of cybercrime that is very relevant is that of Jonathan James. He was the first juvenile to Sent to prison for hacking. James was 16 years of age at the time of his sentencing. In an Anonymous PBS interview he said, “I was just looking around, playing around. What was fun for me was a challenge to see what I could pull off.” He targeted high-profile organizations. He installed a backdoor into a Defense Threat Reduction Agency server which is an agency of the Department of Defense that is for reducing the threat to the U.S. and its allies from nuclear, biological, chemical, and special weapons. The backdoor he created enabled him to view sensitive emails and get employee usernames and password. He also cracked into NASA computers, stealing software worth approximately $1.7 million. According to the Department of Justice, “The software supported the International Space Station’s physical environment, NASA was forced to shut down its computer systems, which cost an…

    • 1066 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Coding Reaction

    • 778 Words
    • 4 Pages

    Coleman first attempts to provide a solid background and introduction to world of hacking. While doing this, she also attempts to show that hacking is much more than a simple act. It has brought people together to form an entire social formation linked through the thousands of computers and networks throughout the world. She wants to illustrate that the hacking culture is a distinct culture that incorporates many of things that are used to validate other cultures. For example, Coleman shows how the hacker culture has developed and changed throughout time do to development in new technology. “The fact that the BBS period is now over indicates that much of the hacker lifeworld is constituted through technological infrastructures with their own features and histories, and as subject to birth, growth, and decay as any other social formation” (Coleman 2012:31). This shows how the hacking culture is similar to many other cultures that have been studied. They have their own features and their own memories that define who they are and how they act.…

    • 778 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    The 5 stages of grief or the Kubler-Ross model is a theory first put forward by Dr.Elisabeth Kubler-Ross in her 1969 book On Death & Dying. Dr Kubler-Ross was a psychiatrist who had a particular interest in end of life care and the book & theory came as a result of discussions and interviews with over 500 terminally ill patients which took place at the University of Chicago Billings Hospital between 1965 and 1968.…

    • 2208 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    Ethics of Hacking

    • 275 Words
    • 2 Pages

    Cracking is the correct concept for deconstructing/sabotaging in the cyberspace/Internet, e.g. by circumventing the security of a website and posting your own (critical) stuff on their site or spreading viruses in the Internet. Hacking, on the other hand, is about using and reconstructing the computer or other machines/systems in a new and (by the "owners" and "inventors") unintended way. Hacking is about reclaiming the system, manipulating it and using it, not destroying it. Both terms define people who can break into computer systems and rewrite programs, but hackers do not use their knowledge offensively or illegally. Crackers use their skills for illegal use: distributing pirated materials, stealing money and identities, etc.…

    • 275 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Itard

    • 354 Words
    • 1 Page

    A patriarch of special education, Jean-Marc Gaspard Itard did not start out as the infamous physician he came to be. Educated to be a tradesman, Itard was forced to join the army during the late 1700’s, presenting himself as a physician. Demonstrating considerable talent for medicine, he received his medical education “on the job” and in 1796 took on a formal surgical internship in Paris. He quickly made his presence, and talents, known and was appointed Chief Physician at the National Institution for Deaf-Mutes in Paris, in 1800. He made his mark in medicine with numerous accomplishments in otology, but it was his work with “The Wild Boy of Aveyron” which earned him an international reputation. In early 1800, The Wild Boy of Aveyron was sent to Paris to be examined by a team of physicians. It was there where Itard met the boy, adopted him into his home and named him Victor. While other physicians declared Victor to be mentally deficient, Itard disagreed. He believed Victor seemed to be deficient due to a severe lack of human interaction. Itard devoted five years of his career into an intensive, individualized educational program. He believed that Victor could not learn effectively until he became attuned to his environment, leading Itard to rely heavily on sensory training and stimulation in his educational approach.…

    • 354 Words
    • 1 Page
    Good Essays