Preview

Rogerain Essay on Computer Hacking

Good Essays
Open Document
Open Document
1042 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Rogerain Essay on Computer Hacking
Yadhu Khatri
Professor Wilson
ENGL 1301
23 June 2013
Computer Hacking: is it an acceptable? Computer hackers are always using new technologies in today’s world although it was started after the establishment of computer. While it is considered as an ethical, but study of internet checking trends, most hackers are motivated by profit when they attack computer network and files. Forty two percent of hackers were trying to steal sensitive information, such as personal records, which could be sold or exploited for profit. The hackers do not just crack down, they also put much pressure on software developments and internet based businesses to improve and their security procedures and make their product less vulnerable to hacking. It seems that hacking is a reasonable because it helps to developed the technology and stay people alert on security purpose. Hackers attack others computer remotely that are via by the internet. Hackers use wide varieties of methods to infiltrate computers that includes virus, malware, Trojan and worm. The Government Intervention against hacking says, white “hat” hackers mean who also break into networks without authorization, usually have more identical goals; for example, a white hat hacker might infiltrate a network in order to discover its security weakness, and then inform the networks operators of those weakness so they can be fixed. In same way, some other hackers believe and concern that hacking is improving computer systems and did not necessarily have malicious intent, indeed, the term “hack” initially had many positive connotations and was applied to variety of intellectual activities.
On the other hand, everyone would not probably believes that hacking has had given us some of the positive things to humans. In the same sense, hacking remains a particularly controversial and complex issue. Malicious hackers, called "black hats", break into computer networks in order to steal potentially valuable information (such as



Cited: "Update: Computer Hacking." Issues & Controversies. Facts On File News Services, 16 June 2011. Web. 23 June 2013. . "Key Events in the History of Computer Hacking (sidebar)." Issues & Controversies On File: n. pag. Issues & Controversies. Facts On File News Services, 6 June 2008. Web. 24 June 2013. . "Computer Hacking." Issues & Controversies On File: n. pag. Issues & Controversies. Facts On File News Services, 18 July 2005. Web. 24 June 2013.

You May Also Find These Documents Helpful

  • Good Essays

    Ethical Computer Hacking

    • 1026 Words
    • 5 Pages

    There are a many types of hacks, and hackers in the cyber world. A hack can be any modification done to virtually anything, to make it do something better, or something completely different. Many hackers are hackers of electronic equipment, mostly computers, but even cell phones, routers, iPods, digital cameras, and even the Toyota Prius have been hacked to get better gas mileage with the hybrid-electric engine (Rupley). But besides modifying computers themselves or gadgets, hackers play a significant role in the networking world.…

    • 1026 Words
    • 5 Pages
    Good Essays
  • Best Essays

    McClure, S., Scambray, J., & Kurtz, G. (2009). Hacking exposed 6: Network security secrets & solutions. New York: McGraw-Hill.…

    • 4737 Words
    • 19 Pages
    Best Essays
  • Good Essays

    Peter Krapp Analysis

    • 703 Words
    • 3 Pages

    Peter Krapp builds a well-constructed argument designed to persuade readers that computer hacking is a danger that steals our most valuable possession—personal information—from our most vulnerable people--students. The article focuses on personal information about college students stolen from college computer networks. The writer builds his argument brick by brick. He starts by giving an example of student data stolen from a college by hackers in China, relating his topic to an event that really happened. The writer quickly establishes himself as an expert in the topic so readers can trust his information. Krapp asks and answers questions about the theft of data, goes into more depth about the type of information stolen from college networks, and then briefly touches on the laws, or the lack of laws, to protect students. He points out that data is stolen from students by not only foreign hackers, but also by American companies. The writer finishes with a call for colleges to protect student data, clearly stating his purpose.…

    • 703 Words
    • 3 Pages
    Good Essays
  • Better Essays

    World Phone Hacking Scandal

    • 2502 Words
    • 11 Pages

    Small, M. (2011, November/December). The Lessons of the Hacking Scandal. Information World Review, 268, 14. Retrieved from Business Source Complete database. (72887448)…

    • 2502 Words
    • 11 Pages
    Better Essays
  • Satisfactory Essays

    Cyber Hacking

    • 250 Words
    • 1 Page

    For some hackers, it is just a hobby and the way to determine their level of computerization. They enjoy learning more about how computer works and consider it is an “art” form. Besides, hackers apply their skill to break passwords, send viruses, and damage computer network security system for their deceitful purpose. Some hacking activities are directed towards individuals, families and organizations as an actual attack.…

    • 250 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    • The information in the following searches, and from Google hacking in general, has the possibility of being used for malicious purposes. This demonstration is delivered for illustrative purposes, not as a way of enabling illegal and/or harmful actions. However, it is our hope that this demonstration enables administrators to locate and resolve insecurities in their environments.…

    • 554 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Cyber Espionage

    • 3191 Words
    • 13 Pages

    Cyber espionage is the use of software tools to obtain secret or private information about another government or business competitor. According to a study by research firm SANS Institute, cyber espionage is ranked Number 3 on its Top Five Menaces for 2008. Hence cyber espionage is an increasing concern in today’s society. Over the past decade, globalization has led to an increase in espionage activities. As businesses become global and competition intensifies, the tendency to steal information to gain a competitive edge increases. Another explanation for a rise in espionage levels is the growth of computer technologies. Computers have shortened the time spent to steal data as individuals can download information and save it in a few seconds, as opposed to spending hours secretly duplicating documents. Computers are interconnected via the company’s network, which is linked to an internet, thus increasing the points of entry through which hackers can gain access to information. Besides making confidential information easier to steal, the computer has enhanced the theft. A group of Russian hackers who stole US$10 million from the Citibank computer network commented “A computer is a much better tool than a handgun… it would take us a long time to get $10 million with a handgun.” In the remaining sections of our report,…

    • 3191 Words
    • 13 Pages
    Powerful Essays
  • Good Essays

    Cyber Ethics

    • 1006 Words
    • 5 Pages

    Menn continues to elaborate on this idea by highlighting the so-called purpose of a hacker’s actions, which is to help by making “software more secure” (Hinman, 463). In their minds hackers believe they are helping because they are pointing out software’s weaknesses such as loopholes that allow them easy access to private information. Menn describes this concept by describing hackers as “the sort of people who set aside the instruction manual and take a machine apart to see how it works” (463). This description eliminates the negative image one typically associates with hackers, and instead it portrays them as curious individuals who seek a deeper understanding of how things operate. I, for one, disagree with this position because hackers are invading private information whether it is from a corporation or an individual. It is clear that corporations and people do not want an outsider viewing their confidential information. Therefore, the act of finding ways to view this type of data is equal to that of intruding.…

    • 1006 Words
    • 5 Pages
    Good Essays
  • Better Essays

    Computer Crime

    • 2386 Words
    • 10 Pages

    Bibliography: (1) Bowen, Mace. “Computer Crime.” 9/14/99. http://www.guru.net/. Visited: 10/28/00. (2) Edgar, Stacey L. Morality and Machines: Perspectives on Computer Ethics. Sudbury: Jones and Bartlett Publishers, 1997. (3) Jenson, Barbara. Cyberstalking: Crime, Enforcement and Personal Responsibility in the On-line World. New York: Wiley Computer Publishing, 1996. (4) Parker, Donn B. Computer Security. CD-ROM. Encarta Encyclopedia 2000. Microsoft Corporation. 1993-1999. (5) Parker, Donn B. Fighting Computer Crime: A New Framework for Protecting Information. New York: Wiley Computer Publishing, 1998. (6) Tribe, Laurence H. The Constitution in Cyberspace. New York: Warren & Computer Professionals, 1991. (7) U.S. Dept of Justice. “Cyber Crime.” 5/23/00. http://www.cybercrime.gov/. Visited: 10/27/00.…

    • 2386 Words
    • 10 Pages
    Better Essays
  • Better Essays

    Hacking and Hacker

    • 1666 Words
    • 7 Pages

    Hacking is to change computer hardware or software, in order to cause damage to important data on a computer or to simply steal personal information. Computer hackers take help of internet because internet connects the entire computer around the world. A person who attacks to another system with the intent to cause harm, without having any permission from the system owner is called as hacker. There are different types of hacker with different purpose of hacking. Hacking is illegal thing which have lots of effect but somehow hacking is good because it got some benefit. In the following paragraph I am going to discuss about types of hacker, purpose of hacking, effect of hacking, benefit of hacking and ethical hacking. (Beaver & McClure, 2007)…

    • 1666 Words
    • 7 Pages
    Better Essays
  • Powerful Essays

    Nn Fir Nn

    • 3883 Words
    • 16 Pages

    References: Audit Commission (1994), Opportunity Makes a Thief – an Analysis of Computer Abuse, HMSO Publications Centre, London. Collier, P.A. and Spaul, B.J. (1992), “The Woolwich Centre for Computer Crime Research: addressing the need for UK information,” Computer Fraud & Security Bulletin, August, pp. 8-12. Culf, A. (1996), “BBC acts to thwart political hackers,” The Guardian, February 9, p. 1. Evans, D. (1994), “BA in dock over hacking,” Computer Weekly, April 28, p. 6.…

    • 3883 Words
    • 16 Pages
    Powerful Essays
  • Powerful Essays

    Computer Hacking

    • 6350 Words
    • 26 Pages

    offer considerable scope for developing a critical, academically-informed, and policyoriented debate on young people’s participation in computer crime.…

    • 6350 Words
    • 26 Pages
    Powerful Essays
  • Good Essays

    Ethical Hacking

    • 1018 Words
    • 5 Pages

    In order to discuss the ethical, legal, and social implications of this issue, one has to understand the definition of Ethical Hacking. The Word Spy states that "Ethical hacking is a computer hacker who attempts to infiltrate a secure computer system in an effort to learn the system 's weaknesses so that they can be repaired" (The Word Spy, 2003). The question arises here is whether Ethical Hacking is ethical or unethical.…

    • 1018 Words
    • 5 Pages
    Good Essays
  • Better Essays

    "Cracker - This is the common term used to describe a malicious hacker. Crackers get into all kinds of mischief, including breaking or "cracking" copy protection on software programs, breaking into systems and causing harm, changing data, or stealing. Hackers regard crackers as a less educated group of…

    • 3042 Words
    • 13 Pages
    Better Essays
  • Good Essays

    Besides, privacy invasion is another sensitive issue caused by ICT. Ironically, computers, on which we rely excessively to store and save our private data, are the means of hackers to steal, destroy or even be exploited for their own selfish good. This hideous act could easily be done when…

    • 663 Words
    • 3 Pages
    Good Essays