Essay on Ethical Computer Hacking
972 Words4 Pages
Have you ever been a victim of a cyber crime? Something as simple as a weird pop up that won't go away? Or maybe something a little bit more serious like your personal web page gets hi-jacked? All this "malicious" damage that causes you much grief isn't so much the work of a hacker, per se, but more the work of a "cracker" or a "script kiddie". Now you're confused right? Well let's just say everyone who knows how manipulate a computer isn't doing it on bad and evil terms, like writing a virus to deploy on a certain date to permanently delete certain file extensions. But maybe they're the people sitting hours on end to deploy a fix for that certain virus someone else is writing, or safeguarding a local bank's network to make sure that virus…show more content…
These are the people setting the very negative example of computer literate people around the world. They know no morals, or ethical value behind what they do, but to compromise, and cause havoc upon the end user computing world. Hackers fall into two categories: Black Hat and White Hat Hackers. While Black Hat hackers illegally crack into systems for malicious reasons, their White Hat counterparts probe and test for security flaws and IT research (Black Hat/White Hat). The term "hacker" can be explained as a person who enjoys learning the details of a computer system and how to stretch their capabilities beyond a person who learns the bare minimum to use a computer (Palmer). By this definition, a hacker can be anyone who is willing to expand their knowledge with a computer to better benefit themselves, or more importantly, others. Many people disregard the ethical sense to hacking and believe all forms of hacking to be unjust, which is untrue, but hacking can be very beneficial. White Hat, or Ethical Hacking can be very useful by having security professionals attempt to break in to explore and try to exploiting systems to discover a loop-hole or security flaw in a network. This is similar to having independent auditors come into an organization to verify its bookkeeping records. These White Hat hackers are usually experts in their field and use the
Computer Hacking Essay
Hacking is using your knowledge to gain more knowledge. This is one of the best definitions I could find on the net. Hacking is state of mind. Curiosity is the main point; a hacker always wants to know everything. It is the curiosities that which makes them learn more and more quickly than other person at same age. Traditionally hackers were regarded as ?geeks?, who knew everything about computers (hardware & software) & networks. They are very intelligent programmers.
The term hacker was popularized by Steven Levy in his famous book ?Hackers: Heroes of Computer Revolution?. When he said hacker, he meant a brilliant, constructive programmer who led the way to the computer revolution. About's Net Security Portal announces the same verdict while explaining what a hacker is, "A person who is extremely proficient at programming and programming languages. A computer enthusiast. Someone who is obsessive about programming, programming languages or computer systems & networks." Computer hacking can be traced back to the late 1950? and early 1960?s. At that time companies and universities were using mainframe computers with dumb terminals. There was no such thing as the Internet. At this time a hack was ?shortcuts that would modify and improve the performance of a computer?s operating system or applications and allow more tasks to be completed in a shorter time.? as stated by Michael Devitt in A Brief History of Computer Hacking. The hackers in this period were mainly skilled workers who were proud of their work and found joy in doing so. The ?original hacker? at the beginning of computers was a person not looking to harm anyone or anything, but simply looking to apply his special skills to the improvement of the computer field. As they progressed into the 1970?s and 1980?s, the role and sense of computer technology began to change. Computer technology began to be viewed as a tool of power. Many people felt that this tool should be available to all people. In 1984, these individuals began to be referred to as ?second wave hackers.? Second wave hackers (although they did not refer to themselves by this name) were characterized as wanting computers and their computer systems to be designed to be useful and accessible to citizens. In the process, they pioneered public access terminals, computer conference, and personal computers.? As they continued into the mid to late 1980?s, the so-called ?computer underground? emerged. With the emergence of the underground, hacking once again took on another meaning. From that point in time to the present hacking means ?to break into or sabotage a computer system, and a ?hacker? is the perpetrator of such activities.? As time progressed, the definition and societal view of hacking changed...
Loading: Checking Spelling0%