Computer Hacker Essay

Essay on Ethical Computer Hacking

972 Words4 Pages

Have you ever been a victim of a cyber crime? Something as simple as a weird pop up that won't go away? Or maybe something a little bit more serious like your personal web page gets hi-jacked? All this "malicious" damage that causes you much grief isn't so much the work of a hacker, per se, but more the work of a "cracker" or a "script kiddie". Now you're confused right? Well let's just say everyone who knows how manipulate a computer isn't doing it on bad and evil terms, like writing a virus to deploy on a certain date to permanently delete certain file extensions. But maybe they're the people sitting hours on end to deploy a fix for that certain virus someone else is writing, or safeguarding a local bank's network to make sure that virus…show more content…

These are the people setting the very negative example of computer literate people around the world. They know no morals, or ethical value behind what they do, but to compromise, and cause havoc upon the end user computing world. Hackers fall into two categories: Black Hat and White Hat Hackers. While Black Hat hackers illegally crack into systems for malicious reasons, their White Hat counterparts probe and test for security flaws and IT research (Black Hat/White Hat). The term "hacker" can be explained as a person who enjoys learning the details of a computer system and how to stretch their capabilities beyond a person who learns the bare minimum to use a computer (Palmer). By this definition, a hacker can be anyone who is willing to expand their knowledge with a computer to better benefit themselves, or more importantly, others. Many people disregard the ethical sense to hacking and believe all forms of hacking to be unjust, which is untrue, but hacking can be very beneficial. White Hat, or Ethical Hacking can be very useful by having security professionals attempt to break in to explore and try to exploiting systems to discover a loop-hole or security flaw in a network. This is similar to having independent auditors come into an organization to verify its bookkeeping records. These White Hat hackers are usually experts in their field and use the

Show More

Computer Hacking Essay

Hacking is using your knowledge to gain more knowledge. This is one of the best definitions I could find on the net. Hacking is state of mind. Curiosity is the main point; a hacker always wants to know everything. It is the curiosities that which makes them learn more and more quickly than other person at same age. Traditionally hackers were regarded as ?geeks?, who knew everything about computers (hardware & software) & networks. They are very intelligent programmers.

The term hacker was popularized by Steven Levy in his famous book ?Hackers: Heroes of Computer Revolution?. When he said hacker, he meant a brilliant, constructive programmer who led the way to the computer revolution. About's Net Security Portal announces the same verdict while explaining what a hacker is, "A person who is extremely proficient at programming and programming languages. A computer enthusiast. Someone who is obsessive about programming, programming languages or computer systems & networks." Computer hacking can be traced back to the late 1950? and early 1960?s. At that time companies and universities were using mainframe computers with dumb terminals. There was no such thing as the Internet. At this time a hack was ?shortcuts that would modify and improve the performance of a computer?s operating system or applications and allow more tasks to be completed in a shorter time.? as stated by Michael Devitt in A Brief History of Computer Hacking. The hackers in this period were mainly skilled workers who were proud of their work and found joy in doing so. The ?original hacker? at the beginning of computers was a person not looking to harm anyone or anything, but simply looking to apply his special skills to the improvement of the computer field. As they progressed into the 1970?s and 1980?s, the role and sense of computer technology began to change. Computer technology began to be viewed as a tool of power. Many people felt that this tool should be available to all people. In 1984, these individuals began to be referred to as ?second wave hackers.? Second wave hackers (although they did not refer to themselves by this name) were characterized as wanting computers and their computer systems to be designed to be useful and accessible to citizens. In the process, they pioneered public access terminals, computer conference, and personal computers.? As they continued into the mid to late 1980?s, the so-called ?computer underground? emerged. With the emergence of the underground, hacking once again took on another meaning. From that point in time to the present hacking means ?to break into or sabotage a computer system, and a ?hacker? is the perpetrator of such activities.? As time progressed, the definition and societal view of hacking changed...

Loading: Checking Spelling

0%

Read more

Computer Hacking Essay

1594 words - 6 pages Welcome to yet another edition of the Pure Geek Code Article. In this article we explore how to make your own Watermark. (See Left Bottom Part of your Screen. Scroll Down for fun) The Watermark, was originally designed by Geocities. (If I am not mistaken.) They used to add this Watermark to all Web Pages hosted by them. This very soon became very popular and is an excellant way of advertising a product, website or anything else, as it always...

Hacking as a Means of Identifying Weaknesses in Computer Security

1651 words - 7 pages The use of hacking can be very beneficial as a means of identifying weaknesses in computer security. Nowadays, numerous companies and governments use this technique to assess the level of security of their systems and determine if any valuable information is at risk of being accessed unlawfully. Ethical hackers are employed to identify potential threats on a single computer or a whole network of computers. The found potential exploits are later...

The Use of Hacking to Identify Weaknesses in Computer Security

1740 words - 7 pages Introduction The use of hacking to identify weaknesses in computer security has become an increasingly controversial issue in recent years. Awareness of this issue is important, because our ever increasing reliance on technology means that breaches in computer security have the potential to have wide-ranging and devastating consequences to society, worldwide. This essay will begin by clearly defining the term ‘hacking’ and will examine the type...

Is Ethical Hacking the Answer to Ensuring the Safety of Company’s Computer Systems?

1445 words - 6 pages Introduction Modern society relies more on computers and the Internet now than ever before as a means to exchange information. Computer infrastructures are continually evolving and developing which has lead to an increase of reliance on technology, and an increasing amount of personal data being shared between computers and over the Internet. For these reasons it imperative to keep these infrastructures safe from those who do not belong or mean...

Hacking Controversey

1780 words - 7 pages When the public hears the term hacking, they often think of theft, defacement, crime, and other words associated with criminal activities. Nowadays, this view is, in a way correct, but it is not entirely true. It is safe to say that quite a few hackers are bad, but that is because we are in the 21st century. We are the most technological advanced generation to date. The good hackers do far out ways the bad that some individuals commit. The view...

From Hacking to Cyber Terrorism

4086 words - 16 pages From Hacking to Cyber Terrorism Introduction Information technology (IT) is evolving everyday and our day-to-day life is becoming more and more dependent on it. In this twenty first century, we cannot imagine ourselves without emails, online banking systems and health care systems and without World Wide Web. In other words, evolution of IT has given a modern, technologically advanced and convenient life to the society. But, over the time...

Ethical Hacking: The Different Types of Hacking

1061 words - 4 pages For much of the new millennia, computer network and security administrators have faced an ever-growing generation of evil, “Hackers.” Hackers wreak havoc on computer networks that do not have proper protection in place. They steal your information and sell it to the highest bidder, not thinking about what it would do to the person or company that they hacked. Let us take for instance, Edward Snowden, who is currently in Russia seeking asylum...

Computer Hackers and Ethics

1639 words - 7 pages  What comes to mind when you hear the word ‘hacker’? For most it means stealing information through the Internet, gaining illegal access to another person’s PC, or simply - disruptive behavior using a computer. The subject of hacking is no secret to the general public. Many people have been exposed to it by a bad experience or through the news and media. The idea of hacking that is stuck in the minds of people is that of which they have seen in...

Gray-Hat Hacking

2153 words - 9 pages Gray-Hat Hacking Overview Computer security is a growing concern with the onset of always-on connections in the home and the emerging global network. More and more people become connected everyday. The reliance on computers in our daily lives has increased the need for security and has shifted the ethical line for hackers and hacking. “A hacker is someone with deep knowledge of and great interest in a system. A hacker is someone who...

Cyber Ethics: Principles to Combat Hacking

2521 words - 10 pages Introduction Issues of ethics and professionalism had been touch frequently in our current society lately. Experts from a particular field usually and logically should behave professionally or show their expertise to the civilian. However, in fact they are working oppositely and crime their expertise with their knowledge. This actually brought troubles to the outsider or victim and causes them to loss their property or reputation. In information...

Cyber Terrorism

2138 words - 9 pages For my term paper, I researched on Cyber Terrorism. I believe that Cyber Terrorism is a big problem in our society and may even be a worldwide problem for all humanity today. I want to do my term paper on Cyber Terrorism because I had some personal experience with this sort of terrorism. About a two years ago, I encountered a Hacker on America Online. I opened an unknown message in my mailbox that was titled “Free Nude Teens”. Then about a...

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *