Hacking

1841 words - 8 pages

Intro Sample...


The Good, The Bad, and The Inbetweens of Hacking
“During a three-day period in February 2000, some of the most high-profile sites on the World Wide Web were temporarily knocked out of service.”(Issues and Controversy) This quote is one of the many that show the down side to hacking. A hacker is a person who takes pleasure in understanding the internal workings of a systems. This does not necessarily classify hackers as bad. There are good hacking and bad hacking. But on the subject of hacking, its unclear whether or not they are truly good or bad. Not every single hack is bad.
From the computer stand point, a hacker is a person who wants “ to gain access to a computer illegally.” (Webster Dictionary). But that is only one part of... View More »

Body Sample...


White hats, grey hats, and black hats are the 3 classifications. (Arnone)
White hats are the good hackers, these are the hackers that aid websites and developers in creating better software and protection for computers. These will be things such as firewalls and anti virus software. Grey hats are the inbetween guys, the researchers. These are the guys that are neither good or bad, they inform people of vulnerabilities, where or not they secure the information is known. This is why they can be considered bad, yet good at the same time.
On the discussion of hackers, the good side does have a nice argument. The people who are white and grey hats have majorly helped out the protection companies. The CIA is even looking for hackers to help them in their defense. The fact that they are some of the best defenses against black hats is what really gets people to want them. And there are some white hats that really show through others like Johnny Long.
“Another problem is that government and industry have fallen for the negative hacker stereotypes shown on film and television, and are not using valuable, available assets.” (Arnone). Its thanks to Hollywood and authors that hackers have developed stereotypes. Hackers are seen as negative things, since movies such as “Cyberwars” and “Live Free Die Hard” have displayed them as bad. What the movies fail to do is classify the different kinds of hackers. In “Live Free Die Hard”, they did try to separate the black hats and the white hat. The main character was a black hat, but when he found out his own program was being used for ...

Read More

Related Essays on Hacking

  • Computer Hackers 2

    1317 words - 6 pages

    Computer hackers in today's world are becoming more intelligent. They are realizing that people are developing more hack-proof systems. This presents the hackers with a bigger challenge, which brings out more fun for them. The government is realizing this and needs to make harsher laws to scare the hackers more. With the increase in hacking and hacker intelligence, governmental regulation of cyberspace hasn't abolished the fact that it's nearly impossible to bring a hacker to justice. Kevin Mitnick, a hacker who has yet to have a harsh punishment when caught, can somehow lower his pu

    View Document »

    Hacking

    1271 words - 6 pages

    Hacking Michelle Goble Com/170 Dorothy Peters Hacking The Merriam-Webster dictionary defines hacking as “the ability to secretly gain access to a computer system in order to get information and cause damage” (Hackers, 2014). Companies spend millions of dollars in order to protect their businesses as does the general public in order to protect their home computers, laptops, and cell phones. The notion of the ethical hacker is often times left on the back burner. In a technology driven world the risk of having privacy invaded and information stolen is high,

    View Document »

    Outsourcing

    2176 words - 9 pages

    Download the original attachment Introduction: Identity theft occurs using some kind of hacking technique which is a big crime in the United States. We work daily to ourselves and for our families. We make use of credit cards and social security numbers in our life. We will get some benefits if we live our life with some restrictions. But what happens is sometimes in our life, some people will make use of our social security number or credit card number for their own purposes. For example, they might open bank accounts, take loans; they will do crimes using our names.

    View Document »

    Internet Risks

    1581 words - 7 pages

    One of the first risks we take on the internet today is hacking. Hacking is a growing threat in our society. Anyone with a PC and internet access could find a way to get into your personal information. More and more of our information is stored online each day for access quickly and easily, but, is it safe and secure? With wired internet becoming a thing of the past, it is turning out to be very easy to just grab information out of thin air. Companies are spending thousands of dollars to make sure their networks are safe and free of hackers. "For a potential hacker it is almost a case of w

    View Document »

    People Hacking The Art Of Social Engineering

    4194 words - 17 pages

    ABSTRACT Social engineering is one of the most overlooked aspects of information security and yet it is the easiest way for someone – usually an employee - to gain access to restricted information on a computer network. Attacks can be either physical or psychological; each can be equally effective in acquiring confidential information. Methods used to get information can be either human- or computer-based, with different psychological reasons why each method works. Protecting against social engineers boils down to policies that guard against their attacks, but these policies must also be c

    View Document »

    Cyber Crime

    2079 words - 9 pages

    INTRODUCTION The impact and influence of the Internet over the past ten years has been immense. During that time, access to the Internet has grown enormously. In 1996, 3.4 million UK adults were online. By May 2001 10 million homes in the UK were connected to the Internet. A survey last year estimated that 34,104,175 people in the UK have Internet access. The rise of this networked society has expanded the range of information available to individuals and made many tasks easier to handle. The use of cyberspace for commercial trading represents a colossal opportunity to enhance and cheapen

    View Document »

    First Step

    1261 words - 6 pages

    When most people think of hackers, they do so with a very limited understanding of what a hacker really is. Everyone has heard of computer viruses, but the virus is just the tip of the iceberg when it comes to hacking. In order to understand hackers and the crime of hacking, you must first learn the different classes of hackers and what the criminal hackers are looking for. Hopefully through a basic understanding of the threats out there, computer users will learn the importance of protecting themselves. Digital assets are often the target of a hacking attack. Whethe

    View Document »

    Technology Laws And Acts

    1013 words - 5 pages

    Data Protection Act 1998 This law makes sure that businesses do not wield peoples information in a way deemed unfair to the customer or underhand it protects the customer and the details they have given in confidentiality, organisations cannot pass on information to third part organisations without the persons written permission however this is normally put down in small print so people agree normally without even knowing what they have done however it makes it illegal to do things like give home adresses to companies wanting to go door to door and pester people unless authorisation is grante

    View Document »

    Anonymous

    1264 words - 6 pages

    On February 28, Interpol announced it had arrested 25 suspected members of the international hacker group Anonymous. The arrests, carried out in more than a dozen cities in Europe and Latin America, resulted in the confiscation of hundreds of pieces of computer equipment, mobile phones, credit cards, and cash. (It also was followed by an attack on Interpol's website.) The suspects, reportedly aged between 17 and 40, were believed to be planning coordinated cyberattacks against institutions including Colombia's Defense Ministry and presidential websites. With s

    View Document »

    Computer Crime And Its Effects On The World

    1482 words - 6 pages

    Computer Crime has become a very large issue in our society today; this paper will look at this issue from a sociological perspective. It will analyze the various crimes that make up computer crime and see what changes it has brought about in the world in which we live in. Computer crime first is a very new problem in our society today and it is crimes that are committed from a computer. These include embezzling, breaking into other computers, cyber porn and various other crimes that have a drastic affect on the society and the institutions that each of us hold to keep our global society runni

    View Document »

More Popular Essays

Research help is just moments away!