StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Computer Hacker - Research Paper Example

Cite this document
Summary
The present era is characterized by advanced technological developments. The society today therefore, relies heavily on technology. This paper focuses on the topic of computer hacking and computer hackers, including most of the issues surrounding this topic…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.4% of users find it useful
Computer Hacker
Read Text Preview

Extract of sample "Computer Hacker"

? Computer Hacker By The present era is characterized by advanced technological developments. The society today therefore, relies heavily on technology. Among the different types of technology, computer technology has become widely used today, and this controls important processes and functions in society. However, despite the fact that technology is of great benefit to humans today, the same technology exposes the human race to considerable danger, especially if used in the wrong manner, and with the wrong motives. Nonetheless, with regard to computer technology, this will benefit and serve people in the most appropriate manner, if it is used with the right motives. This paper focuses on the topic of computer hacking and computer hackers, including most of the issues surrounding this topic. The use of computer technology exposes people and organizations to cybercrime. Computer hacking is a major crime in the present world of technology, and can be categorized as a form of cybercrime. Nonetheless, the practice of computer hacking refers to the art of manipulating computer software and hardware in order to achieve a goal, which is different from that of the original creator (Levy, 2010). However, computer hacking might be defined in different ways, as this is practiced in a variety of manners. Nonetheless, from this definition, a computer hacker can therefore, be described as an individual, who engages in, or performs computer hacking. The practice of computer hacking is known to be conducted mostly by young adults and teenagers; however, there also exist elderly computer hackers (Levy, 2010). According to Skibell (2002), computer hackers primarily include individuals that are highly intelligent, especially with technology and computers. These individuals have a passion for computers and enjoy spending time on computers; manipulating it, and making new discoveries about computers. Computer hackers consider hacking as an art, thus they enjoy computer hacking, and possess high-level skills on specific computer programs. Most hackers are self-taught, therefore consider computer hacking as an application of their problem-solving skills. Computer hackers therefore, engage in computer hacking for different purposes. While some do this for fun and to satisfy their egos, others engage in computer hacking for profit or for knowledge purposes (Levy, 2010). Nonetheless, despite the reasons for engaging in computer hacking, this practice is considered neither wholly good nor bad, since this involves a number of negative outcomes. The practice of computer hacking has existed in the field of Information Technology since the past few decades. Computer hacking involves a high level of intelligence and dedication. Hackers are therefore, highly knowledgeable not only in computer systems, but also in the security systems, which people employ to keep hackers out and to secure their systems (Thomas, 2002). In order to hack into systems, hackers are required to have in-depth knowledge on the systems, and most therefore, have to study the particular systems they want to hack into. According to Sterling (1989), in order to gather knowledge, some hackers attend conferences in order to learn about new techniques and easier ways of hacking into systems. After hacking a system, hackers gain access to all kind of information in the system. They therefore, can use the information in whatever manner they wish. They are able to download this information, to copy it to their computer, or even delete the information, among other commands. Nonetheless, depending on the kind of system jacked into, as well as the kind of information that is accessed, the actions of a computer hacker might result in negative outcomes, basing on how he or she manipulates and uses the information accessed. For instance, if a hacker hacks into the system of a telephone company, he or she might make calling cards, and change phone numbers, among others (Sterling, 1989). As seen, computer hacking is considered a form of cybercrime today. Most computer hackers continue engaging in hacking, while knowing that this is wrong. However, for most computer hackers, the thrill that comes with hacking is intense, and this might be the reason for their persistence in the computer hacking practice. Sterling (1986) notes that different countries have their specific laws, which apply to computer hacking. For instance, in the United States, computer hacking is considered unlawful and illegal. In the year 1986, the government of the United States of America passed the Computer Fraud and Abuse Act, which is mainly concerned with the computer technology in the country. This Act prohibits people from breaking into another person’s computer system intentionally. This Act also outlines the consequences of such an act to anyone proved guilty of engaging in it. Nonetheless, this law came after and emphasized the Electronic Communications Privacy Act of 1986, which “outlawed the unauthorized interception of digital communications” (Sterling, 1986, p. 195). Nonetheless, although different countries have the laws that pertain to computer hacking, and which are aimed at controlling this practice, it is quite evident that these laws have not fully served their function, and have not been effective in curbing the practice of computer hacking. Although computer hacking is regarded in negative light in most countries, some organizations have gone ahead to hire computer hackers as part of their support staff. This therefore, brings up the topic of ethical computer hacking and ethical computer hackers. Since computer hackers have grown more intelligent with increasing years, organizations and governments have held with great importance the issue of computer security. This is because these entities utilize the computer and internet for important functions such as advertising, e-commerce, and information distribution and access, among others. Governments keep important personal information, including social security numbers, home addresses, and credit card numbers of its citizens on computers. Therefore, computer hackers have always posed a threat to governments too. In order to address this scenario, and prevent hackers from accessing this important information, governments and some organizations hire professionals, who have knowledge in computer security. These are included in the IT team and help to secure the systems from computer hackers. These computer security professionals therefore, engage in ethical hacking, in order to secure the systems of their employers (Spafford, 1992). Ethical computer hacking is therefore, not considered a criminal offence, since this does not involve unauthorized access into a system. This practice might be likened to the practice of independent auditing, as the independent auditors access the financial records of an organization, and verifies the records. The same way as independent auditors, professionals in ethical hacking gain access to an organization’s system and verify its security in order to protect the organization from malicious hackers (Spafford, 1992). An ethical hacker can therefore, be described as an individual, a computer, and system expert, who hacks into the security system of owners upon their consent, and explores the system to identify any kind of vulnerabilities, which malicious hackers might exploit (Spafford, 1992). Ethical hackers therefore, employ their intelligence and skills to identify any kind of flaws in the security system of organizations, which will then need to be repaired in order to avoid theft and other computer-related crimes by malicious computer hackers. The difference therefore, between ethical computer hacking and malicious computer hacking is that ethical computer hacking involves computer hackers, who do not manipulate computer systems for the benefit of organizations, and not for their own selfish gains (Spafford, 1992). Ethical hackers are also known as white hat hackers, as these do not steal, delete, or distort system information, but instead report problems with the security systems of organizations or individuals, and propose ways of remedying the situation in case of possible vulnerabilities of the system. Nonetheless, the practice of ethical hacking has existed since the past few decades, and some governments and different organizations continue to utilize the services of ethical hackers to protect their security systems. For instance, the government of the United States in previous employed the knowledge and skills of ethical hackers to assess the security system of the Multics operating systems in order to identify possible attacks by malicious computer hackers. Today, it is believed that the United States has employed a considerable number of ethical hackers in its military, as these serve to secure the system of the most important organ in the country. Additionally, other major companies in the world today have maintained the services of professional ethical hackers to protect their security systems from possible attacks and access by malicious computer hackers (Thomas, 2002). Nonetheless, the question of computer hacking, and computer hacking and ethics remain paramount in the present IT generation. Ethics is an aspect, which individuals develop over time; and ethics involves good behavior, which are mainly aimed at improving, and not harming others. In the world of computers and technology, ethics has become an important aspect. In this light, some computer hackers, who hack for fun, have claimed that they hurt no one by “just looking around,” and therefore, their practice should be considered ethical, and nor criminal. Nevertheless, this remains a criminal act, since the individual in the process of hacking for fun, accesses the system information without permission from the owners (Spafford, 1992). Even so, with all efforts of governments, computer hacking has not been eliminated. Governments therefore, need to develop more effective strategies, which might help to curb computer hacking. In order to solve the problem of computer hacking, young enthusiasts interested in computers and computer hacking should be taught about ethics and its importance. In addition, these should be supported to develop a user community, instead of becoming isolated computer hackers. Nonetheless, the practice of computer hacking has been rising considerably in the past years. The major problem of computer hacking is that it infringes on other people’s privacy. More so, since technology levels also keep rising steadily, the future of computer hacking seems bright, as computer hackers will learn and evolve with the increasing technology. However, ethical hackers will also use the advanced technology to offer increased system security to organizations. Either way, computer hacking affects all countries, therefore, it should be the collective responsibility of countries to adopt strategies that will help to curb computer hacking. References Levy, S. (2010). Hackers: Heroes of the computer revolution. California: Octal Publishing Inc. Skibell, R. (2002). The Myth of the Computer Hacker. Information, Communication & Society, 5 (3): 336-356. Sterling, K. (1989). “Computer Crime.” Technology Review. Spafford, E. (1992). Systems Software. Are Computer Hacker Break-ins Ethical? , 41-47 Thomas, D. (2002). Hacker Culture. Minneapolis: University of Minnesota Press. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Computer Hacker Research Paper Example | Topics and Well Written Essays - 1500 words”, n.d.)
Retrieved from https://studentshare.org/information-technology/1484305-computer-hacker
(Computer Hacker Research Paper Example | Topics and Well Written Essays - 1500 Words)
https://studentshare.org/information-technology/1484305-computer-hacker.
“Computer Hacker Research Paper Example | Topics and Well Written Essays - 1500 Words”, n.d. https://studentshare.org/information-technology/1484305-computer-hacker.
  • Cited: 1 times

CHECK THESE SAMPLES OF Computer Hacker

Accidental Heroes in Movies

Whether heroes are born or made is a hotly debated issue.... My position is that heroes are made by the decisions they have had to make under tough circumstances.... In some cases, heroes even come out of breaking the established norms and rules in their respective worlds.... … Accidental Heroes Whether heroes are born or made is a hotly debated issue....
10 Pages (2500 words) Essay

Case of Vasiliy Gorshkov and Alexey Ivano

hellip; With readily available hacker tools that can be used by unskilled people, the police have to intervene to ensure the general public is safe from computer criminals attacks.... Keywords: computer, crimes, police, hacker, attacks, tools.... There are readily available hacker tools that can be used by unskilled people to wreak havoc for financial gain or just for fun.... Case of Vasiliy Gorshkov and Alexey Ivanov First name, last name Name of school Professor Abstract computer crime has become a major issue to teachers, parents, governments and businesses in their effort to curb it....
4 Pages (1000 words) Essay

How the Internet has aided criminal activity

uvenile Computer Hacker Disabled FAA Tower at Regional Airport.... Juvenile Computer Hacker Cuts off FAA Tower at Regional Airport.... A series of commands sent from the hacker's computer immobilized the FAA control tower for six hours in March 1997 (US Department of Justice, 1998).... computer crimes may involve identity theft, cyberstalking, scams and frauds, hacking, creation of malicious codes, child pornography, and… Criminals use computers to facilitate the embezzlement of money and properties; theft of confidential records; and alteration and destruction of valuable files....
2 Pages (500 words) Essay

The Movie The Matrix

The movie is a science fiction and action thrilling film, under the shadow of religious concepts.... The movie is directed by the Wachowski siblings.... The movie revolves round the character of… He learns this from some of the strange rebels and hence, fights for the benefit of the mankind....
4 Pages (1000 words) Essay

Ethical use of information technology

Having occupations of a student at present and previously a Computer Hacker, Ackroyd managed to gather all his… Ackroyd was sentenced prison in 2013, along with his three group mates for two and a half year.... Having occupations of a student at present and previously a Computer Hacker, Ackroyd managed to gather all his courage when he spoke to them about his unethical activities related to Information Technology.... Laughing hacker Who Hit Sony, FBI Now Seeks Legal Lols....
1 Pages (250 words) Article

Assignment 2: Hacking the AIS

Hackers had breached the business's computer the personal information of tens of millions of customers and employees was at risk.... In most case, hacking is done in order to accomplish a particular objective that is outside outside that of the creators.... A person who is consistently engaged in hacking activities… Hacking is a global security breach affecting close to all enterprises and organizations operating on networking or online basis....
5 Pages (1250 words) Essay

Accidental Heroes

This work called "Accidental Heroes" describes several movies where heroes are made by their deliberate decisions to violate the rules established by the society they live in, their government, or their superiors.... The author outlines The Island, The Matrix, Percy Jackson and the Olympians: The Lightning Thief, and Ironman 2....
10 Pages (2500 words) Essay

The Importance and Place of Technology in the Novel Neuromancer

Henry Dorsett Case is a professional Computer Hacker.... The paper "The Importance and Place of Technology in the Novel Neuromancer" states that the author develops reliable conflicts by analyzing the nature of human interactions and relationships in contemporary society.... Technology has become a fundamental feature of human relationships....
5 Pages (1250 words) Literature review
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us