StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Hacker Culture - Research Paper Example

Cite this document
Summary
This paper 'Hacker Culture' discusses that to prevent and the discourage hackers, a person should: use of a 2 way firewall, updating an operating system regularly, Avoid questionable websites, Safe email protocol, Not opening suspicious emails etc. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.1% of users find it useful
Hacker Culture
Read Text Preview

Extract of sample "Hacker Culture"

?Introduction According to Sterling (1993) definition, “The Hacker Crackdown”, the term “hacking” is the act of intruding into computer systems by stealth and without permission.” The word hacker is highly used by computer programmers because hackers are able to crack the codes in the programming language. They seek to exploit the weaknesses in a computer system or a network to be able to access confidential documents and files. The most targeted systems are online businesses, organizations websites, and government websites, among others. For example, in the case of Wisconsin department of revenue, hackers try to change some figures on revenue by finding access to information hence giving false information to public (Jerome, 1990). Hackers may also block the public from logging in to the site hence the revenue details would be inaccessible. This study will focus on hacker’s motivation, their personality, and action. Personality of a potential hacker Potential hackers are people suspected to have intent to circumventing through a computer’s security system for their own personal gain. They may include students, employees, activists, and criminals among others. Normally, the potential hackers have an intention to access the information from Wisconsin department of revenue for commercial purposes. From a psychological view, hackers may be bitter about the unemployment rates in the society or they may be people with an exploration mind. Hackers use vulnerability scanners, password cracking software, packet sniffer software and spoofing attach to enter a system. However, due to the development in technology, such hackers can be identified by recently developed software. Such software is able to identify any unusual activity in the site hence blocking it (Gayle, 1971). Motivation of hackers Wish to make illegal money by stealing Hackers are people with an intention of making an extra income from conning and swindling online businesspersons. By use of their ability to access secured systems, they are able to access important information for example credit cards data, bank details, identity and various other types of information. With such information, they create rogue accounts which they can use to purchase, borrow advance salary, withdraw cash etc. In case hacker accesses information from Wisconsin department of revenue, the government would loss taxes. The hacker would be able to change the income tax values of companies hence making such companies pay small revenue to the government (Jerome, 1986). This would lead to loss of taxes by the government. These unscrupulous individuals always pay these hackers and companies who need to evade paying taxes. Therefore the money they earn acts as motivation to hacking. Intention to use other people’s ideas The intellectual property rights guide intellectual property. The legal systems of different countries have been designed to provide protection against use of other people’s ideas. However, the hackers are able to access such ideas and present them as their own. The information may include innovations, new formulas, and important research. New ideas and plans of Wisconsin revenue department stay at risk if a hacker has access to their files. Through the intention to use the ideas of other people, hackers are motivated to struggle and circumvent a computer’s security system. Intention to reveal industrial secrets Every business keeps records and files away from the public. Their records remain a deep secret that is only supposed to be accessed by authorized persons only. Such secrets include the marketing policies, the purchasing policies, and company’s plans. In addition, it may include illegal business activities used for the benefit of the company. The competitors are guarded from accessing these secrets as way of safeguarding the benefit and future prosperity of the company in the market. Hackers are therefore motivated to work hard and ensure that such vital data is available to the public or to specific competitors (Gu, 2010). Moreover, a hacker who suspects illegal activities in the Wisconsin department of revenue may choose to hack the system to be able to expose the secrets of Wisconsin department of revenue. They do this in efforts to pursue justice to the public hence contribute to the fight against corruption in the society. Fight for democracy and right to access information. Activists and non-governmental organizations involved in the fight for democracy may resort to hacking governments’ computer systems. The failure to provide credible information about the running of government agencies make activists feel oppressed by those in authority. Through hacking into government documents, the hackers are able to release documents about the government. The documents are used to form the basis of the fight for good governance and proper use of government resources. In Wisconsin revenue department, hacking would allow the public to know the amount of taxes collected and ensure that all the taxes can be accounted for (Aura, Jarvinen, & Nyberg, 2012). Therefore, the fight for democracy and rights to access information has motivated hackers to try to access information from other computer systems. Need for challenge and fun Some hackers enjoy circumventing into other people’s computers and network systems. This is common with computer science students and software engineers. From a psychological view, these hackers feel superior and develop a sense of pride when they are able to access a secured site. Through their hacking hobbies, the files of Wisconsin revenue department are at risk of being accessed by people of bad motives. Hacking is addictive because a hacker would want new challenge in the case that he/she is able to circumvent every system he comes across hence challenge acts as a motivating factor to hacking. Cyber terrorism Terrorist are people motivated by religious and political beliefs to create fear and murder among people. Through, hacking into security systems, they access information, which could be of importance in their activities. When these terrorists access information about a countries security details, they are able to plan how to strike hence causing a lot of damage. Hence the information from Wisconsin revenue department may be vital in their motives of creating fear among taxpaying citizens. The motivation to create fear through terrorism compels the terrorist hackers to access struggle and access information from the security agencies. Data security in Wisconsin revenue department The government of the great state of Wisconsin has continued with the tradition of negligence about the citizen’s data security. Since 2006, four incidents of exposure of private data have been witnessed; three of which are from the department of revenue. For example, in 2006, 171000 tax booklets with social security numbers printed on the top were distributed to the public. Even though the department acted fast and intercepted about 54,500 booklets; that act still had to cost the tax payer 500,000 dollars in credit monitoring to avoid fraud. If these social security numbers were to get in to the hands of hackers, then the citizens of Wisconsin could have had to deal with loss of funds due to fraud. Such frauds due to hacking would cause innocent people to suffer because of the mistakes of those in authority. In august 2012, the Wisconsin department of revenue accidentally released 110,795 Social Security numbers and tax ID numbers to the public. The information was embedded in a real estate report and was posted in the website for three months before being removed. These confidential personal details of Wisconsin residents may have fallen into bad hands because a report showed that 138 people downloaded these details. Among the 138 people, a hacker may have downloaded the document. A hacker’s access to these social security numbers and tax ID numbers is dangerous to the citizens of Wisconsin because he/she is able to create rogue accounts for fraud purposes. In January 2008, the Wisconsin department of revenue did the earlier mistake and mailed 5000 tax forms with the social security number clearly visible through the envelope window. Even though they blamed the error to be on the folding machine, the exposure was not a justifiable reason to expose personal and confidential information to the public. The department should have held responsible the workers managing the folding machines and also ensured that there is inspection of the letters before they are mailed. Exposure of such information puts the residents of Wisconsin state at risk of falling prey to hackers. Indeed the Wisconsin department of revenue has showed negligence on confidentiality of personal data of its citizens. The repeat of previous mistakes shows lack of commitment in putting long lasting solutions to the tradition of information leakage to unauthorized persons. Even though the department claims to be taking stringent measures when such a leakage occurs, they have not done much in credit monitoring. This is because hackers and fraudsters would have to wait for just a year before they start cashing in illegal money. Therefore, the department should learn from previous mistakes and act fast to ensure that every individual in the great state of Wisconsin feel safe about the security of his/ her personal details. Threats posed by hackers to Wisconsin department of revenue Loss of taxes due to rogue businesses Due to the modern technology, many business activities take place in the internet. People are able to transact international trade through internet because internet is the most efficient considering the distance factor (Adyta, 2006). To transact such businesses, online forms of payments such as PayPal, MasterCard and visa are required. With the transfer of such confidential data, the internet has become vulnerable to hackers. Hackers are able to access such information hence forming rogue accounts. Access to the social security numbers and tax ID numbers gives hackers an easy time in creation of such rogue accounts for fraud purposes. Therefore, they are to access the credit cards, steal money from accounts, make purchases, order cash advance etc. These have limited the number of online transactions hence a hindrance to international trade. Hence, Wisconsin department of revenue is unable to raise the required amount of taxes from the public due to such rogue businesses. Loss of public confidence Wisconsin department would have a bad public image if a hacker accesses its files. Hackers reveal the personal information of the taxpayers; a move which would result into public outcry about the security system of the department. Loss of confidence in Wisconsin revenue department would therefore lead to lack of co-operation in paying taxes hence the government would loss a lot of money. In addition, public confidence is necessary for the success and prosperity of the state of Wisconsin. Hence, for the people of Wisconsin to achieve their American dream, they need to be confident that those in authority are doing their best in ensuring that every individual’s funds in banks are safe. Threat to local and international security The exposure of documents from governments is a threat to both local and international security. These documents are government secrets used to safeguard security issues in a country and maintain a cordial international relationship. Due to hacking, criminals and crime gangs can use this vital security information to carry out criminal activities. This is because they know the moves that the police would make hence they are always a step ahead. In addition, exposure of hacked diplomatic documents can cause instability in the world community. The diplomatic secrets have to be guided for the sake of maintaining friendship between countries. In the case of Wisconsin department of revenue, the criminals can be able to access the salary information of the citizens, which make them resort to armed robbery. Moreover, protests by civil rights organization against exposure of private information by hackers may lead to street fights between the police and the protestors hence insecurity. How Wisconsin department of revenue can discourage hackers Use of a 2-way firewall Firewall plays a vital role in the protection of the security of a computer and a network system (Hippe, 2012). A shared network system, like that of the Wisconsin department of revenue, is always vulnerable to attacks due to the large number of users; however, a two-way firewall is able to discourage access of hackers into the network system. Updating an operating system regularly In the modern world, the more sophisticated hackers develop new methods of hacking into systems. Due to such developments, the software developers task themselves to develop a more hack proof system. These developments have led to innovations about the computer and network security system. Hence, there is need for Wisconsin department of revenue to constantly update their computer system. Failure to update leaves the computer system vulnerable to hackers. Avoid questionable websites By use of viruses and worms, hackers can be able to access a security system. Such viruses and worms are normally posted in questionable websites, which offer free software downloads. Downloading this newly developed software allows the hackers to enter into the security system and cause damage (Samarati, Tunstall & Posegga, 2010). Therefore, avoiding such websites discourage the hackers from accessing your security system. Wisconsin department of revenue can block the users from accessing such questionable websites as a way of protecting their computer system from hackers. Not opening suspicious emails Computer generated emails may contain a software that allows the hacker to access the operating system of the computer. Such emails should be totally deleted from the inbox and spam folder as a way of preventing your system from hacker attacks. Wisconsin department of revenue should therefore ensure that the emails are scanned before being opened. Not installing software which is vulnerable Some software is vulnerable to viruses and worms, which may be used by hackers to access a security system. To prevent such a hacking activity, the PC owners should be careful with the authentication of the software that is to be installed. They should ensure that only original and legitimate software is installed into their systems. The Wisconsin department of revenue should always install genuine software to discourage the hackers from accessing the computers security system (Pejas & Piegat, 2005). Methods of defense against hackers Anomaly based intrusion detection system These system works to detect any network activity that is not normal. For example, if the user protection system detects access to a large number of records at the same time, the cause is likely to be an attack. Moreover, if a user with permission to access a restricted set of records begins to attempt to access other types of information, the users’ workstation is likely to be infected. This system is configured to recognize expected patterns of activity from a given user. Any anomaly is detected and prevented at an early stage. With technological development in the world, previous versions of the anomaly based intrusion detection system have been found to be inefficient, making updating a requirement. The updating of this software allows for a more competent security system hence prevention of attacks. Installing this software would ensure security of the documents in Wisconsin department of revenue. Configured IPS to defend system against complex attacks This is mostly used in the signature-based systems. For signature-based systems, the signature may be spread across a series of commands with no packet matching an attack profile. Anomaly based systems may fail to detect a legitimate but may cause application host to cause breach through redirecting. Therefore, the configured IPS system is used to defend against complex attacks. This software would be important for Wisconsin department of revenue bearing in mind the nature of hackers who may try to circumvent its security system. Conclusion In conclusion, hackers are able to access computer systems consequently exposing confidential information to the public. They are mostly motivated by profit gains, wish to steal other people’s ideas, fight for democracy and freedom to receive information, terrorist activities while others for fun and crave for more challenges. The activities of hackers have led to decline in international trade, bad diplomatic relations between countries and increase in crimes within a country. To prevent and the discourage hackers, a person should: use of a 2 way firewall, updating an operating system regularly, Avoid questionable websites, Safe email protocol, Not opening suspicious emails etc. In addition, Anomaly based intrusion detection system and Configured IPS to defend system against complex attacks from hackers. Due to the demerits of hacking, software that is more complex should be developed to prevent the hackers from accessing secured systems. The security of computers systems of Wisconsin department of revenue is vital for the tax records hence its credibility depends on a more secure site. The revenue department should us the above methods to avoid being victims of the ruthless hackers. It is crucial for administrations should also be recognized that although with an improved effort to focus on cyber security, various vulnerabilities might till omission through into released products. Therefore, administrations should strongly perform contingency measures. Thus, it is indispensable to make the users or customers more accessible to updates software could be required and that, in the greatest cases, they are at present available. This reach has required proposing that, government faces a number of new instantaneous and future cyber security threats that must be recognized in due to protective action to be taken. References Adyta, B (2006) Information’s system security: New York, NY: Springer. Aura, T Jarvinen, K., & Nyberg, K. (2012) Information security technology for application: New York, NY: Springer. Gayle, B. (1971). Digital networks and computer systems: New York, NY: John Wiley publishers. GU, Q. (2010). Security in emerging wireless communication: New York, NY: Springer. Hippe, Z. S. (2012). Human-Computer System Interactions: Background and Application. New York, NY: Springer. Jerome, S. (1986). Computer and information system: New York, NY: Hurt publishers. Jerome, S. (1990). Computer systems fundamentals and basics: Oak Brook, IL: Dryden press. Pejas, J & Piegat A. (2005) Enhanced methods in computer security, biometrics and artificial intelligence: New York, NY: Springer. Samarati, P Tunstall, M & Posegga, J (2010) Information security theory and practice: NY Springer. New York, Print Sterling, B. (1993). The Hacker crackdown: Law and disorder on the electronic frontier. USA: Mass Market Paperback. Bisong, A., & Rahman, S. M. (2011). An overview of the security concerns in enterprise cloud computing. International Journal of Network Security & its Applications, 3(1), 30-45. doi: 10.5121/ijnsa.2011.3103 Ezingeard, J. & Bowen-Schrire, M. (2007). Triggers of change in information security management practices:Journal of General Management, 32(4), 53-72. Kalyvas, J. R., Overly, M. R., & Karlyn, M. A. (2013). Cloud computing: A practical framework for managing cloud computing risk--part I. Intellectual Property & Technology Law Journal, 25(3), 7-18. OGIGAU-NEAMTIU, F. (2012). Cloud computing security issues: Journal of Defense Resources Management, 3(2), 141-148. Purtell, T. (2007). A new view on it risk: Risk Management (00355593), 54(10), 28-33. Singh, T., & Sharma, K. (2011). A survey of security issues in cloud computing. International Transactions in Mathematical Sciences & Computer, 4(2), 411-424. Sipior, J. C., & Ward, B. T. (2008). A framework for information security management based on guiding standards: A united states perspective. Issues in Informing Science & Information Technology, 5, 51-60. Stewart, J., Chapple, M. & Gibson, D. (2012). CISSP Certified Information Systems Security Professional Study Guide, (6th ed.). Indianapolis: Indiana, Wiley publishing, Inc. Talbot, C. (2012). The state of cloud computing: Getting real in 2012. Channel Insider, 1-4. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Hacker Culture Research Paper Example | Topics and Well Written Essays - 2000 words”, n.d.)
Retrieved from https://studentshare.org/information-technology/1471199-hacker-culture
(Hacker Culture Research Paper Example | Topics and Well Written Essays - 2000 Words)
https://studentshare.org/information-technology/1471199-hacker-culture.
“Hacker Culture Research Paper Example | Topics and Well Written Essays - 2000 Words”, n.d. https://studentshare.org/information-technology/1471199-hacker-culture.
  • Cited: 0 times

CHECK THESE SAMPLES OF Hacker Culture

Sec 305 Week 4 assignment

The hacker set up an email account that would be gotten rid of later.... When the virus had completely configured itself the hacker had full control of the machine.... With the hacker's manipulation, the virus searched for files in the system.... It then archived them and sent them back to the hacker through File Transfer Protocol or Hyper Text Transfer Protocol....
3 Pages (750 words) Essay

Computer Hacker

Nonetheless, depending on the kind of system jacked into, as well as the kind of information that is accessed, the actions of a computer hacker might result in negative outcomes, basing on how he or she manipulates and uses the information accessed.... For instance, if a hacker hacks into the system of a telephone company, he or she might make calling cards, and change phone numbers, among others (Sterling, 1989)....
6 Pages (1500 words) Research Paper

Wide Spread of Hackers Slang

Raymond (1996) writes, "The Hacker Culture' is actually a loosely networked collection of subcultures that is nevertheless conscious of some important shared experiences, shared roots, and shared values.... Because hackers as a group are particularly creative people who define themselves partly by rejection of normal' values and working habits, it has unusually rich and conscious traditions for an intentional culture less than 40 years... Many words in hacker slang have to be understood as members of sets of comparatives....
5 Pages (1250 words) Essay

Unethical Behavior at All Levels of Society

While unethical behavior exists at all levels of society in some form in varying degrees, cyber crimes have been escalating.... Hacking… Hackers are motivated by intellectual curiosity.... The more secure the system the more interested they become (Hulme, 2000).... Most often they are Hacking and cracking, under no circumstances, can be considered ethical....
6 Pages (1500 words) Research Paper

Who Are the Hackers and What Do They Do

rdquo; Hackers first got recognition in the 19060s by the Hacker Culture around TMRC and the MIT labs.... Being a hacker is a one-way ticket to being an outcast, both socially and morally.... Even the Encarta dictionary tells about the difference between them: “cracker is someone who is a computer user, and who gains unauthorized access, to a computer or system data, belonging to someone else, and the hacker is somebody who is interested or skilled in computer technology and programming....
8 Pages (2000 words) Case Study

Methods Employed by Organization to Discourage Hackers

The basis of Hacker Culture was born in the computer lab as a result of computer programmers doing all in their authority to request, scrounge or steel computing property.... The first meaning is the individual who pose safety threat to computer network and the second meaning is simply a person or people who use… The hacker civilization is actually a loosely related collection of subcultures that is yet conscious of some significant shared experiences, shared ancestry and communal principles....
5 Pages (1250 words) Assignment

Risks of Using the Internet

"Risks of Using the Internet" paper takes into consideration the myriad risks internet users face from cybercriminal activity around the world, and by examining what governments and internet builders are doing to get rid of or alleviate these problems.... hellip; Internet users must be vigilant enough to keep their computer's anti-virus software updated with the latest improvements....
5 Pages (1250 words) Coursework

Anonymous: The Voice of the People

The author clearly and critically discusses the hacker group called “Anonymous,” who they are, what they do, and why they do the things they do.... In spite of these, the Anonymous hacker group can be considered as a group that fights for peoples writes by confronting companies that do illegal things, especially against the public that no one else would dare....
6 Pages (1500 words) Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us