StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Illegal Actions of Hackers - Essay Example

Cite this document
Summary
This essay “Illegal Actions of Hackers” will cover hacking which may be socially acceptable and illegal. The paper will also discuss the importance of commitment to the hacking subculture, the different types of hackers and their motivation for hacking…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91% of users find it useful
Illegal Actions of Hackers
Read Text Preview

Extract of sample "Illegal Actions of Hackers"

Ethical hacking is legal and is conducted when repairing the networks or testing the security level (Schiller, 2010).Illegal actions hacking which is socially acceptableSometimes the actions of the hacker may be illegal but socially acceptable. For instance, hacking into a corrupt government website may be socially acceptable since the hacker is able to disseminate information on unacceptable government dealings to the public. However, the hacker has no permission to access the website hence unauthorized to intrude into the confidentiality of the information which again makes his or her actions illegal.

Hacking activities may be legal when authorized by the owner of the system like in case of debugging and repairing a network or when the owner intends to know the security level of the system. Unauthorized hacking without any malicious motive is socially unacceptable and illegal (Schiller, 2010). Importance of commitment in the hacker subcultureHacker subculture can be defined as the community of people focused on exploiting computer and networks security (Schiller, 2010). Commitment of the hacker is important since it defines the main goal and motive of hacking and whether the actions are legal or illegal.

The commitment may be unauthorized and illegal like the Black hat hacker malicious activities. The commitment may also to debug or repair security problems which are legal or maybe morally ambiguous and intentional like the gray hat hacker activities (Schiller, 2010).However, hackers have different commitments and motivations according to their motive. All hackers exploit systems vulnerabilities and network loopholes but are classified according to the shade of hat which they “wear” in their hacking operations (Schiller, 2010).

Black hat hackers’ motivations are illegal and their commitment to hacking is usually high. They exploit system vulnerabilities for illegal purposes and personal gain or mischief. White hat hacker tests network and computer systems in order to determine how they are vulnerable to attacks and intrusion. Their motivation is to determine the level of system security hence have a legal commitment (Schiller, 2010). They mainly crack their personal systems or those of their employers with permission.

The motivation is to enhance the system’s security level. Most companies utilize the services of ethical hacking consultants who are trustworthy (Taylor & Caeti, 2006).Gray hat hackers combine features of both black hat and white hackers (Taylor & Caeti, 2006). Their commitment is not to improve the system security or malicious but they can offer information to black hat hackers who may exploit the system. Their motivation is to seek opportunities to become a white hat hacker. They gain unauthorized access to the network hence their actions are illegal.

They disregard the law for their self-interests (Taylor & Caeti, 2006).ConclusionHacking is unauthorized access to computer systems information. Types of hackers include black hat hackers, white hat hackers, and grey hat hackers. White hat hacking is legal and socially acceptable. Black hat hacking is malicious while grey hat hacking is ambiguous.References:Schiller, J. (2010). Cyber attacks & protection: civilization depends on the internet and e-mail. New York. Routledge.Taylor, R & Caeti, T. (2006). Digital crime and digital terrorism. New York. Prentice-Hall.

Read More
Tags
Cite this document
  • APA
  • MLA
  • CHICAGO
(Illegal Actions of Hackers Essay Example | Topics and Well Written Essays - 644 words, n.d.)
Illegal Actions of Hackers Essay Example | Topics and Well Written Essays - 644 words. Retrieved from https://studentshare.org/information-technology/1587725-hackers-week-3
(Illegal Actions of Hackers Essay Example | Topics and Well Written Essays - 644 Words)
Illegal Actions of Hackers Essay Example | Topics and Well Written Essays - 644 Words. https://studentshare.org/information-technology/1587725-hackers-week-3.
“Illegal Actions of Hackers Essay Example | Topics and Well Written Essays - 644 Words”, n.d. https://studentshare.org/information-technology/1587725-hackers-week-3.
  • Cited: 0 times

CHECK THESE SAMPLES OF Illegal Actions of Hackers

Case of Vasiliy Gorshkov and Alexey Ivano

In addition to this, we will also investigate how the FBI used the law to apprehend the cyber criminals and whether their actions should stand scrutiny under the current U.... The second one is using a computer as a weapon to commit crime like illegal gambling or fraud.... The overview has looked at what computer crime is all about and the definition can summarize computer crime as attacking computers of other people by spreading malicious viruses, using a computer to commit crime, and storing illegal information on a computer....
4 Pages (1000 words) Essay

Hackers are the true defenders of cyberspace

There is a great divergence in the understanding of the role of hackers in modern cyberspace.... There is a great divergence in the understanding of the role of hackers in modern cyberspace.... ll over the world, groups of hackers are gainfully employed as cyber cops, internet security, and virus stoppers.... While they are often considered to be criminals, breaking into computer systems to cause damage and engage in personal gain; most hackers are out there for the exact opposite reasons, to help the cyber-environment, and to do something they love....
6 Pages (1500 words) Essay

Password and hacking under the privcy issues

It will analyze the concept of hacking and how it has evolved along time and it will provide a justification for the hackers from the inside point of view.... The law disobedient people have managed to keep pace with the technical development and at present nobody feels hackers view the people's privacy as an unknown intriguing matter, which has to be conquered.... The paper shall present the legislative acts that tend to legally protect personal information from hackers and their practical application in the real life....
21 Pages (5250 words) Research Paper

Unethical Behavior at All Levels of Society

Hacking… hackers are motivated by intellectual curiosity.... hackers are unauthorized but talented people.... hackers, according to Smith and Rupp (2002), belong to five categories.... hackers impersonate and extract valuable information on the corporate computer system.... hackers engage in hacking for the sheer pleasure it provides and they remain committed to the skill of hacking.... hackers consider this to be a harmless act....
6 Pages (1500 words) Research Paper

Hacking and Cracking

According to Syed (2004), hacking is an illegal act if a person does not have authority to perform such actions.... Hacking started way back in the 19th century after the invention of telephones by Bell Company.... The workers hired by Bell Company started… However, computer hacking that is currently widely known started one century later....
4 Pages (1000 words) Essay

E-Commerce - a High Tech for Todays Business

illegal access to computer information is known as 'time and resource theft'.... nbsp; There are also other kinds of theft such as illegal access of company network, personal consulting or private finance.... illegal software copying is also a kind of theft because the software is an asset and it is protected by copyright law and licensing agreement....
11 Pages (2750 words) Research Paper

The Use of Hacking

According to Taylor, the second generation of hackers is credited for bringing computers to the masses through innovations of the hardware (1999, 23).... The third generation of hackers is known for the introduction of computer games and other more complex software.... Taylor describes the fourth generation of hackers as the people “who illicitly access other people's computers” (23).... Knittel and Soto (2003) disagree with the media's description of hacking as attacking other people's computers with the intention of causing harm (6) and instead describe hackers as overly talented persons who use their talents to explore innovative ways of improving how the computers operate by improving the software and hardware of the computers (8)....
10 Pages (2500 words) Essay

The Societys Response on Internet Hackers

… The paper " The Society's Response on Internet hackers" is a good example of a term paper on information technology.... The paper " The Society's Response on Internet hackers" is a good example of a term paper on information technology.... Such criminals are known as hackers and they normally possess the knowledge of stealing or damaging vital information on the internet either from the top-secret government files or even in personal bank accounts....
12 Pages (3000 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us