Hackers are the true defenders of cyberspace - Essay Example

Only on StudentShare

Extract of sample
Hackers are the true defenders of cyberspace

There is a great divergence in the understanding of the role of hackers in modern cyberspace. While they are often considered to be criminals, breaking into computer systems to cause damage and engage in personal gain; most hackers are out there for the exact opposite reasons, to help the cyber-environment, and to do something they love. According to Wikipedia, "hacker is extended to mean a person who makes things work beyond perceived limits through their own technical skill." Hackers, then, strive to improve the internet for all users, and not damage or deface what currently exists. Hackers, not crackers (people whose primary goal is financial gain), are the true defenders of cyberspace, in that they work to uncover security flaws, attempt to regulate dangerous or immoral content, promote new technology and ideas, and strive to stop crackers from damaging critical cyber technology. By describing and proving each of the above concepts related to hackers and the defense of cyberspace, this essay seeks to prove that crackers, not hackers, are the primary threat to cyberspace; and that hackers, through their actions and love of technology, strive to and are successful at being the true defenders of cyberspace.All over the world, groups of hackers are gainfully employed as cyber cops, internet security, and virus stoppers. ...
Download paper

Summary

There is a great divergence in the understanding of the role of hackers in modern cyberspace. While they are often considered to be criminals, breaking into computer systems to cause damage and engage in personal gain; most hackers are out there for the exact opposite reasons, to help the cyber-environment, and to do something they love…
Author : tracy01

Related Essays

Ethics in Cyberspace Essay
The issue of cybercrime is among the ethical concerns that have created a dilemma in the contemporary world. From an ethical perspective, it is more acceptable to put an apparent useful program, which is a harmless virus for download on a Website than selling customer details to third party marketing companies without telling the customers. It is more acceptable to put an apparent useful program, which is a harmless virus for downloading than selling the details of customers to the third party. This is because the program may be useful to people, and this is a matter of trying to gain…
5 pages (1255 words) Essay
How to Achieve Business Information Security in Cyberspace
Individuals have also presented the challenge to efficiency through negative responses towards leniency needed to deliver satisfactory results. The provision result in the leakage of secure information to the perpetrators that infiltrate the system and access vital information that may threaten efficiency. The norm presented is in all of the systems, there is a parasite that may jeopardize performance. With the increasing number of users estimated to reach 541.7 million, the technology has been applied in internet connection that witnesses entrance of new users daily. On the massive system,…
3 pages (753 words) Essay
Gambling in Cyberspace the Ethical Dilemma
With the technological advancements, it has become increasingly important to understand ethics related to this phenomenon such as concerning privacy and security issues (Lim, 2007). Online gambling has emerged as one of the most debated issues when the ethics of information technology is discussed. This can be attributed to the fact that gaming industry has started to sweep across the American nation, and as such, a flood of ethical issues has been in tandem with it (Ho?rnle and Zammit, 2010). This paper will discuss the ethical dilemma of gambling in cyberspace. Introduction Online gambling…
6 pages (1506 words) Essay
Hackers
This research paper discusses the philosophy of justification of the end through its means. It highlights some of the laws that provide for the hacking process and explains their provisions on this process. The paper identifies the ethical aspect of hacking, whether the society considers it an ethical procedure or not. It also discusses the various perceptions people develop from various situations and how they handle them. It also explains how the society perceives hackers. It identifies the motivations hackers have when breaking into a computer system and relates their behavior to that of…
5 pages (1255 words) Research Paper
Data Hack at Monster.com
The types of service offered include help with resumes, cover letters, company research, networking, and advice targeted to individuals whose careers are currently in a transitional state. Career-management advisors are on hand for daily chats if required. The site is well organized and easy to navigate.…
11 pages (2761 words) Case Study
Computer system Network Security
The issue of computer security first arose in the 1970s as individuals began to break into telephone systems. As technology advanced in computing, computer systems became targets as well. The need for computer network security system raised when a couple of incidents occurred in the USA. The Federal Bureau of Investigation (FBI) made one of its first arrests related to computer hacking in the early 1980s3. A group of hackers known as the 414s, named after their area code in Milwaukee, Wisconsin, were indicted for attacking 60 different computer systems including the Los Alamos National…
5 pages (1255 words) Essay
why computer talents become computer hackers
In addition, the lack of moral values plays a role in encouraging them to engage in destructive activities. Young people are rebellious in nature. For those with computer talents, hacking provides an effective channel for demonstrating their rebellion. However, an individual’s judgment determines if they will engage in hacking.…
1 pages (251 words) Article
Got a tricky question? Receive an answer from students like you! Try us!