Hacking Essay

4628 words - 19 pages

Describe a negative aspect of ICT's impact on the information society. Describe how ICT has brought this about and what society is has done in response to it.AbstractHacking has been and still disease different societies suffer from. The essay aims to provide the reader with knowledge regarding the effects hacking caused to our society, and how the society responded and tried to solve or minimize those effects.Different issues regarding hacking are discussed, such as the motivations that were behind guiding hackers who were at first computer professional to perform unauthorized activities, at the same time a discussion about the types of attacks can be found.The society response to hacking ...view middle of the document...

While Marotta (in Taylor, 1993) has a negative view of the hacker as a data lord, a barbarian who takes what he wants. Himanen (2001) defines hacker as any person who performs illegal actions whether they were related to computer or not which means the usage of a device apart from its functionality. Seems hacking according to Himanen is related to any illegal or unauthorized action. Seebach (1999) finds hacker as a person who feels delighted and full of joy when being able to access a system and break the security utilities but Himanen (2001) doesn't consider hacker as a thief. This definition looks at the hacker as a normal person who is only practicing his knowledge and ability to access what he wants. Williams (2002) goes in the same direction and finds hacker as a knowledgeable person who never stops reading and exploring new technology for the sake of improving himself and might perform illegal actions but his first priority is to look and search for more knowledge. Digital Guards data base (2001) gives the hacker a definition of "a person who enjoys exploring the details of computers and how to stretch their capabilities". Clear from the definitions mentioned above that there is a controversy that encounters the judgment and definition of hacking, controversy aroused because it's hard to decide exactly what the aim is behind hacking or how to know the mentality of the hacker. That's why the ethics and motivation of hackers should be paid attention and discussed then understanding the hacker will be much easier.Who is the Hacker?Hacker is part of the society, a computer professional who wants to use technology for his own benefit Taylor (1999). Seems hackers are experts and professional people who were behind the technology we are enjoying at the moment but at no time and suddenly they began to think about their interests and benefits they can achieve from what they invented. Levy (in Taylor, 1999) described hackers in regard to the history; she divided the life history of hackers into three generations: the first generation of hacking was made of experts of computer programming who never stopped improving their skills then misuse them, the second generation was made of computer hardware developers who found hacking and accessing data and information for free as an appealing idea while the third generation included developers of games architecture. Recently the fourth generation includes any person who has a computer and some knowledge of programming.Pipkin (1997) classification of hackers depends on the functionality, in other words the classification depends on the way hacker interacts with what is being hacked. Hackers were classified into three different types; the first type is called In-house hacker. In-house hacker is an employee who is responsible of operating and maintaining the system, who interacts immediately with the system as programmer or data entry employee and is aware of all the system security capabilities and gaps and...

Other Essays Like Hacking

Hacking Not Mine Essay

599 words - 3 pages Hacking - A case study The Organization A seller of quality model cars based in the UK. The company involved was small, employing fewer than six people. It originated as a mail order company, and saw upgrading to include Internet-based sales as a natural step. They went into this field early, and used their normal Internet Service Provider to develop their online payment system. What Happened The company was infiltrated online by

IS4560 Hacking and Countermeasures Essay

3935 words - 16 pages IS4560 Hacking and Countermeasures ASSESSMENTS Course Revision Table Change Date Updated Section Change Description Change Rationale Implementation Quarter Credit hours: 4.5 Contact/Instructional hours: 60 (30 Theory, 30 Lab) Prerequisite: NT2580 Introduction to Information Security or equivalent Corequisite: None MID-TERM EXAMINATION 1

Csci 5957-904 Ethical Hacking – Final Pape

1177 words - 5 pages CSCI 5957-904 Ethical Hacking – Final Paper The Python debugger PyDBG is very useful tool for reverse engineering applications and analyzing behavior of data used by applications. There are several features built in to PyDBG that help with the probing of applications. Providing a means for user defined call back functions are one of these features that is very useful. These functions can be used to read memory, introduce breakpoints, or

The Most Segnificent Crime in the Uk

521 words - 3 pages Internet hacking is the most specific crime in the UK than my home country The widespread use of the internet especially in the UK gives way to experienced individuals to hack and make access in getting and destroying secret information unavailable for other users. Internet hacking which is a widespread crime in the UK than in Saudi Arabia, cerates unstoppable problem not only in government agencies but also even at private homes. Most

Computer Audit Case 2

547 words - 3 pages As an IT auditor in AlphaCo’s SOX Section 404 audit, my overall assessment would be that AlphaCo passes the compliance audit. The company has done a good job of developing an effective IT system, and it has competently identified and reduced IT risks related to security flaws which were present at the time of the hacking incident. Specifically our IT audit suggest that there are effective internal controls which have been further upgraded to

Cyber Crime

1744 words - 7 pages . Unauthorized Computer Access like Fraud is also punishable under the Fraud and Abuse Act. It is known well by its slang name “Hacking”. Hacking has become one of the biggest problems with the internet because there are so many different forms of it. The different forms of hacking would be national security, illegally obtaining information, affecting United States government computers, intent to defraud, damaging computers, password trafficking

Computer Crime

714 words - 3 pages useful and most are authorized to hack into the systems. Some Hackers believe that hacking is a learning experience; including creative problem solving and educating others about the vulnerabilities with computer security. I feel that Hackers that are trying to protect other people are the Hackers that don’t find themselves criminals; however it is hard to determine in certain cases and situations what is legal and illegal hacking. The White Hat

Evaluating Ethics and Security Within an Organization

1366 words - 6 pages the employees, the customers, and Sheetz itself? For the following things, personal privacy, trade secrets, human error, hacking, monitoring, natural disasters, etc. Sheetz has a Disaster Recovery and Business Continuity Plan for both store operations and our corporate locations.  These and reviewed and updated annually. Our technology security department works to ensure that our computer resources (and data) are protected and all

Invitation to the Youth

2058 words - 9 pages Evaluation Criteria for Participants You might also like: GET FREE EBOOKS Hacking Gmail Account Password How to Hack/Crack Windows 7 Administrator/Logon Password if ... Hack Administrator Password In Windows 7,Xp And Vista Facebook Hacking LinkWithin written Jatin Kharb at 07:40 Email ThisBlogThis!Share to TwitterShare to Facebook Reactions: No comments: Post a Comment Links to this post Create a Link Newer Post Older Post Home

Jet Copies Case Problem

1996 words - 8 pages “IPad’s” Security Breach BUS 508: Contemporary Business August 16, 2011 Strayer University Dr. Robert L. Kight Assignment 4: iPad’s Security Breach This document will attempt to discuss hacking into a Web site. Is it ever justifiable? The document will create a corporate ethics statement for a computer security firm that would allow or even encourage activities like hacking. The document will discuss whether it is important

Case Study of Anz Offshore

622 words - 3 pages Recommendation We at the Ethical center, recommend that News Limited considers society’s change of opinions about the company and loss of confidence after phone-hacking scandal, the law change of limiting the expansion of the company and unethical employment as the most significant organizational behavioral issues afflicting the company. Rationale The reason why News Limited should consider these three issues is because there will be a

Related Papers

Hacking Exposed Essay

737 words - 3 pages Hacking Exposed 1. What was the crime, who was the criminal, who was the victim, what was the resulting damage of the crime? The crime was hacking into a neighbor’s Wi-Fi network in 2009 and using it to try and frame them for child pornography, sexual harassment, and various kinds of professional misconduct and to send threatening e-mail to politicians, including Vice President Joe Biden (Kravets, 2011). The criminal was Barry Ardolf the

Ethical Hacking Essay

5637 words - 23 pages This page was intentionally left blank This page was intentionally left blank Hands-On Ethical Hacking and Network Defense Second Edition Michael T. Simpson, Kent Backman, and James E. Corley ———————————————————————— Australia • Brazil • Japan • Korea • Mexico • Singapore • Spain • United Kingdom • United States Copyright 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part

Hacking And Ethics Essay

1202 words - 5 pages Hacking should not be considered a crime, but rather, a pursuit of knowledge. Computers and microprocessors have given rise to new types of crime. Computer hacking is, seemingly, one of these crimes. People hack for various reasons, but to say they all intend to steal or purposefully cause disruption would be unjust.A hacker is an individual who enjoys the intellectual challenge of creatively overcoming limitations, namely in the fields of

The Cyber Crime Of Hacking Essay

669 words - 3 pages software programs or any programmable gadget that could facilitate cybercrime. They should then distribute these programs to the employees giving them passwords and pins or other authentication systems that could help in prevention of hacking. They should also update these systems to their latest versions and patches. Making employees sign a code of ethics could also facilitate stopping attacks (Foote D., 2002). Some employees might be experts in