In Partial Fulfillment of the Requirements in ENGLISH 2
Capistrano, Joseph Michael
Chavez, Julius Rey
Ms. Lhara May P. Laureta
Hackers are computer aficionados, who are most of the time polished with various computer languages. There is a community, a shared culture, of expert programmers and networking wizards that traces its history back through decades to the first time-sharing minicomputers and the earliest ARPAnet experiments. The members of this culture originated the term ‘hacker’. Hackers built the Internet. Hackers made the Unix operating system what it is today. Hackers run Usenet. Hackers make the World Wide Web work. If you are part of this culture, if you have contributed to it and other people in it know who you are and call you a hacker, you're a hacker. On occasions, hackers are commonly smart, intelligent and clever to bypass a system. The term can be either positive or negative, although it is developing a much increasing negative connotation.
Hackers are one of the most underrated members of today’s Information Industry. Most of the time, hackers are even associated with negative aspects. This concept has been fixed in people minds, and should be altered. The pejorative sense of a hacker is becoming more prominent largely because the popular press has opted the term to refer to individuals who gain unauthorized access to computer systems for the purpose of stealing and corrupting data.
Statement of the Problem
The purpose of this study was to investigate the primary impacts of Hacking on various Information and Data systems, particularly focusing on the misconception of the individuals as hacking is always defined as negative.
This study sought to:
1. Describe the impacts of hacking within a system.
1.1 Negative impacts
1.1b Identity Theft
1.2 Positive Impacts
1.2a Ethical Hacking
2. Asses the use and functionality of different hacking securities.
2.3 Antivirus/Malware Software
Significance of the Study
The purpose of this study is to provide enough knowledge to certain individuals about Hacking.
With the completion of this study, the researchers expect that this paper would be of reference, help, source and guide to the following:
Information Technology Students - This study will help the students to develop their knowledge and skill if he or she pursues to learn about hacking. Information / Computer Industry - This study will serve as a reference and be a possible inspiration for the beginning of descriptive research which would be substantial in the field of Information Industry.
Professor and Administrator - This study hopes to help the professors in educating future information and computer specialists, considering any type or group of people relating in all aspect of information technology. Also, to give insight on how to prevent and troubleshoot systems specifically target by hackers
Scope and Limitation
The amplitude of this study focused on the impact of hacking on various information systems.
This study was limited to the benefits, types, and securities of hacking. Laws and guidelines were not tackled.
Method and Materials
The researchers used a descriptive method of research because it seeks to identify and determine the impacts of hacking on various information systems. Descriptive research is used to observe, describe and gather information in relation to the current situation of the peculiarity to describe “what exists” with respect to variables or predicament of the situation.
The following instruments will be used to gather data.
The researchers made use of books, articles, and the internet as...