Preview

Hacking Research Paper

Good Essays
Open Document
Open Document
1380 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Hacking Research Paper
What do you think of when I say the word “Computer Hacker”? You probably think of some sort of criminal bent on gaining access into your bank accounts or remote control over your computer. Granted, hackers have gotten a bad reputation from the media, who sometimes report break-ins of databases, computers, and other virtual resources. However, this does not mean that every hacker has a desire to do harm. In fact, hackers are hardly the bad guys. The word hacker has been so warped and distorted by the media that people now believe that hackers are all criminals and intend to do harm. The truth is, hackers are people and therefore many of them have morals that disallow them to purposely cause harm. I believe that regardless of the stereotypical view of hackers in today’s society, the majority of them help the world of computers rather than damage it. Action should be taken against the people who make the internet unsafe, not the people who make the internet safer.

According to an article in Whatis.com, hackers primarily come in different shades or colors. The article goes on to say that these colors are significant in determining what kind of hacker he/she is. The lighter the color, the less harm a hacker intends. For example, a hacker with good intent and moral standing is called a white hat hacker. Another point made in the article was that the word “hat” after the color of the hacker is meant to be symbolic of old Western movies where the hero always wore a white hat and “bad guys” wore the black hats (Whatis.com). Black hat hackers, as you may have guessed, are the hackers who do intend harm. They deface websites, steal data, and exploit security flaws for personal gain. Black hats are sometimes called “crackers” as well because they crack programs and passwords to gain entry into a location where they are unauthorized to be (morebusiness.com). There are also hackers who are referred to as gray hat hackers. These are the hackers who have ethics, know what’s

You May Also Find These Documents Helpful

  • Better Essays

    Epic Hacking Research Paper

    • 3326 Words
    • 14 Pages

    On Friday Aug.3.2012 Mat Honan’s personal Computer (PC) system was invaded by hackers. In the space of one hour, Mat’s entire digital life was destroyed. First his google account was taken over, then deleted. Next his twitter account was compromised, and used as a platform to broadcast racist and homophobic messages. And worst of all, Honan’s Apple ID account was broken into, and his hackers used it to remotely erase all of the data on his IPhone, IPad, and MacBook.…

    • 3326 Words
    • 14 Pages
    Better Essays
  • Powerful Essays

    Final English 122

    • 1481 Words
    • 6 Pages

    Protecting your personal information both on your personal computer and in other places such as your bank, or your job, has become more difficult with the massive growth of the internet and the expertise of some unsavory characters called hackers, crackers, and phreakers. Whatever they choose to call themselves, they are all thieves, plan and simple. Some people still question whether or not hacking should be illegal. It’s obvious that what hackers do is illegal. A personal computer is personal, and the information on it private. When a hacker invades that privacy, he is trespassing, and when they take your personal information, their committing a form of thievery. In addition to hackers, we now have marketers invading our privacy through the use of cookies.…

    • 1481 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Cyber Crime

    • 1094 Words
    • 5 Pages

    a profit. Hackers hate authority that stands in the way of their financial goals. The penalty for…

    • 1094 Words
    • 5 Pages
    Good Essays
  • Better Essays

    Hacker

    • 1123 Words
    • 5 Pages

    First of all, the definition of hacking and hackers need to be clearly understood so as to have an insight into hacking. Hacking can be defined as any kind of computer crimes. Pirating is the most popular form of hacking, which relates to the stealing information from written software programmes. In the computer security context, hackers are people who try to find the weaknesses of the computer network and exploit the information from software. Hackers may be encouraged by a variety of reasons, for instance profits, protests, or challenges. Hackers can be categorised into the three types, which are black hats, grey hats, and white hats. Black hat group or cracker is expertise in carrying out the harmful to the computer system. A grey hat is a hacking group that will not violate the law and help the government to defend the system. However, grey hat will apply the same methods to revert to black hat approaches. The white hat hacker has their own abilities and professional computing skills to protect the malicious threads and…

    • 1123 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Nt1310 Final Exam

    • 393 Words
    • 2 Pages

    Computer Hacking in 1960’s up to 1970’s – an individual working with computers who were technically gifted and skilled it was defined by computer ethicist Duncan Langford (1995).…

    • 393 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The hacker is one type of computer user, they spend most of their time electronically breaking into other computer’s. The word hacker is synonymous with internet crimes, however hackers are highly intelligent individuals with a vast knowledge of computers. They spend their time trying to break through security systems of various networks connected to the internet. Hackers are infamous for infiltrating CIA databases, credit card companies, or more recently the PlayStation Network and wreaking havoc. These people stay up for hours looking for codes and passwords for various systems on the internet in the hopes of obtaining some sort of valuable information. There are many websites and forums dedicated to this past time which educates the general public as well as new hackers to their game. They know how the computers operate and are usually very familiar with programming languages, so they can create their own programs to break passwords. Half of the time…

    • 1162 Words
    • 5 Pages
    Satisfactory Essays
  • Better Essays

    Computer crime is an ongoing issue that we continuously see, and a major problem with this is that most people do not realize the harm that computer crime can cause. Computer crime is also a niche that continues to grow. This is based on the fact that there are many different perceptions about what computer crime is, and the harmful effects it can have. Because there is a gap between traditional views of what cyber crime is and the actual realities of these crimes, it is a criminal offense that will continue to happen.…

    • 1102 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Tim J. Watts goes more into the dark side of the “hacker” community by bringing up the constant back in forth between computer security officers and the so called hackers. This article, being written this year is able to reflect on the events of September 11, 2001 and new homeland security measures. He represents this viewpoint of a dangerous hacker in his definition: “While some hackers are harmless, others break into systems with the intent to steal information or to do destruction to the system. Hackers performing the latter pose a serious threat to the economic future of the United States” (Watts). Tim Watt outright blames the hacker community of accessing information that should be private. Only looking and reflecting on the serious threat…

    • 154 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Hacktivism Ethics

    • 7214 Words
    • 29 Pages

    E. Spafford, "Are Computer Hacker Break-ins Ethical?," in Computers and Ethics in the Cyberage, D. M. Hester and P. J. Ford, Eds. Upper Saddle River, New Jersey: Prentice Hall, 2001, pp. 332-344.…

    • 7214 Words
    • 29 Pages
    Powerful Essays
  • Good Essays

    Not only am I pursuing a Cybersecurity degree from the University of Maryland University College, but I am planning on making a lifetime career in this particular field, which means I am taking every opportunity possible to learn as much as I can about this career field, and frankly do so with serious passion and dedication. Cybersecurity is one of the few blossoming fields within the U.S. and abroad now in days with all of the new technological advances being made every single day as well as the newly constructed, successful Cybersecurity companies. Every company that wants to protect their classified information hires a Cybersecurity team to keep that information safe and out of the hands of people that could do wrong with that information; even the U.S. government has a massive Cybersecurity program as part of our National Defense to…

    • 824 Words
    • 4 Pages
    Good Essays
  • Good Essays

    In today society where almost everyone has access to technology, where the world is advancing in technology at a fast rate. The government that is also using technology to invade people specifically the Canadian Government.…

    • 502 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Hackers have different opinions and motivations. However, they all share the spirit of challenge and always trying to prove their capabilities of doing what all believe is impossible maybe because they were mistreated, or doubts surrounded their abilities and past achievements. Hackers believe that information should be shared and they fight against information owning. Effects that hacking caused and still causing to the society can’t be ignored. Hacking nowadays is taking new phases and the danger is increasing because we are now living in a society that runs by ICT, and any attack to the ICT especially in advanced countries will cause vital consequences. ICT still lacks a powerful security tools that are capable of tracking, catching hackers, and protecting computer systems from their attacks. My own view is that the best way to protect ICT from hackers is to study their psychology and try to understand their way of thinking, because hackers are human beings, who have two sides; evil and good, and they used to show their good side but suddenly they turned to be evil. The reasons which caused the transformation from good to evil individuals should be studied and given the highest priority in the war against hackers because since we put our…

    • 1291 Words
    • 6 Pages
    Better Essays
  • Good Essays

    We live in the time of the World Wide Web and it brings the biggest changes ever. The effects from this powerful invention, the Internet, has made the world flat and the opportunities huge. Every big change can have an affect on people, it could be positive or negative. In early 2002, researchers evaluated the presence and role of hackers and their role in technological innovations. “A decade ago, people in the tech field were angry that hackers had been labeled the dangerous villains who threatened national security” (Nissenbaum, 2015). This negative association contrasts with the beginning days of the 1970’s when hackers “were seen as ardent if quirky programmers, capable of near-miraculous,…

    • 1234 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    first I want to say that there is an immense difference between coding, white hat hacking, and black hat hacking. The differences between these three is that coding is a programmer with limited experience who writes simple programs like on scratch, however, a coder can also be referred to a very experienced programmer like Dennis Ritchie or Linus Torvalds, a black hat hacker is a person with computer knowledge and is trying…

    • 402 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Nowaday, hacker is someone makes the technology's life to be more interesting. The term hacker has evolved over the years and been growing. For years there existed a fuzzy distinction between good and bad computer hackers, or we also call them white hat and black hat hackers. Whether they are good or bad, we can't negate they don't have any influence on the development of technology. Hiring known hackers to test the security of a system is an example of this idea.…

    • 923 Words
    • 4 Pages
    Good Essays

Related Topics