Preview

Computer Hacking is Ethical

Better Essays
Open Document
Open Document
2912 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Computer Hacking is Ethical
Austin Ayers
English III Honors
Mrs. Mills
14 December 2012
Computer Hacking is Ethical Computer hacking is a term that most everyone in today’s society is familiar with. When the average person hears news about computer hacking, most likely they think about cyber-crimes, website defacements, or knocking various websites offline. This inaccurate description is just the image that today’s media creates. In reality, true hackers are much different. Computer hacking is not the only type of hacking in today’s society. Hacking actually originated from phreaking, which is the art of cracking a telephone network (“A Brief History of Computer Hacking”). Hacking is seen as being blackhat, or wrong, when hacking can also be beneficial to the world. There are different types of computer hackers: “Hacktivists,” ones who hack to express a political opinion, “Hobbyist” hackers, those who hack for enjoyment, and “Research hackers,” those who hack to learn about security and fix vulnerabilities (“License to hack? - Ethical hacking”). As mentioned before, the first computer hackers were not people who were hacking to earn some quick cash. In 1878, two years after the telephone was invented by Alexander Graham Bell, a group of teenagers who worked to maintain the New York switchboard were fired because they were interested in seeing how the phone connections were made and how the calls were distributed to specific locations. Their actions were essentially the equivalent of early computer hackers. These boys were trying to break into the telephone system to understand and see how the switchboard worked (“Timeline: A 40-Year History of Hacking”). Computers were not always in the easy to use, graphical interface they are today. Along the time period of the 50s, mainframe computers were very popular. Most universities and companies would have rooms dedicated to containing these mainframe1 computers, which were essentially a large chunk of metal locked away in a controlled

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Nt1310 Final Exam

    • 393 Words
    • 2 Pages

    Computer Hacking in 1960’s up to 1970’s – an individual working with computers who were technically gifted and skilled it was defined by computer ethicist Duncan Langford (1995).…

    • 393 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    It530

    • 681 Words
    • 3 Pages

    hacking. In what ways does ethical hacking differ from “black hat” hacking? Put yourself into the…

    • 681 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Peter Krapp Analysis

    • 703 Words
    • 3 Pages

    Peter Krapp builds a well-constructed argument designed to persuade readers that computer hacking is a danger that steals our most valuable possession—personal information—from our most vulnerable people--students. The article focuses on personal information about college students stolen from college computer networks. The writer builds his argument brick by brick. He starts by giving an example of student data stolen from a college by hackers in China, relating his topic to an event that really happened. The writer quickly establishes himself as an expert in the topic so readers can trust his information. Krapp asks and answers questions about the theft of data, goes into more depth about the type of information stolen from college networks, and then briefly touches on the laws, or the lack of laws, to protect students. He points out that data is stolen from students by not only foreign hackers, but also by American companies. The writer finishes with a call for colleges to protect student data, clearly stating his purpose.…

    • 703 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Acquisitions and Development Editor: Jeff Kellum Technical Editor: Sondra Schneider Production Editor: Rachel Meyers Copy Editor: Tiffany Taylor Production Manager: Tim Tate Vice President and Executive Group Publisher: Richard Swadley Vice President and Executive Publisher: Joseph B. Wikert Vice President and Publisher: Neil Edde Media Project Supervisor: Laura Atkinson Media Development Specialist: Steve Kudirka Media Quality Assurance: Angie Denny Book Designers: Judy Fung and Bill Gibson Compositor: Craig Woods, Happenstance Type-O-Rama Proofreader: Nancy Riddiough Indexer: Ted Laux Anniversary Logo Design: Richard Pacifico Cover Designer: Ryan Sneed Copyright © 2007 by Wiley Publishing, Inc., Indianapolis, Indiana Published simultaneously in Canada ISBN-13: 978-0-7821-4437-6 No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permission should be addressed to the Legal Department, Wiley Publishing, Inc., 10475 Crosspoint Blvd., Indianapolis, IN 46256, (317) 572-3447, fax (317) 572-4355, or online at http://www.wiley.com/go/permissions. Limit of Liability/Disclaimer of Warranty: The publisher and the author make no representations or warranties with respect to the accuracy or completeness of the contents of this work and…

    • 27476 Words
    • 110 Pages
    Good Essays
  • Good Essays

    Ethics of Hacking

    • 275 Words
    • 2 Pages

    Cracking is the correct concept for deconstructing/sabotaging in the cyberspace/Internet, e.g. by circumventing the security of a website and posting your own (critical) stuff on their site or spreading viruses in the Internet. Hacking, on the other hand, is about using and reconstructing the computer or other machines/systems in a new and (by the "owners" and "inventors") unintended way. Hacking is about reclaiming the system, manipulating it and using it, not destroying it. Both terms define people who can break into computer systems and rewrite programs, but hackers do not use their knowledge offensively or illegally. Crackers use their skills for illegal use: distributing pirated materials, stealing money and identities, etc.…

    • 275 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    When we hear the word hacker we think of a person who has gained access to a system they do not have permission to access. “The first generation of hackers who emerged in the 1960s was individuals who would be called technology enthusiasts today. These early hackers would go on to create the foundation for technologies and the Internet such as the ARPANET” (Oriyano and Michael 2). They also initiated many early software development movements that led to what is known today as open source. Hacking was motivated by intellectual curiosity; causing damage or stealing information was against the rules for this small number of people. In the 1980s, hackers started gaining more of the negative connotations by which the public now identifies them. Movies such as War Games and media attention started altering the image of a hacker from a technology enthusiast to a computer criminal (“Hacking History”). During this time period, hackers engaged in activities such as theft of service by breaking into phone systems to make free phone calls. In many respects, the 1980s formed the basis for what a hacker is today. “Over the past two decades, the definition of what a hacker is has evolved dramatically from what was accepted in the 1980s and even the 1990s” (Oriyano and Michael 3). Hacker has become such a universal term. However, there are experience hackers who never break the law, and who define hacking as producing an outcome the system designer never anticipated. Some act with good intentions, others with bad intentions, and yet others with a mixture of both. No matter what the intentions were, the outcomes of their actions affected the world in some way. When popular organizations such as Microsoft and Apple were founded, they open a new and free attitude towards software development evolved (“Hacking History”). However the good came along with the bad. Some hackers were more interested in their own personal gain and strived to circumvent…

    • 2845 Words
    • 12 Pages
    Powerful Essays
  • Powerful Essays

    Ethical Hacking

    • 3757 Words
    • 24 Pages

    Av. Dr. Carlos Bacelar, 968 – Escr. 1 – A – 4764-901 V. N. Famalicão…

    • 3757 Words
    • 24 Pages
    Powerful Essays
  • Powerful Essays

    Ethical Hacking

    • 1563 Words
    • 7 Pages

    Types of Hacker Attacks Hacktivism Hacker Classes Security News - Suicide Hacker Ethical Hacker Classes What do Ethical Hackers do? Can Hacking be Ethical How to become an Ethical Hacker Skill Profile of an Ethical Hacker What is Vulnerability Research?…

    • 1563 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    Hactivism

    • 4539 Words
    • 19 Pages

    Hacktivism is the fusion of hacking and activism; politics and technology. More specifically, hacktivism is described as hacking for a political cause. In this context, the term hacker is used in reference to its original meaning. As defined in the New Hacker's Dictionary, a hacker is "a person who enjoys exploring the details of programmable systems and how to stretch their capabilities" and one who is capable of "creatively overcoming or circumventing limitations". (1) Activism is defined as "a policy of taking direct and militant action to achieve a political or social goal". (2) Therefore, a clinical definition of hacktivism is: Hacktivism: a policy of hacking, phreaking or creating technology to achieve a political or social goal.(3) However, both hacking and activism, and thus hacktivism, are loaded words ripe for a variety of interpretation. Therefore it is preferable not to clinically define hacktivism but rather to describe the spirit of hacktivism. Hacktivism is root. It is the use of one's collective or individual ingenuity to circumvent limitations, to hack clever solutions to complex problems using computer and Internet technology. Hacktivism is a continually evolving and open process; its tactics and methodology are not static. In this sense no one owns hacktivism - it has no prophet, no gospel and no canonized literature. Hacktivism is a rhizomic, open-source phenomenon. In the Beginning... Since hacktivism is a recombinant initiative comprised of two divergent communities (hackers and activists) it is necessary to understand their respective backgrounds in order to analyze this historic merger and to examine its challenges and future capabilities. "Hacker" was originally a term that encapsulated an individual's deep understanding of computer systems and networks and the ability to invent, modify, and refine such systems. It is a…

    • 4539 Words
    • 19 Pages
    Powerful Essays
  • Better Essays

    Ethical Hacking

    • 2948 Words
    • 12 Pages

    Eric Raymond, compiler of “The New Hacker's Dictionary”, defines a hacker as a clever programmer. A "good hack" is a clever solution to a programming problem and "hacking" is the act of doing it. Raymond lists five possible characteristics that qualify one as a hacker, which we paraphrase here:…

    • 2948 Words
    • 12 Pages
    Better Essays
  • Satisfactory Essays

    ETHICAL HACKING

    • 263 Words
    • 5 Pages

    edvindeddy@gmail.com : fb.com/aexle : #Sumit_Lakra WHY IS SECURITY NEEDED? WHAT IS ETHICAL HACKING? HACKERS TERMS • Hacking - showing computer expertise • Cracking - breaching security on software or systems • Phreaking - cracking telecom networks • Spoofing - faking the originating IP address in a datagram • Denial of Service (DoS) - flooding a host with sufficient network traffic so that it can’t respond anymore…

    • 263 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    Hacking

    • 1006 Words
    • 5 Pages

    Computer hacking is most common among teenagers and young adults, although there are many older hackers as well. Many hackers are true technology buffs who enjoy learning more about how computers work and consider computer hacking an “art” form. They often enjoy programming and have expert-level skills in one particular program. For these individuals, computer hacking is a real life application of their problem-solving skills. It’s a chance to demonstrate their abilities, not an opportunity to harm others.…

    • 1006 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Nn Fir Nn

    • 3883 Words
    • 16 Pages

    References: Audit Commission (1994), Opportunity Makes a Thief – an Analysis of Computer Abuse, HMSO Publications Centre, London. Collier, P.A. and Spaul, B.J. (1992), “The Woolwich Centre for Computer Crime Research: addressing the need for UK information,” Computer Fraud & Security Bulletin, August, pp. 8-12. Culf, A. (1996), “BBC acts to thwart political hackers,” The Guardian, February 9, p. 1. Evans, D. (1994), “BA in dock over hacking,” Computer Weekly, April 28, p. 6.…

    • 3883 Words
    • 16 Pages
    Powerful Essays
  • Powerful Essays

    Ethical Hacking

    • 1100 Words
    • 5 Pages

    Hacker (n) – refers to a person who enjoys learning the details of computer systems and stretch their capabilities. Hacking (v) – describes the rapid development of new programs or reverse engineering of already existing software to make the code better and efficient. Cracker – refers to a person who uses his hacking skills for offensive purposes. Phreak – a hacker variant with an interest in telephones and telephone systems. Hactivism – refers to an act of hacking in order to communicate a politically or socially motivated message. An Internet enabled way to practice civil disobedience and protest.…

    • 1100 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    Itrends

    • 1536 Words
    • 7 Pages

    Before the world of computers came up, the word hack is already used a long time ago. From the era of the creative minds, Socrates and Galileo, hack can be a different word to them but it means they have their own theory and techniques on how to manage to run not a system but the mind of others. Having a subject like Information Security, there are some chapters that will be discuss using .PDF files and there will also be a short documentary viewing about hacking. The word hack was already existed since then. It even started on the telephone lines. Some of the hackers are called “phreaks” or “Phone Phreaking”. It is the art and science of cracking the phone network (so as, for example, to make free long-distance calls). By extension, security-cracking in any other context (especially, but not exclusively, on communications networks).…

    • 1536 Words
    • 7 Pages
    Powerful Essays