Effects of Computer Hacking

Topics: Identity theft, Denial-of-service attack, Computer security Pages: 2 (376 words) Published: September 5, 2010
Computer hacking is the act of modifying computer hardware or software, in order to cause damage to sensitive data on a computer or to simply steal confidential information. Computer hackers often target home and office computers that are connected to the Internet. The Internet is a gateway for a computer to connect to the world, which also makes it vulnerable to attacks from hackers from across the globe. What are the consequences of computer hacking? Let us find out.

Computer hacking is a breach of computer security. It can expose sensitive user data and risk user privacy. Hacking activities expose confidential user information like personal details, social security numbers, credit card numbers, bank account data and personal photographs. User information, in the hands of computer hackers, makes it vulnerable to illegitimate use and manipulation.

Hackers may even delete sensitive information on gaining access to it. Deletion or manipulation of sensitive data with intent to achieve personal gain is another effect of computer hacking. A user whose computer has been hacked is at the risk of losing all the data stored on his/her computer. Manipulation of sensitive user data is a grave consequence of hacking.

Identity theft is another important consequence of computer hacking. Identity theft is a fraud that involves pretension to be someone else, with intent to gain unauthorized access to information or property. It refers to an illegal use of someone else's identity for personal interest or gain.

The advances in technology have led to the evolution of key-logging software, which is capable of tracking and recording every key stroke by the user, thereby stealing passwords and account details. Another serious effect of computer hacking is the denial of service attack. The DOS attack, as it is called, refers to the attempt of making computer resources unavailable to authorized users. Often, websites fall prey to denial-of-service attacks, whereby they are...
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Computer Hacking Essay
  • Essay on Computer Hacking
  • Computer Hacking Essay
  • Computer Hacking Research Paper
  • Essay on The Negative Effects of Computer Hacking
  • Computer Hacking Essay
  • Computer Hacking Essay
  • Computer Hacking Is It Ethical Essay

Become a StudyMode Member

Sign Up - It's Free