Ethical Computer Hacking

Topics: Black hat, White hat, Grey hat Pages: 3 (1026 words) Published: March 8, 2008
Have you ever been a victim of a cyber crime? Something as simple as a weird pop up that won't go away? Or maybe something a little bit more serious like your personal web page gets hi-jacked? All this "malicious" damage that causes you much grief isn't so much the work of a hacker, per se, but more the work of a "cracker" or a "script kiddie". Now you're confused right? Well let's just say everyone who knows how manipulate a computer isn't doing it on bad and evil terms, like writing a virus to deploy on a certain date to permanently delete certain file extensions. But maybe they're the people sitting hours on end to deploy a fix for that certain virus someone else is writing, or safeguarding a local bank's network to make sure that virus cannot access the banks database. Hacking can be ethical by providing the Internet world with a tightened sense of security by detecting and preventing security flaws before it is too late.

There are a many types of hacks, and hackers in the cyber world. A hack can be any modification done to virtually anything, to make it do something better, or something completely different. Many hackers are hackers of electronic equipment, mostly computers, but even cell phones, routers, iPods, digital cameras, and even the Toyota Prius have been hacked to get better gas mileage with the hybrid-electric engine (Rupley). But besides modifying computers themselves or gadgets, hackers play a significant role in the networking world. The Internet is a large collection of interconnected networks in which share files with each other, and hackers have been deemed the one's who steal, delete, or compromise these networks and files, which is not completely true. This type of crime is most likely the work of a script kiddie, or a "cracker", who is an inexperienced, unskilled "hacker" who attempts to infiltrate or disrupt computer systems by running pre-fabricated scripts designed to crack those systems (Script Kiddie). These are the people...

Cited: Kastor, Ginger. "Computer Hacking ." 2 Aug. 2002. 8 Mar. 2007 .
Lo , Joseph. "Denial of Service or "Nuke" Attacks." 12 Mar 2005. 2 Apr 2007 .
Palmer, C. C.. "Ethical Hacking." IBM. 13 Apr. 2001. IBM. 15 Mar 2007 .
(Script Kiddie. WordSpy. 07 Oct.1998. Paul McFedries and Logophilia Limited . 20
Mar. 2007 .)
"SearchSecurity." Ethical Hacker. 05 Jul. 2006. 15 Mar 2007 .
Rupley , Sebastian. "Hack Everything." PC Magazine 30 Aug. 2006 22 Mar. 2007 .
"The Year Hacking Became a Business." The Australian 30 Jan. 2007: 31. Newspaper Source. EbscoHost. Pittsburgh Technical Institute. 15 Mar. 2007 .
"White Hat/Black Hat Hackers." CSO Online. The Resource for Security Executives. 22 Mar 2007 .
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Ethical Hacking Essay
  • Research Paper Computer Hacking
  • Rogerain Essay on Computer Hacking
  • Ethical Hacking Essay
  • Hacking Research Paper
  • Corporate Social Responsibility and Business Ethics: Ethical and Unethical Hacking Essay
  • Computer Hacking is Ethical Essay
  • Computer Hacking Is It Ethical Essay

Become a StudyMode Member

Sign Up - It's Free