Preview

Ethics of Hacking

Good Essays
Open Document
Open Document
275 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Ethics of Hacking
Cracking is the correct concept for deconstructing/sabotaging in the cyberspace/Internet, e.g. by circumventing the security of a website and posting your own (critical) stuff on their site or spreading viruses in the Internet. Hacking, on the other hand, is about using and reconstructing the computer or other machines/systems in a new and (by the "owners" and "inventors") unintended way. Hacking is about reclaiming the system, manipulating it and using it, not destroying it. Both terms define people who can break into computer systems and rewrite programs, but hackers do not use their knowledge offensively or illegally. Crackers use their skills for illegal use: distributing pirated materials, stealing money and identities, etc. The ethical question about unlocking seems to have been answered - by governments, at least - as to say that it is the corporations' hands that need slapping, and not the consumers. If I had to define what a "hacker" was, I'd say it's someone who possesses a rare technical discipline to alter the function of another work, and the ethical discipline to do it without lying, cheating, or stealing. So the real ethical challenge to a hacker is identifying the difference between corporate greed and theft of services. Hackers are the great equalizer of a capitalist society, and when conducted ethically, hacking can be of great benefit to both the consumer and the manufacturer. They have the power to balance out corporate greed and further improve on otherwise great products. If the ethical situations concerning computer hacking could be resolved, these hackers ideas could be potentially useful and could help to further advance our technological standing in

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Nt1310 Final Exam

    • 393 Words
    • 2 Pages

    Computer Hacking – it is the act of bypassing ones account or database and hacking involves stealing of identity and use it in his/her own interest.…

    • 393 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Hacking is when a highly technical skilled individual or a group pass their way into a computer network or program without permission. This ends up in important data being stolen by the hacker which is illegal.…

    • 769 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Cracker: A malicious attacker who deliberately intrudes upon systems or networks to gain unauthorized access or unauthorized resources.…

    • 413 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    ARTICLE SUMMARY

    • 1028 Words
    • 7 Pages

    An ethical hacker is a person who performs most of the same activities a cracker does, but with the owner or company’s permission.…

    • 1028 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    Cybercrime: Hacking

    • 1198 Words
    • 4 Pages

    With everything in society advancing rapidly, it should be of no surprise that technology is now used to commit crimes against other people. Those crimes include identity theft, stealing money, illegal gambling, and cyberstalking. This paper will review cybercrime and the differences there are from traditional crime and it will review the purpose of hackers. There will also be three cases reviewed to help bring light to what kind of cybercrimes are being committed around the world.…

    • 1198 Words
    • 4 Pages
    Powerful Essays
  • Better Essays

    Kevin Mitnick

    • 1277 Words
    • 6 Pages

    The word hacker in today’s society has many meaning, but the definition that I will be talking about in this paper is best described by dictionary.com as, “One who uses programming skills to gain illegal access to a computer network or file.”[1] According to wikipedia.com there are three different types of hackers, white hat hackers, grey hat hackers and black hat hackers. A white hat hackers is, “. . .a person who is ethically opposed to the abuse of computer systems. Realizing that the Internet now represents human voices from all around the world makes the defense of its integrity an important pastime for many.”[2] A grey hat hacker is, “. . .a skilled hacker who sometimes acts legally and in good will and sometimes not. They are a hybrid between white and black hat hackers. They hack for no personal gain and do not have malicious intentions, but occasionally may or may not commit crimes in their actions.”[3] And lastly a black hat hacker is, “a malicious or criminal person whose correct label is "cracker". . .Usually a Black Hat refers to a person that maintains knowledge of the vulnerabilities and exploits they find as secret for private advantage, not revealing them either to the general public or manufacturer for correction.”[4]…

    • 1277 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Cyber Crime

    • 1094 Words
    • 5 Pages

    for the hacker is for financial gain. Cybercrime is about making a profit and continuing to make…

    • 1094 Words
    • 5 Pages
    Good Essays
  • Better Essays

    Hacker

    • 1123 Words
    • 5 Pages

    First of all, the definition of hacking and hackers need to be clearly understood so as to have an insight into hacking. Hacking can be defined as any kind of computer crimes. Pirating is the most popular form of hacking, which relates to the stealing information from written software programmes. In the computer security context, hackers are people who try to find the weaknesses of the computer network and exploit the information from software. Hackers may be encouraged by a variety of reasons, for instance profits, protests, or challenges. Hackers can be categorised into the three types, which are black hats, grey hats, and white hats. Black hat group or cracker is expertise in carrying out the harmful to the computer system. A grey hat is a hacking group that will not violate the law and help the government to defend the system. However, grey hat will apply the same methods to revert to black hat approaches. The white hat hacker has their own abilities and professional computing skills to protect the malicious threads and…

    • 1123 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Take a trip down memory lane with these top cyber films. Designed for computer buffs, these movies range from spy thrillers to cyber crime movies. They were selected based on their excellent plot lines and portrayals of technology. Unlike typical movies, these films use computers the way they are actually used in real life with a few exceptions.…

    • 598 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Hacktivism Ethics

    • 7214 Words
    • 29 Pages

    E. Spafford, "Are Computer Hacker Break-ins Ethical?," in Computers and Ethics in the Cyberage, D. M. Hester and P. J. Ford, Eds. Upper Saddle River, New Jersey: Prentice Hall, 2001, pp. 332-344.…

    • 7214 Words
    • 29 Pages
    Powerful Essays
  • Satisfactory Essays

    Lab 7 Ethical Hacking

    • 293 Words
    • 2 Pages

    In this lab, you used AVG AntiVirus Business Edition to identify the viruses, worms, Trojans,…

    • 293 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    In presenting this project, in partial fulfillment of the requirements for graduate degree from the University of Central Arkansas, I agree that the Library of this University shall make it freely available for inspections. I further agree that permission for extensive copying for scholarly purposes may be granted by the professor who supervised my thesis work, or, in the professors absence, by the Chair of the Department or the Dean of the Graduate School. It is understood, that due recognition shall be given to me and to the University of Central Arkansas in any scholarly use which may be made of any material in my project.…

    • 5250 Words
    • 21 Pages
    Powerful Essays
  • Powerful Essays

    A diffuse group of people often called "hackers" has been characterised as unethical, irresponsible, and a serious danger to society for actions related to breaking into computer systems. In this essay I try to construct a picture of what is and includes a computer crime as well as a portray of hackers, their concerns, and the way in which hacking takes place. What I intend to argue is that, in their majority, hackers are learners and explorers who want to help rather than cause damage. Furthermore, my research also suggests that the general practice of hacking is a part of larger conflicts that we are experiencing at every level of society and business in an information age in which many people are not computer literate. These conflicts lie on the issue of whether information should be made publicly available or not (centralise or decentralise government) and on issues of law enforcement. Hackers have raised serious issues about values and practices in an information society.…

    • 4490 Words
    • 18 Pages
    Powerful Essays
  • Good Essays

    Ethical Computer Hacking

    • 1026 Words
    • 5 Pages

    There are a many types of hacks, and hackers in the cyber world. A hack can be any modification done to virtually anything, to make it do something better, or something completely different. Many hackers are hackers of electronic equipment, mostly computers, but even cell phones, routers, iPods, digital cameras, and even the Toyota Prius have been hacked to get better gas mileage with the hybrid-electric engine (Rupley). But besides modifying computers themselves or gadgets, hackers play a significant role in the networking world.…

    • 1026 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Eit Assignment 1

    • 329 Words
    • 2 Pages

    Nowaday, hacker is someone makes the technology's life to be more interesting. The term hacker has evolved over the years and been growing. For years there existed a fuzzy distinction between good and bad computer hackers, or we also call them white hat and black hat hackers. Whether they are good or bad, we can't negate they don't have any influence on the development of technology. Hiring known hackers to test the security of a system is an example of this idea.…

    • 329 Words
    • 2 Pages
    Good Essays

Related Topics