Preview

Hack

Better Essays
Open Document
Open Document
1715 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Hack
The use of computers in everyday life is becoming more and more common, but how safe is it to use these computers? The problem is more and more people are wanting to gain access to your information for whatever reason, fun , revenge, or even just because they can. These people, called hackers, intend to make money off of you or your company. They have created hacks, that take advantage of flaws in computer systems to gain access to new information or increase their privileges on your computer. So how do we go about protecting our computers? By understanding who is behind these threats, how they get into our systems and cause problems, and lastly what you can do to help stop these threats. To get started let us take a look at the people behind the curtain of computer hacking, into the different types of hackers. Not all hackers are the same they come from different places and different age groups and there are a few ways to describe a hacker. The first is the black hat hacker who as Wilson points out in his article are people who " set out to cause damage for the thrill - or other ulterior motives". So instead of trying to achieve something they are more mischievous like an imp, they have little regard for who you are or what you do with your computer. To the black hat hacker it is a means of having fun or proving to themselves that they are better than someone else. This is not to say that all black hackers are good at what they do; There is a huge subclass of black hat hackers who are made up of "script kiddies" who use "toolkits that are based on code they may not even understand"(Wilson). The problem with this is that it has created an influx of want to be hackers who don 't even know what they are doing. Wilson points out to that if the script kiddies do indeed make up the bulk of the black hats, their lack of skill should make them less of a threat. Yet Wilson directly states that this is not the case because their numbers, their persistence, and their


Bibliography: GEIER, ERIC. "The Ultimate Pc Security Toolbox." PC World 30.12 (2012): 87-93. Internet and Personal Computing Abstracts. Web. 22 Feb. 2013. Kabachinski, Jeff. "Viruses, Worms, And Trojans." Biomedical Instrumentation & Technology / Association For The Advancement Of Medical Instrumentation 39.1 (2005): 46-48. MEDLINE Complete. Web. 22 Feb. 2013. Kates, Jim, and Stephen Nickson "The Reality Of Hackers." Risk Management 48.7 (2001): 50-57. OmniFile Full Text Mega (H.W.Wilson). Web. 22 Feb. 2013. Saporito, Bill. "Hack Attack." Time 178.1 (2011): 50-55. Academic Search Complete. Web. 22 Feb. 2013. Waqar1, Ahmad. Wahmed@kaau.edu.sawahmed@ieee.org. "Computer Viruses As A Threat To Home Users." International Journal Of Electrical & Computer Sciences 10.3 (2010): 33-44. Applied Science & Technology Source. Web. 22 Feb. 2013. Wilson, David L. "When it comes to computer hackers, there are white hats and black hats in the cybrenetic drama of hacking." San Jose Mercury News (CA) n.d.: Newspaper Source. Web. 22 Feb. 2013. Vaas, Lisa. "INSIDE THE MIND OF A HACKER. (Cover Story)." Eweek 24.24 (2007): 38. MasterFILE Premier. Web. 22 Feb. 2013. Yarberry, William A. "Modern Day Paladins: The White Hat Hackers." Information Strategy: The Executive 's Journal 18.3 (2002): 43. Military & Government Collection. Web. 22 Feb. 2013.

You May Also Find These Documents Helpful

  • Better Essays

    Oriyano, S.-P., & Gregg, M. (2011). Hacking Techniques, Tools, and Incident Handeling . Burlington: Jones & Bartelle Learning .…

    • 1902 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    Nt1310 Final Exam

    • 393 Words
    • 2 Pages

    The Motives Behind Hacking: Vandalism, Public Interest, Reveal Wrongdoing, Financial Gain, As a Protest, The Challenge (fun).…

    • 393 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    McClure, S., Scambray, J., & Kurtz, G. (2009). Hacking Exposed 6: Network Security Secrets & Solutions. New York, NY: McGraw-Hill.…

    • 2643 Words
    • 11 Pages
    Powerful Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 2 Key Concepts  Attacks, threats, and vulnerabilities in a typical IT infrastructure …

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Tim J. Watts goes more into the dark side of the “hacker” community by bringing up the constant back in forth between computer security officers and the so called hackers. This article, being written this year is able to reflect on the events of September 11, 2001 and new homeland security measures. He represents this viewpoint of a dangerous hacker in his definition: “While some hackers are harmless, others break into systems with the intent to steal information or to do destruction to the system. Hackers performing the latter pose a serious threat to the economic future of the United States” (Watts). Tim Watt outright blames the hacker community of accessing information that should be private. Only looking and reflecting on the serious threat…

    • 154 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    Cmgt 400 Week 2

    • 1100 Words
    • 3 Pages

    Conklin, A., White, G., Williams, D., Davis, R., & Cothren, C. (2012). Principles of Computer Security: CompTIA Security+ and Beyond (Exam SY0-301) (3rd ed.). New York, NY: McGraw-Hill Company.…

    • 1100 Words
    • 3 Pages
    Better Essays
  • Good Essays

    The article “Inside America’s Hacking Epidemic,” shows the destructive power and capability of cyberwarfare. Cyberwarfare has grown increasingly common over the years, and is one of the few areas where combat is on a level playing field. With the widespread use and access to internet, hackers and cases of hacking are continuing to grow at an alarming rate. Not only, but these hacks are usually targeted at important government facilities like the Pentagon, State Department, and the White House. Attacks substantial as this not only have the capability breach classified information, but they also carry a large risk of harming the infrastructure and national security.…

    • 445 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Stallings, W., & Brown, L. (2012) Computer security: Principles and practice (2nd ed.). Boston, MA: Pearson.…

    • 1167 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Computer Memory Hacking

    • 820 Words
    • 2 Pages

    Who Are Hackers ­ A Hacker 's Tools Of The Trade | Hackers | FRONTLINE | PBS. (n.d.).…

    • 820 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Manufacturing Audit Risk

    • 1585 Words
    • 7 Pages

    As Information Systems become more complex and business organizations become better prepared at protecting these systems so has the means in which attacks on these systems evolved. Many new issues have emerged and are changing the way in which or world views hackers and the chaos that these individuals can cause. The purpose of this section is to discuss some of the most visual and controversial of these issues. Finding solutions to avoid these attacks are what drives the need for security and security systems to constantly evolve and adapt to new threats and avoid being overrun and or shut down due to malicious actions of hackers who only wish…

    • 1585 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    Flawfinder

    • 277 Words
    • 1 Page

    Phillips, S., & Oriyano, G. (2010). Hacker Technique, Tools, and Incident Handling. Jones & Bartlett Learning…

    • 277 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Computer Fraud Act Of 1984

    • 2247 Words
    • 9 Pages

    Due to the advance technology of the Internet, the government, private industry and the everyday computer user have fears of their data or private information being comprised by a criminal hacker. C.C. Palmer, who manages the Network Security and Cryptography department at the IBM. Thomas J. Watson Research Center writes, “They are afraid that some hacker will break into their Web server and replace their logo with pornography, read their e-mail, steal their credit card number from an on-line shopping site, or implant software that will secretly transmit their organization’s secrets to the open Internet”. This hacking is not only widespread, but is being executed so flawlessly that the attackers compromise a system, steal everything…

    • 2247 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    Brian Knappenberger writes and creates a film which portrays a special and expert hacking group, their inside workings, plans and beliefs which they use and test to carry out their cyber-attacks.…

    • 771 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Hacking and Hacker

    • 1666 Words
    • 7 Pages

    Hacking is to change computer hardware or software, in order to cause damage to important data on a computer or to simply steal personal information. Computer hackers take help of internet because internet connects the entire computer around the world. A person who attacks to another system with the intent to cause harm, without having any permission from the system owner is called as hacker. There are different types of hacker with different purpose of hacking. Hacking is illegal thing which have lots of effect but somehow hacking is good because it got some benefit. In the following paragraph I am going to discuss about types of hacker, purpose of hacking, effect of hacking, benefit of hacking and ethical hacking. (Beaver & McClure, 2007)…

    • 1666 Words
    • 7 Pages
    Better Essays
  • Satisfactory Essays

    Cyber Hacking

    • 250 Words
    • 1 Page

    As an internet user, we actually are at risk for becoming a victim of cyber hacking. So, how can we avoid from getting hacked? The ways to protect ourselves are do not engage in conversation with strangers, keep passwords protected, do not keep any sensitive materials on computer and make sure the antivirus software is always…

    • 250 Words
    • 1 Page
    Satisfactory Essays

Related Topics