Preview

Hackers

Good Essays
Open Document
Open Document
558 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Hackers
Hackers - new terrorists or...

What exactly is hacker? The definition sounds that hacker is a person who tries to get unauthorized access to something (in most of the cases someone’s private information or data). There are different reasons why those persons are hacking–one of the reasons is to get some profit, other one – to protest against someone or something. Also, there are people who consider, that hacking is some kind of entertainment. It may seem that all hackers are evil and they have only one purpose – to cause damage to someone’s personal data and make chaos at cyberspace, but that is a delusion. There is not only one kind of hackers.
If we are examining hacker classification, then there are more than 10 subtypes. The most popular types are black-hat hackers and white-hat hackers.
Black-hat hackers are previously mentioned as “evil hackers”. They are breaking into computer networks (getting unauthorized access) to steal or destroy important data or to make the network unusable to authorized users for personal gain. The breaking process is planed some time before. Planning starts with choosing the target. It can be anything, for example, State Revenue Service data base, bank system or any other company’s homepage which has had conflict situations with the hacker as a harmless person. When the target is chosen, black-hat hacker starts to collect information about it and explores the ways how to break into the system. In this part, there is the biggest possibility to be caught. In final part, hacker performs planned operations – causes damage, steals information, leaves rude messages and so on.
White-hat hackers break into computer systems as well as black-hat hackers, but they have completely different purposes. The main white-hat’s goal is to make the cyberspace safer. It sounds funny, but they break into computer systems to improve their security. Thereby, weaknesses of the security are found and can be fixed. In fact, large part of white-hat

You May Also Find These Documents Helpful

  • Satisfactory Essays

    a. Vulnerability scans performed from external hosted servers give the same perspective as an attacker. Two types of hacking are White hats which are individuals that used their abilities to find vulnerabilities in systems and networks and then report them to the owner of the system so that they can be fixed. Black Hats are individuals that break into systems or networks that are not authorized to.…

    • 486 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Final Exam

    • 393 Words
    • 2 Pages

    The Motives Behind Hacking: Vandalism, Public Interest, Reveal Wrongdoing, Financial Gain, As a Protest, The Challenge (fun).…

    • 393 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    It530

    • 681 Words
    • 3 Pages

    hacking. In what ways does ethical hacking differ from “black hat” hacking? Put yourself into the…

    • 681 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Tim J. Watts goes more into the dark side of the “hacker” community by bringing up the constant back in forth between computer security officers and the so called hackers. This article, being written this year is able to reflect on the events of September 11, 2001 and new homeland security measures. He represents this viewpoint of a dangerous hacker in his definition: “While some hackers are harmless, others break into systems with the intent to steal information or to do destruction to the system. Hackers performing the latter pose a serious threat to the economic future of the United States” (Watts). Tim Watt outright blames the hacker community of accessing information that should be private. Only looking and reflecting on the serious threat…

    • 154 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Hacking is when a highly technical skilled individual or a group pass their way into a computer network or program without permission. This ends up in important data being stolen by the hacker which is illegal.…

    • 769 Words
    • 4 Pages
    Good Essays
  • Good Essays

    A gray hat may gain unauthorized access to a computer system to raise awareness—expose flaws to improve security—of a stubborn or uninformed administrator. Although there is no malicious intent, the lack of authorization creates a criminal act that can be prosecuted if received poorly.…

    • 413 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Testbacksecurity

    • 2284 Words
    • 10 Pages

    Expert hackers are extremely talented individuals who usually devote lots of time and energy to attempting to break into other people’s information systems.…

    • 2284 Words
    • 10 Pages
    Good Essays
  • Satisfactory Essays

    Final Exam Paper

    • 491 Words
    • 2 Pages

    ____ are hackers of limited skill who use expertly written software to attack a system…

    • 491 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Computer Memory Hacking

    • 820 Words
    • 2 Pages

    Who Are Hackers ­ A Hacker 's Tools Of The Trade | Hackers | FRONTLINE | PBS. (n.d.).…

    • 820 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Flawfinder

    • 277 Words
    • 1 Page

    Phillips, S., & Oriyano, G. (2010). Hacker Technique, Tools, and Incident Handling. Jones & Bartlett Learning…

    • 277 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Ethics

    • 916 Words
    • 4 Pages

    White hat hackers; these represent law cyber-crime police officers with the responsibility of eliminating or minimizing the activities of said Black Hat Hackers.…

    • 916 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Yet, many fail to fully understand the threat landscape that lies behind the lucrative business of hacking and why the number of hackers is increasing every day.…

    • 720 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Brian Knappenberger writes and creates a film which portrays a special and expert hacking group, their inside workings, plans and beliefs which they use and test to carry out their cyber-attacks.…

    • 771 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Hackers who access a business or non-business organizations’ networks find files that contain personal data of employees or volunteers, proprietary and/or trade secrets, and financial data that allows for theft, fraud, and extortion. One such exploit involved the student “ Daniel Beckwit,…

    • 819 Words
    • 4 Pages
    Good Essays
  • Good Essays

    We live in the time of the World Wide Web and it brings the biggest changes ever. The effects from this powerful invention, the Internet, has made the world flat and the opportunities huge. Every big change can have an affect on people, it could be positive or negative. In early 2002, researchers evaluated the presence and role of hackers and their role in technological innovations. “A decade ago, people in the tech field were angry that hackers had been labeled the dangerous villains who threatened national security” (Nissenbaum, 2015). This negative association contrasts with the beginning days of the 1970’s when hackers “were seen as ardent if quirky programmers, capable of near-miraculous,…

    • 1234 Words
    • 5 Pages
    Good Essays