Hacking Research Paper

Good Essays
What do you think of when I say the word “Computer Hacker”? You probably think of some sort of criminal bent on gaining access into your bank accounts or remote control over your computer. Granted, hackers have gotten a bad reputation from the media, who sometimes report break-ins of databases, computers, and other virtual resources. However, this does not mean that every hacker has a desire to do harm. In fact, hackers are hardly the bad guys. The word hacker has been so warped and distorted by the media that people now believe that hackers are all criminals and intend to do harm. The truth is, hackers are people and therefore many of them have morals that disallow them to purposely cause harm. I believe that regardless of the stereotypical view of hackers in today’s society, the majority of them help the world of computers rather than damage it. Action should be taken against the people who make the internet unsafe, not the people who make the internet safer.

According to an article in Whatis.com, hackers primarily come in different shades or colors. The article goes on to say that these colors are significant in determining what kind of hacker he/she is. The lighter the color, the less harm a hacker intends. For example, a hacker with good intent and moral standing is called a white hat hacker. Another point made in the article was that the word “hat” after the color of the hacker is meant to be symbolic of old Western movies where the hero always wore a white hat and “bad guys” wore the black hats (Whatis.com). Black hat hackers, as you may have guessed, are the hackers who do intend harm. They deface websites, steal data, and exploit security flaws for personal gain. Black hats are sometimes called “crackers” as well because they crack programs and passwords to gain entry into a location where they are unauthorized to be (morebusiness.com). There are also hackers who are referred to as gray hat hackers. These are the hackers who have ethics, know what’s

You May Also Find These Documents Helpful

  • Better Essays

    Hacking Research Paper

    • 1378 Words
    • 6 Pages

    Hacking Throughout my path to obtaining a degree in Cybersecurity I have learned quit a bit. It has enabled me to acquire the CompTIA Network + certification, as well as the CompTIA Security +. In taking this course, I just knew I would learn some new and fascinating things about how to defend my network. What better way to do so, than to think like a criminal? Though I have learned some interesting techniques, such as the use of sniffers like Wireshark or NIDS software like Tripwire, it seems…

    • 1378 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    Introduction Hacking is a illegal break into computer and network systems, according to the negative meaning of the term popularized by the mass media. However, the term is also found in the jargon of at least three major hacker subcultures that are characterized by their distinct historical origin and development and that are centered around different, but partially overlapping, aspects of computers (with different ideas about who may legitimately be called a hacker, see hacker definition…

    • 1778 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Gene hacking is technology that has the potential to spare humans the heartbreak of genetic diseases. All of over the world, experiments being conducted on mice, in hopes of eliminating genetic diseases such as Huntington's disease and cystic fibrosis. My best friend has cystic fibrosis, so learning about how this genetic disease could be eliminated so that nobody has to suffer like her really interested me. To think that she can have a baby and remove the threat of the child carrying the gene makes…

    • 200 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    Epic Hacking Research Paper

    • 3326 Words
    • 14 Pages

    How Apple and Amazon Security Flaws Led to The Epic Hacking of Mat Honan Meet Mat Honan. He just had his digital life dissolved by hackers. On Friday Aug.3.2012 Mat Honan’s personal Computer (PC) system was invaded by hackers. In the space of one hour, Mat’s entire digital life was destroyed. First his google account was taken over, then deleted. Next his twitter account was compromised, and used as a platform to broadcast racist and homophobic messages. And worst of all, Honan’s Apple…

    • 3326 Words
    • 14 Pages
    Better Essays
  • Powerful Essays

    Android Hacking and Security Donna McDuffey Kentucky State University Graduate Student Nicholasville, KY 859-382-3480 donna.mcduffey@kysu.edu ABSTRACT An introduction to the security risks to android users, how hackers target these platform devices, and how users can better protect themselves and sensitive data. Categories and Subject Descriptors Introduction Android Platform introduction Android Security Features and Shortcomings Types of Android Hacking Android Security Measures to Prevent…

    • 1705 Words
    • 6 Pages
    Powerful Essays
  • Better Essays

    Hacking

    • 625 Words
    • 3 Pages

    HACKING The incredibly fast development of the Internet has brought many benefits both to consumers and businesses. However, it has also provided criminals or misguided individuals with great opportunities for crime or 'mischief'. The Internet is not only used by innocent members of the public, but also by fraudulent traders, software pirates, hackers and con-artists, to name but a few. A hacker is a person who breaks codes and passwords to gain unauthorized entry to computer systems.…

    • 625 Words
    • 3 Pages
    Better Essays
  • Good Essays

    Hacking

    • 4142 Words
    • 17 Pages

    Hacking Contents ~~~~~~~~ This file will be divided into four parts: Part 1: What is Hacking, A Hacker's Code of Ethics, Basic Hacking Safety Part 2: Packet Switching Networks: Telenet- How it Works, How to Use it, Outdials, Network Servers, Private PADs Part 3: Identifying a Computer, How to Hack In, Operating System Defaults Part 4: Conclusion- Final Thoughts, Books to Read, Boards to Call, Acknowledgements Part One:…

    • 4142 Words
    • 17 Pages
    Good Essays
  • Powerful Essays

    Hacking

    • 3915 Words
    • 20 Pages

    A brief history of hacking... bsd 4.11> █ zuley clarke / james clawson / maria cordell november 2003 LCC 6316: Historical Approaches to Digital Media table of contents the evolution of hacking ................................................................................. 1 the drive to hack ............................................................................................ 2 cultural infiltration ..........................................................…

    • 3915 Words
    • 20 Pages
    Powerful Essays
  • Powerful Essays

    Hacking

    • 10303 Words
    • 42 Pages

    Ethical Hacking or known as Anonymous By Jasper John F. Talinting Mrs. Amelia G. Villanueva English 102 March 11, 2013 Introduction: We are approaching for me as an IT Student I’m assume for my technical works and ideology about hacking, hacking is prevent and studies in programming, troubleshooting and etc. That aware in good conduct but also in our cyber society. We must think and polite our selves love technology and love our environment people…

    • 10303 Words
    • 42 Pages
    Powerful Essays
  • Powerful Essays

    hacking

    • 8064 Words
    • 33 Pages

    additional works at: http://digitalcommons.pace.edu/honorscollege_theses Part of the Other Computer Sciences Commons Recommended Citation Jagnarine, Amit Anand, "The Role of White Hat Hackers in Information Security" (2005). Honors College Theses. Paper 14. http://digitalcommons.pace.edu/honorscollege_theses/14 This Article is brought to you for free and open access by the Pforzheimer Honors College at DigitalCommons@Pace. It has been accepted for inclusion in Honors College Theses by an authorized…

    • 8064 Words
    • 33 Pages
    Powerful Essays