Research Paper Computer Hacking

Topics: Black hat, Grey hat, Hacker Pages: 5 (1778 words) Published: August 5, 2015
Introduction
Hacking is a illegal break into computer and network systems, according to the negative meaning of the term popularized by the mass media. However, the term is also found in the jargon of at least three major hacker subcultures that are characterized by their distinct historical origin and development and that are centered around different, but partially overlapping, aspects of computers (with different ideas about who may legitimately be called a hacker, see hacker definition controversy). In computer security, which the mass media refer to, it is someone who focuses on security mechanisms. Parts of this subculture see their aim in correcting security problems and hence use the word in a positive sense. This use is contrasted by the different understanding of the word as a person who, in a broad sense, adheres to a spirit of playful cleverness and, in a more specific sense, loves programming. It is found in an originally academic movement unrelated to computer security and most visibly associated with free software and open source. In a third meaning, the term refers to computer hobbyists who push the limits of their software or hardware.

Body:
When someone hacks a computer or network system, it's typically for one of three main reasons: Hacking for fun: Some hackers make attempts on computers, servers or network systems just for the personal gratification. Others may feel that they need to prove something to their peers or friends, and hack something only for the challenge. Hacking to steal: Another reason to hack a system is to steal information or money. A large portion of hacking attempts fall into this category. Banks and large companies are common targets for hacking jobs, but sometimes smaller companies or even a specific person's computer are targeted, as well. Hacking to disrupt: There are also some hackers, including hacking groups; that target a company to disrupt business, create chaos and just be a nuisance. These groups often be trying to make a statement with their hacking, demonstrate security inadequacies, or to show general disapproval for the business itself. Examples of hacking groups that made headlines are Anonymous and LulzSec. Positive side of hacking:

Hackers are always very familiar with computer systems and can easily find the security vulnerabilities, but not all hackers do dirty works. For example, some hackers are hired by an organization that trusts him or her to attempt to penetrate networks and/or computer systems for the purpose of finding and fixing computer security vulnerabilities. They are known as ethical hackers. These hackers help examining the system or software using hacking method and tell customers so that they can close the hole and prevent potential losses.Besides, there are also some hackers called “grey hat hacker”. These hackers may hack into a computer system to notify the administrator that their system is vulnerable and then offer to repair their system for a small fee. They are doing it for a good purpose but still demanding personal gain. It may not be ethical but is neither harmful. Negative side of hacking:

Though hacking can be positive, we should never neglect its negative side. And in this condition, we should call it cracking. Crackers break into secure networks to destroy data or make the network unusable for those who are authorized to use the network with malicious intent or for personal gain. If a business website is hacked, it may lose not only essential data but also a great number of customers because the website is not operational during that period. If the website sells productions online, it will suffer more. And the website may even get a bad reputation if it is chosen as crackers’ target for many times because some customers think the website is not well designed. Besides, cracking may also cause business or government put additional costs on restoring hacked websites or protecting websites from potential...
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Computer Hacking Essay
  • Computer Literacy Research Paper
  • Hacking Research Paper
  • Computer Hacking Essay
  • Computer Hacking Research Paper
  • Computer Hacking Essay
  • Hacking Research Paper
  • Rogerain Essay on Computer Hacking

Become a StudyMode Member

Sign Up - It's Free