The Negative Effects of Computer Hacking

Topics: Computer, Computer security, Computer program Pages: 10 (3072 words) Published: August 23, 2011
INTRODUCTION
Thesis statement: Computer Hacking satisfies obsession for forbidden information and exploitation of skills. I. General Consideration
Hacking has been around for more than a century. At first, the term “hacker” was a positive term for a person with a mastery of computers who could push programs beyond what they were designed to do. But because of the exploitation of these knowledge and the obsession to forbidden information, it soon became a threat to computer technology. The root of computer hacking was dated back in the early 1960’s by a group of university students, especially in M.I.T. and Stanford. II. Statement of the Problem

The researcher wants to know the answers to these following inquiries: A. What is hacking? A hacker?
B. What are the different types of hackers?
C. Why do hackers hack?
D. What are the basic principles of a hacker?
E. What are the negative effects of hacking in the society? F. What are the ways to minimize potential for hacking? III. Objectives of the Problem
A. To know more about hacking and hackers.
B. To educate people about the negative effects of hacking. C. To prevent hackers in manipulating private information. D. To observe the effect of computer hacking in the modern world. IV. Importance of the Problem

I choose this topic because as an IT student, this will be very helpful in my studies since this is related to my course and the benefits that I can get from this is I will be knowledgeable about the facts in computer hacking so that I will be able to fight hackers as part of my future occupation. Another reason is so that since I will be knowledgeable, I can educate people about its dangerous effects it can cause us and to find a solution for it. V. Definition of Terms

A, Hacking - intruding into computer systems by stealth and without permission or any crime committed with, by, through, or against a computer. B. Hacker - A person who enjoys exploring the details of programmable systems and how to stretch their capabilities, as opposed to most users, who prefer to learn only the minimum necessary. C, Webpage - A Web page is what you see on the Net. One page with text and graphics. These can be about anything the author of the page wants it to be about. D. Software - Software is a general term for the various kinds of programs used to operate computers and related devices. E. Programming - creating a sequence of instructions to enable the computer to do something. F. Cracking – the art of decoding something.

G. Cracker - is someone who breaks into someone else's computer system, often on a network; bypasses passwords or licenses in computer programs; or in other ways intentionally breaches computer security. H. Filters - A program that accepts a certain type of data as input, transforms it in some manner, and then outputs the transformed data. I. Computer System - A set of related but unconnected components (hardware) of a computer or data-processing system. J. Install – to place or to put something in the computer for use. K. The Pentagon - a five-sided building in Arlington, Va., in which the main offices of the U.S. Department of Defense are located; hence, the U.S. military establishment. L. Patches - is a quick-repair job for a piece of programming. M. Ethics - A theory or a system of moral values. N. Server - A computer that processes requests for HTML and other documents that are components of web pages. O. Virus - an unsanctioned and self-replicating program which, when activated, corrupts a computer's data and disables its operating system. DISCUSSION

A. What is hacking? A hacker?
Today the term...

Cited: “Chinese hacking worries Pentagon.” http://articles.latimes.com/2008/mar/04/world/fg-ushina4
“Computer hacking ‘costs billions’.” http://news.bbc.co.uk/2/hi/business/3663333.stm
Harvey, Brian. “Computer Hacking and Ethics.” http://www.cs.berkeley.edu/~bh/hackers.html
Pipkin, Donald L. Halting the Hacker: a practical guide to computer security. Upper Saddle River: A Simon & Schuster Company, 1997.
Stone, David M. “Computer Hacking.” http://www.ed.uiuc.edu/up/crime/hacking.htm
ABSTRACT
Computer Hacking has long been a threat to the society. But this has not started as what it is right now. It only became a problem since programmers started abusing their talents. Hacking has affected greatly on people’s lives. It also affects the economy, the society and even the minds of the youth are being poisoned by the effect of computer hacking. As what I’ve read in some articles, even hacking can sabotage large companies and even the secrets of the government and military. Youth nowadays are much hooked up in computer hacking. They find this cool even though they know the negative effects in causes us because I their mindset, when you know how to hack, people find you a cool person, or sometimes people just want to become famous. But as we all know, every problem has a corresponding solution. The only one who can defeat a hacker is a hacker also. Since a hacker knows what his co-hacker is thinking, he also knows his strategies and plans. There are also a lot of preventive tips on the net to prevent a hacker in intruding your system or your files. I know that we cannot stop this dilemma, but I hope that we can prevent them from increasing by as an individual, to not involve in hacking and better to fight it.
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Computer Hacking Essay
  • Essay on Computer Hacking
  • Computer Hacking Essay
  • Computer Hacking Research Paper
  • Computer Hacking Is It Ethical Essay
  • Research Paper Computer Hacking
  • Effects of Computer Hacking Essay
  • Computer Hacking Essay

Become a StudyMode Member

Sign Up - It's Free