"Hacker" Essays and Research Papers

Sort By:
Satisfactory Essays
Good Essays
Better Essays
Powerful Essays
Best Essays
Page 17 of 50 - About 500 Essays
  • Better Essays

    These devices act as a lifeline to the outdoor world‚ and are frequently used for navigating‚ social networking‚ shopping‚ banking and business purposes. What is often forgotten about these devices is that they are gateways to hackers. “Mobile devices can be used by a hacker as an access point into many other aspects of your digital life as well the lives of others in your network‚ making mobile security about more than just protecting your phone‚” (Certic‚ 2013). Mobile Technology became widely accepted

    Premium Security Mobile phone Personal digital assistant

    • 1441 Words
    • 6 Pages
    Better Essays
  • Better Essays

    Internet Security and Safety

    • 3144 Words
    • 13 Pages

    As the internet continues to grow‚ we may never be able to completely protect our privacy especially when it comes to shopping online and social networking sites. Abstract I chose this topic because it seems to always be in the news and there is also an interesting section about this topic in chapter three in the text. Whether it has to do with online shopping or social networking sites‚ it seems like once we make it on the internet‚ anyone can be located and can be at risk. Just Google anyone’s

    Premium Twitter Facebook Social network service

    • 3144 Words
    • 13 Pages
    Better Essays
  • Good Essays

    Hacking‚ Piracy and Virus Creation “In this era of computer advancements and technological breakthroughs Hackers‚ Computer Pirates and Virus Creators while there actions are similar there motives can differ‚ Shamus Ford reports.” In today’s society computer crimes such as Hacking‚ Computer Piracy and Virus Creation are on the rise. The internet is the most common place computer crimes occur with 77% of attacks occurring via the internet while 33% from an internal system. There are a variety

    Premium Malware Computer virus Computer

    • 950 Words
    • 4 Pages
    Good Essays
  • Good Essays

    internet has led to a severe decline in ethics among internet users (Salman‚ Saad & Ali‚ 2013). The widespread use of internet has led to increased and sophisticated crimes‚ terrorism and wars (May‚ 2004). This essay will be based on a case involving hackers who hold Personal Computers (PC) hostage. It will outline the potential computer ethics issues associated with holding computers hostage. It will also highlight methods that computer users could use to prevent this type of attack. Moreover‚ it will

    Premium Computer security Computer Personal computer

    • 1067 Words
    • 4 Pages
    Good Essays
  • Better Essays

    computer to gain unauthorized access to data within a system. Another way of defining hacking is the crashing a computer system. Following below is some information of how hacking RAM is useful as well as commonly used programs used by so-called ethical hackers. One such program is called metasploit. This program is used by cyber security personnel to help advise clients of possible vulnerabilities against their own systems. Metaslpoit is owned by Rapid7‚ who provides security data and analytic

    Premium Computer data storage Computer Computer program

    • 838 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    Theories Of Crime

    • 4363 Words
    • 18 Pages

    Theories of Crime Abstract This thesis explores the relatively new criminal phenomena of computer crime‚ or as it is more commonly termed‚ hacking. The foundation for the examination is based on how well traditional psychological theories of crime and deviance explain this new behaviour. Dominant theories in each of the categories of psychoanalytic‚ learning and control are discussed. The thesis concludes that for the most part‚ traditional psychological theories are deficient with regard

    Premium Sociology Crime Criminology

    • 4363 Words
    • 18 Pages
    Powerful Essays
  • Powerful Essays

    It Security

    • 1949 Words
    • 8 Pages

    is connected to the Internet. You should have software‚ hardware‚ and/or personnel monitoring your networks operations and security. All computers and systems that connect to the internet or networks run off software of some type. People called hackers or crackers‚ manipulate programs‚ create worms‚ and viruses to make systems do thing there not supposed to‚ access places they aren’t allowed‚ and shutdown or hinder a system from working properly (Dasgupta). Then there are attacks‚ phishing attacks

    Premium Security Information security Computer security

    • 1949 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    Epidemic‚” shows the destructive power and capability of cyberwarfare. Cyberwarfare has grown increasingly common over the years‚ and is one of the few areas where combat is on a level playing field. With the widespread use and access to internet‚ hackers and cases of hacking are continuing to grow at an alarming rate. Not only‚ but these hacks are usually targeted at important government facilities like the Pentagon‚ State Department‚ and the White House. Attacks substantial as this not only have

    Premium Computer security Security Computer

    • 445 Words
    • 2 Pages
    Good Essays
  • Good Essays

    risky. Online criminals and hackers could steal such passwords. However‚ you can use a reputable password manager to recall passwords for you. 3. Don’t use only one password for all your online accounts. It is risky. Online criminals and hackers could potentially gain access to your accounts if they figure out such password. You should rather use distinct passwords for all your accounts. 4. Don’t recycle your passwords. It is risky. Online criminals and hackers who may have stolen such passwords

    Premium Computer security Password Internet

    • 599 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Is Your Information Safe?

    • 1575 Words
    • 7 Pages

    doesn’t hold a gun to your head‚ nor does he ransack your personal possessions. Just the same he’s a thief. Although this thief is one you’ll not only never see‚ but you may not even realize right away that he’s robbed you. The thief is a computer hacker and he "enters" your home via your computer‚ accessing personal information -- such as credit card numbers -- which he could then use without your knowledge -- at least until you get that next credit card statement. Richard Bernes‚ supervisor of the

    Premium Computer security

    • 1575 Words
    • 7 Pages
    Powerful Essays
Page 1 14 15 16 17 18 19 20 21 50