Christian Rupe 5/25/09 Research Essay: Final Draft
Professor Wilson
Hackers and Security Measures
A diverse group of people often referred to as “hackers” have been stereotyped as unethical, irresponsible, and a serious threat to society for their actions of breaching of computer systems in an undesirable manner. I will attempt to construct a picture of what a computer crime is, as well as a portrait of what a hacker is, their concerns, and how most hacking occurs. I will also cover the best security measures against undesirable hacking. It is my intent to argue that, most hackers are learners and explorers who want to help rather than cause harm. Additionally, my research will suggests that the general principle of hacking is
…show more content…
This paper is a report of what I discovered about hacking, and subsequently a report about my research. I focused my attention on answering some key questions such as: what is hacking, who are the hackers, what motivates them, why is hacking dangerous, and what is the future of hacking. I also give useful details about computer crime especially its definition and some important categories of it. What is a computer crime? Computer crime is a more serious issue than most realize. “According to the FBI, the average profit in a live bank robbery is $4000; the average computer heist exceeds $400.000. The American society for industrial security calls computer-related crimes a multi-billion dollar annual business”. Although a lot of people agree that computer crimes are increasing rapidly, there is a disagreement on what a computer crime involves. That is because the technology and the methods used by criminals are continuously changing. Therefore, there are various definitions. But if somebody wanted to do a research about the law in different countries he/she will realize that computer is either the medium used to propagate the act or the target of the act. Thus, “computer crime consist of two kinds of activities:
a) The use of a computer to propagate acts of deceit, theft or concealment that are intended to provide
Modern day technology has changed the ways in which people purchase products and services. In the twenty-first century, all business has pretty much converted over to the electronic payment systems. One swipe of a credit card and immediately the data transmits through a gateway onto the payee 's bank processing link. However, during the disbursement of data is when more than forty-three million people’s debt or credit card information becomes promised. May of these computer programs assume the title of Hackers. A hacker is one who installs malicious software onto individuals compter’s or computers networks. In hopes of gaining unauthorized access to sensitive information on the victim 's computer.
With the evolution of technology, the number of hacking incidents and data breaches has been increased. Hacking indicates to utilizing computers to perpetrate fraudulent actions such as security attack, or stealing confidential data. Hackers identify and exploit vulnerabilities in computer systems or networks to gain access to the system. According to an article published by the BBC, hacking incidents cost small and big organization billions of pounds over the years. There are two types of hacking which are ethical hacking and unethical hacking. The objective of ethical hacking is to recognize system vulnerabilities in order to develop security. Ethical hackers aim to steal information or destroy other systems through performing malicious attacks. The main purpose of this case study report is to examine the hacking case of Yahoo! that was occurred in 2014, as well as recommendations will be considered to evaluate what should have been done to prevent the security attacks.
The word hacking, usually associated with information technology, is a term used for the development of creative solutions for a problem by someone in a non-professional environment. With the introduction of personal computers and the internet, anyone could create solutions to problems in computer science. This led to the emergence of “hacker culture”, leading to the decentralization of computer industry (Hicks, 2014).
Hacking has evolved from juvenile’s curious action into serious criminal act. The low cost of computers and ease of accessing internet has allowed proliferation of criminals to use these tools to research and attack their targets. The main goal is criminal exploit and to exploit learn hacking techniques to accomplish goal. The use of electronic devices and internet leave behind digital marks and fortunately criminal first hackers have a difficult time erasing their trail allowing for the savvy digital forensics investigator to collect evidence and locate the criminal.
Hacking in computer networking is the desire to manipulate the normal behaviour of a network connection or a connected system, a hacker is the person who is instigating the hack. In today’s society, we generally refer to any malicious programming attack over the internet or a network to be hacking. Hacking originated between the 1950s and 60s by M.I.T engineers, they originally were meant for learning and experiment purposes and usually took place at the ‘model train club’. However, these attacks soon became popular outside of M.I.T with perpetrators experimenting with modifying telephones for long distance calls for free, overtime with the expansion and popularity of the internet, cyber-attacks we today refer to as hacking became more popular.
Hacking is a relatively new technique to describe gaining unauthorized access to a network or computing device. A negative connotation has always been associated with the term. However, in order to catch hackers law enforcement will often reverse engineer the same methods that they use. Hacking has proven to become a major challenge for law enforcement. Device and network intrusions are not easily accomplished. The skills needed to perform a hack requires a succinct knowledge of computers and networking which can take years to fully understand. Society tends to ignore the intricacies of computers and often leave themselves exposed to potential invasions. Since a majority of the public are unaware of protecting themselves, illegal hackers can thrive knowing most people are possible targets.
The internet and computer have converted into main tools found in the people's lives. Computer hacking can be an identical acknowledged identified known way of crashing your computer system. The hackers are explorers utilizing their talents to damage a culture, world, contemporary society, population. Computer hackers are illegal users who crash into computer systems to steal money, change files or destroy important information, and by connecting dangerous malware. Hacking the electronic devices of innocent people is a federal crime. Hacking has become the world’s most dangerous crime and the biggest problem in the today’s society. Hackers can hack the computer in various ways, and by the different techniques. Besides, hacking most affects
Our society has a negative perception towards the word “hacker” that has just seemed to have stuck in today’s world. Nevertheless, individuals need to separate hackers from criminals. Many individuals believe that hackers are these evil rebels that operate individually in their parent’s basements and are driven by money or a desire to cause excessive evil in society. In reality, hackers are merely smart individuals that work in groups to bring change to social order. Sometimes hackers are misguided and misunderstood, but they often use their skills to expose hidden details of governments and corporations.
“Hacking is now a widely discussed and known phenomenon, but remains difficult to define and empirically identify because it has come to refer to many different, sometimes incompatible, material practices.” (Jordan, Convergence, Vol 23, Issue 5, page 528 - 544 2016). So, in the following essay aims to address the most serious problems associated with hacking approached by their solutions.
The world has been undergoing persistent transformation which some have been attributed to the changing developments in science and technology. In particular, information and communication technology is one of the most celebrated developments. Indeed, information technology has changed the lives of people
My project is going to be on the history of hacking. The term ‘Hacking’ was invented before 1990, but was not as popular or used for the same things by the 1990’s, it picked up a whole different meaning as technology advanced (Baase, 2015, pg. 230 para.1). In this paper I’ll be explaining things about when hacking became a criminal injustice, and its impact that it has on our entire humanity and societies. I’ll also bring up some information about hacking from the past such as how a Russian man named Vladimir Levin stole passwords by hacking into the system and stole billions of dollars from a company and dispersed funds into bank accounts all over different countries. England hackers impersonated Air traffic controllers, by giving bogus orders to pilots. Lastly the big credit card breach in Target stores in 2013. There are unintended consequences of hacking as for any technology. How do we feel as a society about if hacking is really good or really bad, what does it do for us?
The purpose of this work is to examine breaches in computer security. As a future IT professional, with the possibility of being in charge of protecting the security of a database, it is relevant to take a “hacker approach” to security. Effective security is no matter where one goes fundamentally the same. Successful fundamental security practices are universal, crossing all arenas of computer usage whether
Day by Day cyber-crimes have becomes more & more popular with dramatic increase in no of internet users. The Hackers are the persons responsible for this type of crime issues those type of typical people studies the weakness of a System as their advantage to make achieve his/her
Cyber Terrorism is an attack executed by Cyber Terrorists via information systems to significantly interfere with the political, social or economic functioning of a groups or organizations of a nation or induces physical violence and creates panic. We define hackers as individuals who wish to access, modify data, files and resources without having the necessary authorization to do so, and/or wish to block services to authorized users. Cyber Terrorists are individuals or groups to utilize computer and networking technologies to terrorize. In this paper, we study the behavior of two groups of hackers: Cyber Terrorists and Common Hackers. Cyber Terrorism and Cyber Terrorists is generally considered classified information which cannot be released to the public, we can usually only interfere that Cyber Terrorism and Cyber Terrorists exits. However in 2010 federal bureau of investigation chief, Robert Mueller, told an RSA conference of computer security professionals, “The Cyber Terrorism threat is real and rapidly expanding”. He indicated that terrorists have shown a clear interest in hacking skills and combining real attacks with Cyber-attacks. [8]
When most people think of a hacker they think of a person trying to break into a computer system to steal information or commit cyber vandalism. While this is a form of hacking, a better definition of a hacker can be found in the Dictionary of Computer and Internet Terms saying that “a person who programs, computers for recreation or as a hobby.” Hacking is becoming more and more common in the world of today because the information has become more accessible through mediums like YouTube, Google, and Printed Media. According to the Christian Science Monitor a recent study shows that “three-quarters of children in the United States have their own mobile device by age 4.” With this increased access and dependency on technology, the age of the average hacker has decreased. Kids all around the world are exploring and pushing the limits in the technological field many of them not even out of college. We have loaded the world with things that are connected to the internet we call this the “Internet of Things”. Most things we connected to the internet is password protected but about half of them have the default password much like “admin” these are doorways for a malicious hacker but who didn’t close the door. With that in mind not all hacking is a bad thing, while we have people out there that are indeed breaking the law most hacking comes in the forms of education, security testing, and hobbies.