Wednesday, May 6, 2020
Computer Hackers and Ethics Essay - 1582 Words
What comes to mind when you hear the word ââ¬Ëhackerââ¬â¢? For most it means stealing information through the Internet, gaining illegal access to another personââ¬â¢s PC, or simply - disruptive behavior using a computer. The subject of hacking is no secret to the general public. Many people have been exposed to it by a bad experience or through the news and media. The idea of hacking that is stuck in the minds of people is that of which they have seen in the movies. The movies portray hackers as young and devious criminals. However, in reality these individuals are, talented people who use their abilities to find new and challenging ways to change how computers work. According to the Cult of the Dead Cow (weird name), a hacking organization, trueâ⬠¦show more contentâ⬠¦The phreaker would cut a piece of stiff construction board about twelve inches long and three-eighths of an inch wide and slide into the dime slot as far as it would go. To make a call all you had to d o was pick up the phone, wait for a dial tone, and put a penny in the nickel slot. The phone would register the penny as a dime and a free call could be made. Curiosity of how the phone worked led to an interest in the computers that controlled the phones, which in turn led to hacking. Most of the earlier computer break-ins came from company employees seeking revenge or financial gain. For example, in 1971 disgruntled employees of the Honeywell Corporation disabled the Metropolitan Life computer network for a month. And in 1973, a teller from the New York Dime Savings Bank was able to break through the computer system and steal $1 million dollars. Though these were computer crimes, there were also earlier hacks that were beneficial. One of the most successful hacks in history was that of Apollo 13. When the astronauts were in space, they ran into some mechanical problems. The capsule was spinning out of control. The astronauts were losing their air supply and it was getting colder and colder. They were running out of time. Meanwhile, at the NASA headquarters in Houston, TX, one of the managers dragged a large box full of scrap parts, dumped it on the table and told the engineers ââ¬Å"this is whatShow MoreRelatedEthical Concerns Of Computer Technology1440 Words à |à 6 Pagesviewing the region of computer technology, moreover it is a necessity that ethics be considered when making decisions in this specific region. Computing or in other words the use or operation of computers (Bowles, M. D. 2013). Has created a whole new set of ethical concerns, different in its own way. For example, Software Theft were someone is utilizing software however did not go through proper protocol to do so like paying for it; unauthorized use of hardware or the use of computers to commit fraud,Read MoreShould You Hire an Experienced Hacker to Protect Your It Systems819 Words à |à 4 Pagesto safeguard this information than someone who knows the intricacies of what a hacker lo oks for when trying to infiltrate a network. I think you would be making a mistake not to at least look in to hiring a hacker to help your organization. Fist things fist lets look at what makes a hacker a hacker. Here are some of the various types of hackers: Hacker: refers to a type of computer hacker who is involved in computer security/insecurity, specializing in the discovery of exploits in systems (forRead MoreAccounting Information System Security1574 Words à |à 7 Pagesdescribe a related News story. Then, several ways of illegally getting access to essential information by hackers will be provided. Moreover, considering the formation and reality of network business, the essay will analyse how to guarantee the security of a company from two aspects, externally and internally. Finally, a brief conclusion will be provided. Reported by BBC News (2011), hackers, who targeted crucial information of oil exploration and bidding contracts, have penetrated the networksRead MoreAre Computer Hacker Break Ins Ethical? Essay1247 Words à |à 5 PagesAre Computer Hacker Break-ins Ethical? - Eugene H. Spafford Essay Assignment The words Ethics and computers have gone hand in hand since the WW2 when MIT professor Norbert Wiener and his team designed the anti-aircraft cannon that could gun down a warplane and pioneered a new field of research in information feedback known as Cybernetics. I think the need for computer ethics and fundamentals emerged ever since the first computers were designed and we realized that these machines couldRead MoreHow Technology Has Changed Our Lives1539 Words à |à 7 Pagesincreased a threat that these things might be breached by individuals so called ââ¬ËBlack hat hackersââ¬â¢, who violate computer security to steal personal information or even completely damage the computer system (Moore, 2014). Malicious acts committed by this group of hackers caused the increase in the number of cyber-security researchers so called ââ¬ËWhite hat hackersââ¬â¢. These individuals also try to break into the computer systems but with the purpose to find its possible vulnerabilities a nd then provide a softwareRead More Computer Ethics Essay895 Words à |à 4 Pagesabout 62 percent of the American population had at least one home computer. Another statistic is that about 55% of people also have internet on there home computers. In everyday life it is important for a person to have good ethics; this is also true about computer usage. Due to the fact that more then half of the American population owns computers, computer ethics are a growing concern in a rapidly changing society. Computer ethics can be broken down in to many topics including piracy, hacking,Read More Ethics in the Age of Information Essay example1474 Words à |à 6 PagesEthics in the Age of Information The information age is the age we live in today, and with the information age comes an age of ethics. When we deal with the new technologies introduced every day, we need to decide what we must consider ethical and unethical. We must consider all factors so that the use of the information readily available to many persons is not abused. Information technology will be the most fundamental area of ethical concern for business in the next decade (HoustonRead MoreWrite an Essay Discussing the Pros and Cons of Hiring Known Hackers to Test the Security of a System.936 Words à |à 4 Pagesand cons of hiring known hackers to test the security of a system. Nowaday, hacker is someone makes the technologys life to be more interesting. The term hacker has evolved over the years and been growing. For years there existed a fuzzy distinction between good and bad computer hackers, or we also call them white hat and black hat hackers. Whether they are good or bad, we cant negate they dont have any influence on the development of technology. Hiring known hackers to test the security of aRead MoreEthics Of Hacking And Cracking1156 Words à |à 5 PagesEthics of Hacking and Cracking in ATTââ¬â¢s iPad 3G Hack With the explosion of both computing power and network interconnectedness, devices and connections have grown significantly complex. However, this upsurge in computing technology has come at a price. With the prolific expansion and dependence of interconnected computers, there has also been a rise in the exploitation of vulnerabilities discovered within these multifaceted systems. The terms hacking and cracking refer to dichotomy of how individualsRead MoreHacking And Its Effect On Human Behavior Essay1608 Words à |à 7 PagesHacking in computer networking is the desire to manipulate the normal behaviour of a network connection or a connected system, a hacker is the person who is instigating the hack. In todayââ¬â¢s society, we generally refer to any malicious programming attack over the internet or a network to be hacking. Hacking originated between the 1950s and 60s by M.I.T engineers, they originally were meant for learning and experiment purposes and usually took place at the ââ¬Ëmodel train clubââ¬â¢. However, these attacks
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.