This website uses cookies to ensure you have the best experience. Learn more

Cyber Crime: What Is Hacking? Essay

1313 words - 6 pages

Silent. Undetected. Life-changing. On (insert date), (insert name(s)) bypassed (insert company)’s security measures and gained access to the personal information, such as social security and credit card numbers, of millions of oblivious U.S. citizens, causing millions of dollars of damage and enormous amount of time to be spent making repairs and helping the citizens get their lives back. The rising popularity and availability of the personal computer also includes the rise of “potential opportunities for individuals… to access systems without authorization in order to cause disruption, damage systems, and commit crime…” (Rennie et al.) By being aware of this matter, one can effectively take preventative steps to avoid the potential stealing of personal information.
The term “hacking”, as defined by Dictionary.com, is “to cut, notch, slice, chop, or sever (something) with or as with heavy, irregular blows.” This is exactly what cyber criminals are doing today, slicing through counter measures to obtain digital knowledge, which is then sold on the black market or hacking sites with formats similar to eBay. From there, depending on the information, it is used to open up credit card accounts, apply for government benefits, and other forms of identity theft. The means by which they do this is only limited to expertise and creativity. Once inside a computer or network, a hacker may then let loose his/her entire arsenal of destruction including, but not limited to, viruses, worms, and Trojan horses.
A virus is “a self-replicating program which can be both harmful, hard disk erasure or file corruption, and harmless, merely informing the users that there systems have been infected.” (Himma 15) Worms are similar to viruses, as they are also self-replicating, are generally harmless and exist in a network’s memory versus on the hard disk where viruses are found. Trojan horses, derived from the Ancient Greek mythology where are wooden horse was used to trick the city of Troy into bringing concealed soldiers into the city, often appear as useful or interesting programs which contain malicious code that allows a hacker to remotely control your computer. Trojan horses are often found in emails and internet downloads.
The stereotypical hacker is a “male adolescent between the ages of 14 and 16. These individuals tend to be self-taught, enjoy intellectual games, are not sexually active, and perhaps even neglect personal hygiene”. (Himma 8) These individuals feel as if they don’t fit in to a certain social group or don’t want to deal with the complexity and challenges of human relationships. While hacking is commonly linked to the rebellious youth, it isn’t limited to them as hackers can be found in all parts of the world where a computer has access to a network. Depending on a company’s security and counter measures, it can take only an individual to gain access to personal files, but more often than not, it takes a group to successfully sidestep modern...

Find Another Essay On CyberCrime: What is Hacking?

Crime in the Cyber Realm Essay

1032 words - 5 pages The following report takes into consideration two recent cybercrimes for the purpose of analyzing what cybercrime is and who is responsible for it. The opinions of Joseph Migga Kizza and Lawrence Lessig will be evaluated as they relate to the two cybercrimes. As part of the analysis, the underlying assumptions and the practical implications of the two authors will be considered. Two Recent Cybercrimes With the popularity of the social media

Gray-Hat Hacking Essay

2153 words - 9 pages a concern. What happens when a country has a policy in place that would make a criminal out of someone where it was not a crime in their home country? It only became a crime because the data traveled through the computer systems of the country where it is a crime. With general hacking, there is no ability to direct the data traffic. The global network is too vast with several routes to the same hosts. The resiliency of the network has now become

cybercrime solutions

694 words - 3 pages . Furthermore, installation of firewalls can help to minimize cybercrime problem. The function of firewalls is to perform monitoring and controlling on traffic between your computer and the Internet. This can act as a strong first line of defense and protection when it comes to prevent cyber terrorists from hacking your computer system. There are some network traffics which can be blocked according to the policy of network security. The firewall that is

Cyber Criminals

669 words - 3 pages to others with nothing to gain are called vandals. Pioneers are a group of hackers, there are a few hard-core criminals amongst them, who simply explore the internet with no information on what they can find. Another type of hacker is the addict who is addicted to computer technology and hacking. Most hackers do not hack for the money, but the information they gain from the hack or the enjoyment from getting into something illegally. A type of

Cyber Hacking and Types of Hackers

984 words - 4 pages could have taken anything. No one quite knows. So after that incident, the FED should and will take great measures to protect itself from cyber attacks. Let’s get an overview of what the Federal Reserve has to deal with: The history of cyber hacking and the many different types of hacking. A hacker is a person who looks to reveal problems in a computer system or network. Hackers might be motivated to do what they do because they could make a

Actions taken by the Australian Government to combat cyber crime

1182 words - 5 pages to protect Intellectual Property rights on the internet, but they extended so far that like the Cybercrime Prevention Act of 2012, many are labelling them as an infringement of our freedom of speech by giving a select few the power to control what is and what isn't allowed on the internet. Although the bills only affect the US, they will have severe ramifications throughout the world, including domestically in Australia. Any Australian business

Cyber Crrime

1025 words - 5 pages There are two types of crime. There is crime and then there is cybercrime. Crime is when a person commits an action that is offensive and can be prosecuted by the law. Cybercrime is when you commit a crime on the internet or a cell phone. There are many types of cybercrime. You can prevent cybercrime. You can also take certain steps to keep personal information. There are 6 types of crime. The first one is piracy. This is when you copy

High-tech Crimes

954 words - 4 pages that I believe would best explain the crimes of the high-tech offenders using my own ideas along with the researches from credible sources to support the ideas. The three theories that I will be discussing are, Strain Theory, Subcultural Theory and Rational Choice Theory. First, what is a high-tech crime? High-tech crime is also known as cybercrime and according to (Schmalleger, 2011), cybercrime is defined as, “Crime committed with the use of

Definition of cybercrime

1503 words - 6 pages Definition of cybercrime Cybercrime, what is cybercrime? I thought it would be fitting for us to define what cybercrime is, therefore, the definition of cybercrime is “crimes that are done over the internet using the computer to target victims so that they can steal valuable information about the victim, their business or bank account, etc. Now that we have the definition of cybercrime we will address what the personality profile of a

IT Security: The Men Behind the Scenes

1345 words - 6 pages the most precise and important jobs of the modern age. What is IT security? According to TheFreeDictionary.com, IT security is “The protection of information and information systems against unauthorized access or modification of information, whether in storage, processing, or transit, and against denial of service to authorized users.”(Farlex 1). In other words, the job of an IT security consultant is to shield “sensitive” data, such as credit

CyberCrime: Investigating High-Technology Computer Crime

2678 words - 11 pages different cybercrime threats such as, hacking, identity theft, child pornography, and financial fraud. Moore also goes into detail on different law enforcement tactics that help catch cyber criminals such as, the seizing of digital evidence, executing search warrants for digital evidence, computer forensics, and cybercriminology. Moore’s main goal is to help the reader grasp a better understanding of cybercrime that faces the world today. Through

Similar Essays

The Dark Side Of The Internet

1357 words - 5 pages ask, what about other types of cybercrime such as cyberbullying, stealing money, or stealing identities? The answer is simple, as Michael Dennis puts it,”An important aspect of cybercrime is its nonlocal character: actions can occur in jurisdictions separated by vast distances(web).” Dennis points out that computers can remove distance and political barriers. Therefore if a computer is used it is cybercrime and numerous things fall into this

Susan W. Brenner’s Cyber Crime: Criminal Threats From Cyberspace

2881 words - 12 pages , and the ease for someone to become involved in cyberspace (Brenner, 2010, p. 7). Before Brenner could get deep into cybercrime, the term must first be defined. What is cybercrime? Cybercrime is “engaging in conduct that is outlawed because it threatens order” (Brenner, 2010, p. 10). The main difference between cybercrime and crime is in the tools used; cybercriminals use computer technology instead of guns. With the increase of technology

The Effects Of Cybercrime Essay

1692 words - 7 pages ” it’s the latest and the most complicated problem in the new century. Cybercrime consists of all criminal actions against communication devices in a network such as Internet, telephone lines or mobile network. Cyber crime can be observed among people at various age groups as it is easier to commit compared to other types of crime like murder, kidnapping or human trafficking. Cybercrime 3 WHAT IS CYBERCRIME? Just as traditional

Different Methods Of Cyber Crime And Their Effects On Modern Society

1363 words - 5 pages Different Methods of Cybercrime and Their Effects on Modern Society The world we live in is more technologically advanced than ever before, with newer developments coming every year. Men, women, and children worldwide rely on the Internet for work, school, play, socialization, and any number of other reasons. Yet, despite the great advantages technology gives to us, with our increased reliance and connectivity comes an increased risk of crime