This website uses cookies to ensure you have the best experience. Learn more

From Hacking To Cyber Terrorism Essay

4086 words - 16 pages

From Hacking to Cyber Terrorism


Information technology (IT) is evolving everyday and our day-to-day life is becoming more and more dependent on it. In this twenty first century, we cannot imagine ourselves without emails, online banking systems and health care systems and without World Wide Web. In other words, evolution of IT has given a modern, technologically advanced and convenient life to the society. But, over the time we are also observing explosive growth in the darker side of the IT - regarding hacking and cyber crimes. Activities like unauthorized computer intrusion, denial of service (DOS), stealing computer passwords and secure data; causing damage to computer systems and databases and causing damage to individuals/society are not very rare these days.

As we go further on this paper, we will see different aspects of hacking, from harmless (simply looking around thru web) to dangerously harmful (cyber-terrorism). Irrespective of harmless or harmful, we need to understand is it ethical and how does it impact the global world. This paper is intended to discuss the ethical issues and moral values involved with this darker side of information technology. This paper also includes discussion on the good side of hacking and how hacking can lead to serious cyber crimes and causes harm to world community.

What is a computer hacker?

The definition of the computer hacker can be described as follows,

1. In programming, a computing enthusiast. The term is normally applied to people who
take a delight in experimenting with system hardware (the electronics), software
(computer programs) and communication systems (telephone lines, computer networks
etc). 1

2. In data (information) security, an unauthorized user who tries to gain entry into a
Computer, or computer network, by defeating the computers access (and/or security)

Hackers are usually young men, have excellent skills in computer programming and network and can make computer do anything they want. Some hackers are malicious, whilst others are merely naïve and do not cause any real harm. Their motivations for hacking includes financial gain, revenge, ideology or just plain mischief making 1. There are different categories of hackers - algorithm hacker, system hacker, password hacker etc.

What is cyber terrorism?

Cyber terrorism is a new class of threat to the world. This is one of the extreme cases of hacking. Here, instead of physical terror efforts are focused upon attacking information systems or resources especially using World Wide Web. Cyber terrorists use computer systems and software to create violence and loss by breaking security of target systems or by stealing/corrupting computer systems. Unlike hackers, Cyber terrorists usually work under political or ideological influence and always more harmful than a hacker. However it’s always possible that a hacker can turn into a cyber terrorist by...

Find Another Essay On From Hacking to Cyber Terrorism

This paper describes the crime of cyber crime and how to prevent it from happening to you

1661 words - 7 pages Cyber Identity TheftIdentity theft is a crime that causes damages to a person that can last a lifetime. One of the ways peopleT's identity is being stolen is through the use of the internet. Cyber Identity Theft is becoming very popular and is a problem that every person that uses the internet needs to be well aware of. For most people once it has happened it is too late to for them to recover from the losses. People are damaged financially, as

Cyber Security Essay

1295 words - 5 pages and hacking them. This way security can gain access to their files to help locate their position and arrest them. However the threat of cyber terrorism is still growing. In order to eliminate the threat of cyber terrorism the government needs to hire more people who are trained in cyber security. Cyber Terrorism Cyber terrorism is a major threat that goes unannounced to the American public that must be addressed. Imagine if you were an employee

The Dangers of Cyber-Terrorism

1529 words - 6 pages , the thing that makes cyber terrorism intrinsically different from standard terrorism attacks is the fact that it is barrier proof and terrorists can bypass the American law because they can operate in countries that do not have laws against cyber terrorism (Siegel, 2009). Cyber terrorists can also use the internet as a supplement to regular attacks because they can obtain information about target countries and groups leading to a more aggressive

Cyber Terrorism

2138 words - 9 pages ;In this research paper, I will prove that hackers gain power and publicity with crimes they commit through cyber space. And it is easy for even amateur hackers to gain information and money from powerful organization without any detection or suspicion. Hacking is also a costly and destructive force for people in Cyber Space. Cyber Terrorism is such a destructive force that our country lost millions of dollars to hacking terrorists from other

Future Terrorism

879 words - 4 pages growing use of the internet by terrorists over the years. There are also many different levels to the cyber threat, from those individuals who do simple hacking, to those who participate in cyber espionage and organized crime on up to the highest level when individuals launch nation-state cyber-enabled kinetic attacks. Terrorists use the internet sometimes to entice and recruit other members, as well as a form of communication. Because anyone can

Cyber Terrorism

1619 words - 6 pages targeted towards cyber terrorism are making some people shy away from trying to be a hacker. Just like everything else though, nothing is fool proof, and where there is a will, there is always a way.Works CitedErbschloe, Michael. Information Warfare. New York: McGraw Hill, 2001.Judson, Karen. Computer Crime. Hillside: Judson, 1994.Knittel, John, and Michael Soto. The Dangers of Computer Hacking. New York: RosenPublishing Group, Inc, 2000.Schwartau


1665 words - 7 pages , one can only hope to become more aware of the possible dangers associated along with computer hacking. Tough laws targeted towards cyber terrorism is making some people shy away from trying to be a hacker. Just like everything else though, nothing is fool proof, and where there's a will there is always a way.

The Rational Choice Theory: Criminology by Frank Schmalleger

1885 words - 8 pages account, or as nefarious as stealing money from online shopping retailers. Knowing that the chance they will be caught is negligible, it is easy for teens who would have never attempted other risky, illegal behaviors to give in to the temptation. “One in three teens have admitted to being tempted to try hacking or spying on the Internet to make money (with eventual transition to cyber-crime)” (Richet, 2013, p.56). Once a teenager is headed down the

The Truth Behind Computer Hackers

1179 words - 5 pages hackers viewed others as others viewed them. They could say that someone who has is good at math or banking to be cheap. Or someone who is knowledgeable in chemistry to be a mad scientist. They wouldn't take to kindly to that assumption. Now Outside of fabricating new technological advancements, hackers also help to protect from other Cyber crimes including Cyber terrorism, Cyber bulling, etc. Like I said earlier companies hire hackers to work

Cyber Crrime

1025 words - 5 pages these hackers either gain information about your social media profile or your bank account. All of these hacking methods will put you in jail if you are caught. They can give you 25 years to life depending on how bad your case is. The third type of cyber crime is cyber-terrorism. This is when you go online and attack a person or a group and cause a great amount of fear. These people can infect a virus into your computer. Most of the time the

The Art of Intrusion

1524 words - 7 pages Most U.S. citizens associate the word hacker with the concepts of cyber criminals, cyber terrorism and cyber warfare. A large percentage of the population list the names of cyber insurgent groups like Anonymous, LulzSec and the Syrian Electronic Army, and almost every American believes that China and their cyber army is a possible threat to American safety. The largest cyber force in existence the Chinese cyber army. Hackers were not

Similar Essays

Cyber Ethics: Principles To Combat Hacking

2521 words - 10 pages technology field, issue regarding to ethics and professionalism had been given name as cyber ethics. According to ikeepsafe (n.d.), cyber ethics is the discipline of using ethical behaviors and acknowledging moral duties to online environment and digital media. This issue includes hacking, phishing, copyright, downloading, cyber bullying, etc. The issue discussed in this paper, is the most problematic and troublesome - Hack. According to

From Jihad To Terrorism Essay

754 words - 4 pages if the extremist factions of our society will keep misinterpreting Jihad in the name of terrorism then the aim and image of our religion Islam that promotes religious tolerance will be distorted. The following sources of the literature review support this hypothesis. It is being widely believed that terrorist actions are mostly done by the Muslim jihadist. People misinterpret jihad and terrorism. According to Islam In any case

How To Protect Yourself From Hacking

1754 words - 7 pages defense against many types of hacking. A firewall basically allows you to mask IP addresses and ports on your network's computers, protecting them from use by hackers.Personal Security on the Internet - Dangers and SolutionsWelcome to Tech-Bytes and to the topic of personal security on the Internet. Over the next three issues I will be covering personal, corporate and enterprise security.If you are reading this article on the Internet and using your

10 Ways To Keep Word Press Site Safe From Hacking

1079 words - 5 pages Illegal hacking is a serious offence. Google ‘prevent WordPress hack” and you will see more than 5 million results, which shows how people are worried about keeping their websites and blogs free from hacking. Is your WordPress safe from hacking? Check out the following 10 ways to keep WordPress site safe from hacking: Note: Wherever plug-ins is mentioned, they are applicable for paid WP sites. Free WP sites cannot install plug-ins. Update to