This website uses cookies to ensure you have the best experience. Learn more

Hacker Ethics Essay

914 words - 4 pages

The issue whether computer hackers are technological innovators who push the boundaries of development or just reckless criminals who endanger companies and individuals is very controversial. Computer hacking is prohibited by law. But this fact does not lead to the conclusion that computer hackers are criminals. A good starting point while elaborating this issue would be to try to answer the following question: what motivates computer hackers and what are the consequences of their actions?Computer hacking has its own history. It has its own heroes and black sheep, which the society of hackers has named them "crackers". The word "crackers" derives from the word criminal hacker. Those are computer hackers, whose actions leads to no higher good; instead they cause damages to various companies and individuals. For example when someone through his work violates the copyright law.Lately there has been reported in media about a group of "pirates" who have stolen movies from other companies and they sold them on a black market. By doing so, they have caused damage to the affected companies and the only thing that motivated them to break the security systems of the companies was to find a way to profit for themselves. These were groups of people who actually worked within the IT community in different states, and then joined there "forces" to a common interest: their own individual profit. So they did have a goal and a plan. In one way, also these group of people did alert the movie companies that their system is not secure enough and that it needs to be improved, which is my argument why even computer crackers do have an important role on a further technology development, but in their case, their knowledge and skills were not used to a higher good for the society and information technology, but only for their own narrow interest.The other group of computer hackers, also labelled as "white hackers", symbolising with white their positive nature, are people who are not motivated by their personal profit. Most of them, do not have formal education in computer sciences. They are just young people of different profiles with a common hobby: "computers".However, it is a fact, that their work did have unpleasant consequences for many companies and individuals. But beyond the temporary losses, I believe that it is exactly those people who have raised the awareness of companies that like to claim that their security system is 100% safe about their weaknesses and not rarely provided them also with solutions to their security problems. For example the case of Adrian Lamo in USA, who cracked down security systems of Microsoft. Instead of "disappearing" he informed them about the flaws of their systems and...

Find Another Essay On Hacker ethics

Hacking Computers and Ethics What comes to mind when you

2553 words - 10 pages Hacking Computers and Ethics What comes to mind when you hear the word ?hacker?? For most it means stealing information through the Internet, gaining illegal access to another person?s PC, or simply - disruptive behavior using a computer. The subject of hacking is no secret to the general public. Many people have been exposed to it by a bad experience or through the news and media. The idea of hacking that is stuck in the minds of people is that

Ethical Hacking and Ethical Hackers Essay

1703 words - 7 pages work, some people feel that the requirement for absolute trust eliminated such candidates. One rule that IBM's ethical hacking effort had from the very beginning was that they would not hire ex-hackers. The reasoning is would the government hire an ex-convict to become a policeman? One fundamental issue in the hiring of a hacker is ethics. After all, hackers are criminals. And in the UK, the inclusion of cyber crime in the Terrorism Act 2000

Hackers vs. Crackers

3212 words - 13 pages that hacking into systems is not wrong. They do it for the intellectual challenge, to gain knowledge of how things work. And they share this knowledge. When (true) hackers hack into systems, they are very careful not to change anything; they only want the technical knowledge of the hack: It is against hacker ethics to alter any data aside from the logs that are needed to clean their tracks. They have no need of desire to destroy data as the

Is Ethical Hacking the Answer to Ensuring the Safety of Company’s Computer Systems?

1445 words - 6 pages following categories: curiosity, vandalism, hacktivism, industrial espionage, extortion or fraud and information warfare (Barber 2001). If ethical hacking is to be utilized, the ethical hacker must follow stringent rules and ethics, leaving all company information behind upon completion of a job. The bottom line is that one can ever be 100% safe when there are human influences involved, but if the ethical hacker is carefully vetted prior to hiring

Enabling Hackers to do Good

2285 words - 9 pages . . D'Arcy, John, and Anat Hovav. "Does One Size Fit All? Examining the Differential Effects of Is Security Countermeasures."Journal of Business Ethics 89.1 (2009): 59-71. JSTOR. Web. 13 Apr. 2014. . Dey, Debabrata, Atanu Lahiri, and Guoying Zhang. "Hacker Behavior, Network Effects, And The Security Software Market." Journal of Management Information

Computer Hacking

1065 words - 4 pages Hacking is using your knowledge to gain more knowledge. This is one of the best definitions I could find on the net. Hacking is state of mind. Curiosity is the main point; a hacker always wants to know everything. It is the curiosities that which makes them learn more and more quickly than other person at same age. Traditionally hackers were regarded as ?geeks?, who knew everything about computers (hardware & software) & networks. They


3835 words - 15 pages . Generation changed too. Hackers are more pessimiste , thoughtless more careless and more self-centered. I tihnk the truth of the matter is everyone has their own hacker ethics. No one plans to arrested but the hackers have several rules that they apply when they are arrested.They do not try to convince the officer of their innocence it is useless. Because they do not care hackers are innocent or not . It is the job of the judge or

Crime in the Cyber Realm

1032 words - 5 pages site Twitter, single letter handles are rare. Naoki Hiroshima was the owner of one of those rare handles, @N. He had been offered as much as fifty thousand dollars for the account, which he always declined. On January 20th of 2014, a hacker was able to social engineer part of Naoki’s credit card information from a PayPal representative. The hacker used that information to social engineer a GoDaddy representative into giving him control of Naoki’s

Threats to Internet Privacy and Security

950 words - 4 pages . Manned Threats There are many threats that are manned attacks from a live hacker or hackers. IP spoofing is one such threat where IP packets are intercepted and altered by inserting a false source address into the packet header. The purpose of IP spoofing is to create false entries into network routers, creating valid entries for an invalid IP address, and is a precursor to further hacking techniques. A hacker can take control of an

Hackers are thieves who fail to comprehend and respect the rights of intellectual property owners and corporations. Argue for or against this statement

2441 words - 10 pages Today's technology has brought about untold possibilities in our daily lives with the culmination of the Internet. The Internet has enabled everybody with a computer and modem to link up to the World Wide Web. Interaction with people from all the way across the globe has never been easier. Unfortunately, this ever-growing ease of connectivity to one another has given rise to a whole new problem; that of the hacker. Hackers have long been an

Business Ethics

3763 words - 16 pages Question 1: Do you think it is appropriate for businesses, when operating in foreign countries, to adjust their code of ethics in order to fall in line with the ethical norms of the host country? Many businesses and corporations now operate on a global scale, not only offering their goods and services to countries throughout the world but setting up operations in those countries as well. These companies quickly find that the day to day

Similar Essays

Security Issues In Cyberspace Essay

1325 words - 6 pages It is held by many people today that the World seems to be a small global village because of internet and use of ICT and computers. There are many different issues and cases in Information and Communication Technology as well as in other fields that need proper analysis leading to correct decisions for solutions. Because of the brevity of the assignment, I would like to talk about security in cyberspace to deal with hacktivism and hacker ethics

Computer Hackers And Ethics Essay

1639 words - 7 pages break in and steal information until 1994. On Christmas day, he broke into the computer of Tsutomu Shimomura, an expert at computer security. Shimomura began to track Mitnick. He was finally arrested in 1995. Twenty five thousand stolen credit card numbers were found on his PC. This brings us to the question are hacking and ethics compatible? Believe it or not, there is an actual Code of Hacker Ethics that exists. Many hacker organizations and

The Hacker Subculture Essay

2020 words - 8 pages hat hacker breaks security for non-malicious reasons. [edit] Grey hat Main article: Grey hat A grey hat hacker is a hacker of ambiguous ethics and/or borderline legality, often frankly admitted. [edit] Black Hat Main article: Black hat A black hat hacker is someone who subverts computer security without authorization or who uses technology (usually a computer or the Internet) for terrorism, vandalism (malicious

Hacking As A Means Of Identifying Weaknesses In Computer Security

1651 words - 7 pages technique by governments and organisations proves its wide effectiveness. In addition, the growth of spending in system security proves the growing concern of the IT business for security and the increasing number of experts required. Although there are some concerns on the authenticity of hacker ethics, one can see “ethical hacker” is nowadays a fully certified job title. Works Cited 1. Knight, William. 2009. "License to Hack". InfoSecurity 6 (6