Hacking is the practice of changing the features of a system, in order to accomplish a goal outside of the maker’s inventive purpose. These actions may result in someone finding information that does not belong to them and using it to access personal accounts. There are three categories of hackers; black hats, white hats, and gray hats. With regard to this, it depends on the job of the hacker.
For instance, black hat hackers are well-known for the common cybercrimes. These includes DOS/DDOS attacks that overload internet servers, defacing websites by hijacking control and replacing the main page photos with rude slogans, preforming identity theft, and taking remote control of dozens of personal computers and programming them to “zombie” as spam broadcasters (Gil).
Surprisingly, there are hackers with a good moral known as “ethical hackers” or “white hats” that use their skills to help companies and businesses find their weak points. Gray hats are individuals that want to cause destruction and fail. They are not concerned about the serious consequences they might have to go through when caught. Black hats are the individuals with the knowledge, but intentions to cause impairment (Lord). In spite of the white hackers, I think all hackers should be classified as criminals because of the invasion of privacy and using the findings for profit.
On the other hand, some may argue that hackers are considered as “Cyber Heroes”. According to CTU Doctoral Chair of Computer Service, Bruce Harmon, “Breaking into computer networks is illegal even if for less self-serving purposes.” To become an ethical hacker, they, likewise, have to acquire methods on how to complete tasks, unauthorized, which would be illegal (Harmon). Not only does computer hacking occur, but also electronics, home security systems, and vehicles as well (Kelly).
To begin with, if something can connect to a network, it can be hacked. Attacks on personal computers used to be the mainstay of cyber criminals; the next big target is smartphones. Mobile devices can be transformed into a “spy phone” that remotely monitors its owner. This can be achieved by installed apps with malicious codes and innocent-looking chargers as a tool for collecting data and information. Worst of all, the users has no idea that their phone is acting as a surveillance device.
In addition to everyday items being hacked, home security systems have the potential to cause the most damage. It is possible to have someone break in by opening the “smart” front door locks. Another disturbing trend was spying on unknowing individuals through their own cameras. (Kelly) According to Aaron Grattafiori and Josh Yavor, researchers, they found bugs in the 2012 model of the Samsung Smart TV that allowed them to turn on and watch video from the set’s camera. “Place a piece of tape over any cameras you don’t want surreptitiously watching you, just to be safe”, suggests security expert, Joseph Levy.
Another household item that can be...