This website uses cookies to ensure you have the best experience. Learn more

Hackers Are Criminals Essay

1299 words - 5 pages

Hacking is the practice of changing the features of a system, in order to accomplish a goal outside of the maker’s inventive purpose. These actions may result in someone finding information that does not belong to them and using it to access personal accounts. There are three categories of hackers; black hats, white hats, and gray hats. With regard to this, it depends on the job of the hacker.
For instance, black hat hackers are well-known for the common cybercrimes. These includes DOS/DDOS attacks that overload internet servers, defacing websites by hijacking control and replacing the main page photos with rude slogans, preforming identity theft, and taking remote control of dozens of personal computers and programming them to “zombie” as spam broadcasters (Gil).
Surprisingly, there are hackers with a good moral known as “ethical hackers” or “white hats” that use their skills to help companies and businesses find their weak points. Gray hats are individuals that want to cause destruction and fail. They are not concerned about the serious consequences they might have to go through when caught. Black hats are the individuals with the knowledge, but intentions to cause impairment (Lord). In spite of the white hackers, I think all hackers should be classified as criminals because of the invasion of privacy and using the findings for profit.
On the other hand, some may argue that hackers are considered as “Cyber Heroes”. According to CTU Doctoral Chair of Computer Service, Bruce Harmon, “Breaking into computer networks is illegal even if for less self-serving purposes.” To become an ethical hacker, they, likewise, have to acquire methods on how to complete tasks, unauthorized, which would be illegal (Harmon). Not only does computer hacking occur, but also electronics, home security systems, and vehicles as well (Kelly).
To begin with, if something can connect to a network, it can be hacked. Attacks on personal computers used to be the mainstay of cyber criminals; the next big target is smartphones. Mobile devices can be transformed into a “spy phone” that remotely monitors its owner. This can be achieved by installed apps with malicious codes and innocent-looking chargers as a tool for collecting data and information. Worst of all, the users has no idea that their phone is acting as a surveillance device.
In addition to everyday items being hacked, home security systems have the potential to cause the most damage. It is possible to have someone break in by opening the “smart” front door locks. Another disturbing trend was spying on unknowing individuals through their own cameras. (Kelly) According to Aaron Grattafiori and Josh Yavor, researchers, they found bugs in the 2012 model of the Samsung Smart TV that allowed them to turn on and watch video from the set’s camera. “Place a piece of tape over any cameras you don’t want surreptitiously watching you, just to be safe”, suggests security expert, Joseph Levy.
Another household item that can be...

Find Another Essay On Hackers Are Criminals

Debating the Motivating Factors for Hackers

1473 words - 6 pages alleged that often, when hackers are occasionally caught, their behavior is encouraged because they are recruited to identify weaknesses in computer systems and digital infrastructures. Therefore, a societal role of a hacker can be to close security gaps by proselytizing gray hats and black hats to become white hats. Perspectives on Cybercriminals and Real World Criminals Sarah opined that originally, hackers and virus writers belonged to

Hackers hacking the net Essay

1321 words - 5 pages access money. Criminals who break into computer systems electronically are commonly called 'Hackers'. In today's highly technological computer world, the computer hacker is digging their way through our nation's computer systems to embezzle money, create chaos, manipulate figures, and to seek enjoyment. However, hackers are even used for finding security breeches.The birth of hackers in the Sixties, shortly came after the advent of elite

The Truth Behind Computer Hackers

1179 words - 5 pages consider these hackers as criminals are highly incorrect,as all hackers aren't criminals. See computer hacking by definition is the practice of modifying a computer, hardware,or software to accomplish a goal outside of the creator’s original purpose. In fact, many hackers consider hacking an art, as it is a real life application of problem solving skills. The point when people become confused on who is a criminal hacker and who is not, lays

Cyber Hacking and Types of Hackers

984 words - 4 pages who breaks into computers is called a “cracker”. The computer criminals (also known as black hats) and computer security experts (also known as white hats) could care less though. There are many different types of hackers or computer criminals out there that could affect the Federal Reserve over the next 100 years. A white hat hacker hacks for a non-threatening reason, probably because they want to test their own security system or to test

The Art of Intrusion

1524 words - 7 pages Most U.S. citizens associate the word hacker with the concepts of cyber criminals, cyber terrorism and cyber warfare. A large percentage of the population list the names of cyber insurgent groups like Anonymous, LulzSec and the Syrian Electronic Army, and almost every American believes that China and their cyber army is a possible threat to American safety. The largest cyber force in existence the Chinese cyber army. Hackers were not

Hacker ethics

914 words - 4 pages The issue whether computer hackers are technological innovators who push the boundaries of development or just reckless criminals who endanger companies and individuals is very controversial. Computer hacking is prohibited by law. But this fact does not lead to the conclusion that computer hackers are criminals. A good starting point while elaborating this issue would be to try to answer the following question: what motivates computer hackers

Hack Attack

1653 words - 7 pages Internet crimes are developing at a shocking rate. Since the invention of the World Wide Web, it gives criminals the power to collect and steal information without anyone finding out (Galbreth and Shor 595). Cybercrimes increased by an astonishing 22.3 percent from 2008 to 2009 alone (Hoi-Ying 1646). Of those crimes, only about 43.5 percent of companies report the crime to authorities (Hoi-Ying 1646). With each occurrence of hacking, companies

Cyber Terrorism

2138 words - 9 pages ;   To almost all professionals the actions of hackers are despicable and justify all sorts of nasty punishments. I fully agree that hacking is a criminal offense and should be prosecuted. The only thing that bothers me from a moral standpoint is that these criminals are essentially the cyberspace equivalent of teenage vandals. They do not know the implications of what they are doing. These people are displaying, vandalism, and their


3835 words - 15 pages Hackers It is the weekend you have nothing to do so you decide to play around on your computer . You turn it and than start up , calling people with your modem , conneciting to another world with people. This is all fine but what happens when you start getting into other people’s computer files , then it becomes a crime and who are the criminals. To begin i will start with hacking and hackers. Hacking is the act of

Should You Hire a Hacker to Protect Your Computer Systems?

1305 words - 5 pages The question of whether or not to hire an experienced hacker to protect an organization's IT systems is a difficult choice. Some who answer this question will emphatically say no, while others may be more keen to the idea because of a hacker's ability to bypass a system's security. The mainstream media often portrays hackers as shady individuals who break the law and who are capable of such horrific abilities such as starting a nuclear war by

Gray-Hat Hacking

2153 words - 9 pages a tool for countries who would like to go after hackers. Many countries can now go after alleged hackers (or terrorists) with these new laws in place. Since hackers cannot be distinguished by compromised systems, gray-hat hackers are becoming criminals under these set of laws. Looking at several of the ethical approaches, gray-hats are ethical in their utility to society; they work for the common good, they embody virtue, and their work

Similar Essays

Are 'computer Hackers' Technological Innovators Who Push The Boundaries Of Development Or Reckless Criminals Who Endanger Companies And Individuals?

1074 words - 4 pages In my essay I am going to speak about hackers and their negative and positive roles in the society.Hacking is a relatively old issue, dated to 1961 [1, history of]. There are many ways to define hackers but in my opinion their position as reckless criminals who endanger companies and individuals, outpaces their positive effects.Nowadays there is a lot of evidence on the harm and the loss that they cause to big companies and as well to

Hackers Vs. Crackers Essay

3212 words - 13 pages this question because the identity of a culture in our society-the hacker culture-is being challenged. It is being defined as good or bad. This good or bad status affects the way Americans use the Internet, the way the government controls or does not control the Internet, and the way technology will grow in the future. Some people say that there is no difference between hackers and crackers; they are both criminals. Others say that there are

Why Do Companies Need Ethical Hacking?

1411 words - 6 pages system to ensure that there are no loopholes in the systems. If there were any loopholes detected by the ethical hackers they will report the matter back to the organization and work hand in hand in ensuring that no intruder is able to bypass the organization’s security system. • Some other organizations are against hiring ethical hackers .They argue that hiring criminals will not sit well with their clients they believe that they will lose all

Cyber Criminals Essay

669 words - 3 pages computer or the manipulation of digital data. There are different classifications of cybercriminals such as: hackers, identity thieves, and high-tech criminals. People that use a computer for discovery or devious intent are considered hackers. Though many cybercrimes revolve around hacking, there are a lot that do not. There are different kinds of hackers. Hackers can be grouped based on the hacker’s personality and lifestyle, and can be