This website uses cookies to ensure you have the best experience. Learn more

Hackers Versus Business And Financial Institution Computers: Who Will Win The Battle?

2432 words - 10 pages

Introduction:"Hackers are not just geeks from War Games. The reality is a lot scarier." (Gregory Pleshaw, December 11, 2000) Most people think of hackers as being innocent kids looking for kicks by invading other people's computers. Hackers are responsible for much more and it is far worse than playing war simulations from government computers. Hackers are responsible for global scale terrorism, theft of identities, and even theft of personal property. It is not always easy to catch a hacker before he or she (yes, women are hackers too) is finished wreaking havoc on their prey. Software companies and large corporations spend billions of dollars defending themselves and others from the repercussions of a hacker's wrath. Make no mistakes that hackers are extremely complex and terrifically misunderstood components of modern society. (Winn Schwartau, 2002)When financial institutions are attacked by hackers, they find themselves in a bad position for reasons such as:a. A hacker can attack customer accounts for amounts that are so small, the institution as well as the customer can be unaware of their presence.b. If enough customers are attacked, the hacker can get away with the theft of millions of dollars.In the movies, hackers usually attack large banks by holding them ransom. They threaten banks by demanding large ransoms in return for non-destruction of their building structures, computer systems, or key leadership. In these movies, the hackers are just about to get away with the money until a hero foils the whole plan. Hackers affect business in the same manner. Big businesses fall victim to the hackers' wrath by losing large accounts with other businesses, losing or gaining funds in their corporate accounts (which may cause blame for embezzlement), and the same structural or personnel damage found in financial institutions. Again, an unsung hero foils the plan and saves the day. Unfortunately, reality doesn't exist on the motion picture screen and many hackers get away with their crimes. Here are a couple of extensive examples of real life cyber tragedies.The Enemy:When most of the free and English speaking world thinks of the word enemy, a warrior dressed assassin or foreign solder from a communist country usually comes to mind. Enlisted soldiers, sailors, airmen and marines who fight tirelessly to defend our country see the enemy as that exactly. Unfortunately, there is a new enemy threatening our way of life. This enemy attacks through e-mail messages and internet connections. Instead of nuclear, chemical or biological weapons, this enemy desires to use computer viruses and e-mail bombs against would be combatants.The enemy takes many forms from an anonymous user across miles of phone line to a disgruntled co worker who seeks revenge for decreased wages or a missed promotion. In his or her mind, hacking and cyber crime may seem justifiable. It may even be a prank for fun or revenge. Nevertheless, it affects the core of their workplace like a...

Find Another Essay On Hackers versus Business and Financial Institution Computers: Who will win the battle?

The Will to Win a War

1311 words - 5 pages keep struggling until they defeat the “odious apparatus of Nazi rule.” Churchill’s use of assonance here gives more weight to “odious” in to vilify the Nazis further. Churchill states that if the people stay committed and endeavor to keep fighting, the British will eventually win. Even today, a war cannot be won without the support of the people behind it. Citizens all across the United States protested against the Vietnam War. Because the public

Hackers- Who Are They? And What Do They Do?

989 words - 4 pages of being called a “hacker wanna-be” or a “script kiddie.” A “hacker wanna-be” is the same thing as script kiddie, but is another slang term for a person who uses guess-work and programs that he did not write (Weise). Although, most people think of a hacker as someone who breaks into computers and sends viruses, there are several different types of hackers, broken up into three different groups. The first type of hacker is the hacker himself. The

The Battle of Hastings - Why Did William Win?

759 words - 3 pages The Battle of Hastings - Why Did William Win? On the 14th of October 1066, Duke William of Normandy defeated King Harold at the Battle of Hastings. His win could be summed up by the fact that William was a better leader. Other factors that contributed to William’s victory include: William was better prepared, the English army was severely weakened as Harold had just fought off an invasion in the North of England, and Harold made a fatal

Revising the Drug War Strategy: To Win a Losing Battle

2133 words - 9 pages /psychotropic drugs for medical and scientific use. Outlining the Burning Situation: Today, there are between 149 and 271 million people worldwide who have used illicit substances at least once in a year and global lifetime figures are higher than a billion. (UNODC). Reports (livescience, 2012) claim that drug abuse alone kills more than 250,000 people other than drug violence. Meanwhile, there has been an infringement of human rights and high

Will Computers Control Humans In The Future?

804 words - 3 pages people would no longer read books to learn and improve theirknowledge. People would rely on the computers rather than 'try to memorizeenough to match someone else who knows' (Nine Tomorrows, Profession 55).People would not chose to study, they would only want to be educated bycomputer tapes. Putting in knowledge would take less time than readingbooks and memorizing something that would take almost no time using acomputer in the futuristic world

Narritive Essay - The Will to Win/Martial Arts Story

593 words - 2 pages Narrative Essay "The Will to Win" Not too long ago in my life, I was faced with an incredible challenge of athleticism and will. I was to compete in the 2003 National Championships for the martial art Tae Kwon Do. Sport Tae Kwon Do is a competition similar to boxing, only an impressive display of aerial kicks is the main arsenal of a competitor as opposed to punching combinations in boxing. A point is scored and shown on a large electronic

How will our future be? discribes the future perspective in short for computers and internet

840 words - 3 pages will be good things, No pain.In this society year 2096, every one almost is living in the cities from where they control their daily function. Even the farmers live in the city. They have given up the dirty work and started to maintain their acres and their stocks from computers. They have agents checking on the cattle 24 hours a day. They do this by a neurotic-implant called the CAT-Tracer. This implant can interface with the brain and thereby

Who Will Take the Blame?

928 words - 4 pages In Shakespeare’s Romeo and Juliet play, two characters (Romeo and Juliet) from opposing and rivaling families meet and fall in love at first sight. They eventually get married in secret. While Romeo was banished from Verona, Juliet’s father, Lord Capulet, decides that she will marry Paris, even though she is already secretly married to Romeo. The night before the wedding, Juliet drinks a potion that puts her in a deep sleep that makes her seem

Hackers are thieves who fail to comprehend and respect the rights of intellectual property owners and corporations. Argue for or against this statement

2441 words - 10 pages attempt to prove that hackers are not necessarily the vermins of society, but they need to be properly analysed as a very real threat.Before any real discourse can be had, a clear understanding of what a ‘hacker’ really is must be established. For the purpose of discussion, a hacker will be defined as any person who uses a computing device to circumvent the limits of a system, and by doing so, gains unauthorised access to a system

The Battle Between Good Versus Evil

1207 words - 5 pages civilized English background the boys come from. On the other hand, Jack and the boys who make up his choir take upon the responsibility of hunting eventually to gain power, which leaves them corrupt by the end. Golding exemplifies allegory in all three ways: religiously, morally, and politically. Three objects in the story that may seem ordinary represent the three aspects of allegory shown in Lord of the Flies, including the Lord of the Flies

Computers and the Law

2446 words - 10 pages committing a further crime (i.e. theft or damage) - can be regarded in the same context as the unauthorised use of a computer system (i.e. hacking). The criminal will still be entering the computer without the owners consent, maybe through the Internet, although not breaking into the building to do so. The intent will still be similar, to steal (theft) or damage data.It can be seen that there is a relationship between computers and the law. As

Similar Essays

Chickamaugans Win The Battle Essay

290 words - 2 pages On the days of September 19-20 1863, the Confederate Army of Tennessee engaged in battle with the Army of the United States army of the Cumberland in a deathly struggle. We, the south, were trying to take Chattanooga, Tennessee before Rosecrans, who was also trying to take Chattanooga to gain its resources. He came upon us and we retreated to lake of recognizance. We then proceeded south passed Chickamauga Creek and waited for

The Relationship Between Financial Institution And Economic Growth

879 words - 4 pages of financial institution. Other than that, the information costs for both savers and borrower are high due to lack of financial institution. High information costs may reduce level of business investment and economic growth is affected. Therefore, deficit of financial institutions result in low official savings rate, at the same time it leads to low levels of investment. The lack of financial institutions results in increases information costs

Are 'computer Hackers' Technological Innovators Who Push The Boundaries Of Development Or Reckless Criminals Who Endanger Companies And Individuals?

1074 words - 4 pages changed a lot since then [3 innovators]. But we cannot call them technological innovators since there is a huge contrast between the negative impacts and the innovation that hackers bring."The word "hacker" itself means a person who enjoys exploring the details of computers by knowing how to stretch their capabilities, a malicious or inquisitive meddler who tries to discover information by poking around" [4 Web Definitions]. Hackers are often

Relationship Between Financial Institution And Economic Growth

757 words - 4 pages efficient resource allocation. It can encourage borrowers and helps the banks’ underwriting business, which may cause a substitutive relationship between the equity market and the banking sector. However, excess liquidity may bring the impact of undesirable side effects. It will urge investor myopia, therefore, it actually hurting economic growth (Levine, 1996). Financial institution saving and investment can promote the economic growth by