This website uses cookies to ensure you have the best experience. Learn more

Hacking Essay

1769 words - 7 pages

Determine if hacking into a Web site is ever justifiable, applying your theory to a real-world case in which someone hacked into a system, including the name of the company and details.

In general, hacking or more specifically cracking is not justifiable due to the negative connotations associated with the term. Hackers are generally categorized into three categories, white hat, black or grey hat (Arnone, 2005). White hats are personnel that are often employed to find holes, penetrate or exploit a security system so the company can take corrective actions. Black hats are typically associated will malicious activity (cracking) such as developing and deploying viruses, worms, theft or damaging a system. The gray hats are somewhere in between the white and the gray hats. Arnone discusses how the federal government is utilizing hackers to test their own security measures and learn how to secure their systems by understanding how hackers operate and gain entry into network systems (Arnone, 2005). The white hat hacker has proven value by showing a company where their security vulnerabilities lie. White hackers are also in demand. They are hired by consultants for many Fortune 500 companies to find external and internal weaknesses and report them in order for those holes to be closed (Wiles, 2008).
There are some instances in which hacking can be justified. Hacking for National Security can be justified although controversial. The military has been using hacking techniques for decades. While not specifically tied to a computer, they have deceived the enemy using fake radio broadcasts, such as the preparations for the invasion of Normandy in World War II. The military has monitored radio conversations by eavesdropping or cracking encrypted codes. Since 9/11, the department of Defense has been subject to thousands of cyber attacks and is fighting an enemy that relies on the Internet as a form of mass communication. Secretary of Defense Leon Panetta recently stated that “we could face a cyber attack that could be the equivalent to Pearl Harbor.” Panetta explains that an attack could take down several of our nation’s systems such as power, government, financial and banking (Beck, 2011). The 2006 Quadrennial Defense Review Report highlighted the need for capabilities that locate, tag and track terrorists in all domains including cyberspace (DoD, 2006). The previous Secretary of Defense, Robert Gates, activated a new command (U.S. Cyber Command) dedicated to cyperspace in order to address this new risk to national security and secure U.S. freedom of action in the cyber domain (Jackson, 2009).
U.S. and British officials revealed that they launched a cyber attack on Inspire magazine, an al Qaeda online magazine. The attack replaced instructions for making a bomb with a cupcake recipe (FOX News, 2011). The FOX News article also discusses how an al Queda network was disrupted bringing down the al-Shamukh web-site, a popular...

Find Another Essay On Hacking

Hacking Nationalism Essay

1676 words - 7 pages , mostly those ending with the `.cn' domain. They hacked into these websites and left vulgar and racist taunts on these web sites. Of which "Poizon Box" was responsible for a significant number. In retaliation, the China-loyal hackers by the names of Hacker Union of China and China Eagle defaced more than 1 000 websites and launched "Denial-of-Service" attacks against the White House and CIA. Hacking in China was given a nationalist twist, with

Computer Hacking Essay

1594 words - 6 pages have available for all can be found under the Hacking Archives "Tools of the Trade" section. Enjoy this forst bit of fun and look out for some more interesting coming your way soon.It is with heartfealt sorrow that we bid farewell to Cliburn and and Sledge. The time factor eventually caught up with them and forced them to hand over the management of to someone who had more time to attend to it. During the next couple of months

Computer Hacking

2087 words - 8 pages media.Denning was sought by Neidorf to assist in the case an expert witness and to provide evidence throughout the trial. The government dropped the charges after 4 days and it was declared a mistrial. It cost Neidorf $100,000, but potentially he stood to spend 65 years in goal. Neidorf's case was argued that while Phrack may have seemed to promote illegal hacking, the public itself was not illegal. It advises readers not to engage in any intentional

Computer Hacking

1929 words - 8 pages throughout the trial. The government droppedthe charges after 4 days and it was declared a mistrial. It costNeidorf $100,000, but potentially he stood to spend 65 years in goal.Neidorf's case was argued that while Phrack may have seemed to promoteillegal hacking, the public itself was not illegal. It advises readersnot to engage in any intentional damage or harm. The purpose of Phrackwas the free exchange of information as covered by the First

Ethical Hacking: The Different Types of Hacking

1061 words - 4 pages from the United States. Mr. Snowden illegally hacked the CIA network, stole classified documents, and sold them to the highest bidder. This type of hacking is known as an “inside hack,” as Mr. Snowden was on the inside when he illegally acquired the classified documents. Another form of hacking known in the technology world is called an “outside hack.” This type of hacking is when a user attempts to hack a remote server from a different

the benefit of hacking

1491 words - 6 pages Most people have heard the term “hacking” at least once in this digital age, and most of the time it is in a negative context. The reason for that is the definition of hacking is “gaining unauthorized access to a computer or program that does not belong to you.” That may sound bad, but it can actually be quite beneficial. Hacking can help improve digital security by finding the holes in it or help someone find wrongly hidden information. You see

Gray-Hat Hacking

2153 words - 9 pages Gray-Hat Hacking Overview Computer security is a growing concern with the onset of always-on connections in the home and the emerging global network. More and more people become connected everyday. The reliance on computers in our daily lives has increased the need for security and has shifted the ethical line for hackers and hacking. “A hacker is someone with deep knowledge of and great interest in a system. A hacker is someone who

CyberCrime: What is Hacking?

1313 words - 6 pages computer also includes the rise of “potential opportunities for individuals… to access systems without authorization in order to cause disruption, damage systems, and commit crime…” (Rennie et al.) By being aware of this matter, one can effectively take preventative steps to avoid the potential stealing of personal information. The term “hacking”, as defined by, is “to cut, notch, slice, chop, or sever (something) with or as with

The Art of Hacking

1237 words - 5 pages The art of hacking Enedina Gloria Perez ENG 112 Professor Garza April 18, 2014 The world of hacking cannot be placed into clearly defined positive or negative categories. When people hear the word hacker they tend to think about someone that defies or breaks the law. Everything in life has two sides of it the good and the bad, that is how people can understand a subject if they see both sides. Hackers can cause havoc

Hacking sweeps the nation

2641 words - 11 pages “We cannot defend ourselves with a weapon…but we can do this with their cars, homes, bars, brothels and everything else in their possession. It won’t be difficult; we all know who they are and where they are located.” Quoted from an Anonymous member. (Schiller, A.6.) Computer hacking began in the 1950s with an individual looking out for his own personal gains; like free phone calls for instance. The perception of hackers ever since has become

Essay On Hacking

541 words - 2 pages A topic that i know very well is computers and computer hacking. Computersseem very complicated and very hard to learn, but, if given time a computer can be veryuseful and very fun. Have you ever heard all of that weird computer terminology? for andexample, Javascript. Javascript is basically a computer language used when programminginternet web pages. Have you ever been on the internet and seen words go across thescreen or moving images? This

Similar Essays

Hacking Essay

1665 words - 7 pages Hacking The Technology Age, and the Downfall of the U.S. In today's society, people are always trying to improve technology, but in doing so, are they creating something that can be used to create mass destruction for the United States? Everyday computers get faster, new programs are written, or some scientist finds a way to make a job be done quicker. For most people, they welcome the advancement of science to ease their lives, but it

Ethical Hacking Essay

812 words - 4 pages Who is a hacker? Most people see a hacker as someone who exploits vulnerabilities of electronic devices and system, network, and computer to use in malicious activity. wrote "Hacking is any technical effort to manipulate the normal behavior of network connections and connected systems. A hacker is any person engaged in hacking. The term "hacking" historically referred to constructive, clever technical work that was not necessarily

Computer Hacking Essay 1065 Words

1065 words - 4 pages Hacking is using your knowledge to gain more knowledge. This is one of the best definitions I could find on the net. Hacking is state of mind. Curiosity is the main point; a hacker always wants to know everything. It is the curiosities that which makes them learn more and more quickly than other person at same age. Traditionally hackers were regarded as ?geeks?, who knew everything about computers (hardware & software) & networks. They

Hacking Controversey Essay

1780 words - 7 pages When the public hears the term hacking, they often think of theft, defacement, crime, and other words associated with criminal activities. Nowadays, this view is, in a way correct, but it is not entirely true. It is safe to say that quite a few hackers are bad, but that is because we are in the 21st century. We are the most technological advanced generation to date. The good hackers do far out ways the bad that some individuals commit. The view