The Use Of Hacking To Identify Weaknesses In Computer Security

1740 words - 7 pages

The use of hacking to identify weaknesses in computer security has become an increasingly controversial issue in recent years. Awareness of this issue is important, because our ever increasing reliance on technology means that breaches in computer security have the potential to have wide-ranging and devastating consequences to society, worldwide. This essay will begin by clearly defining the term ‘hacking’ and will examine the type of people who hack and for what reasons. There will then follow a discussion of the moral argument on hacking before examining a few brief examples. The essay will then conclude by arguing against the use of hacking as a means of identifying weaknesses in computer security.

What is it to ‘hack’?
Hacking has two primary definitions; the first refers to the enthusiastic and skilful use of computers to solve problems (Techterms, 2013); the second, to “gain unauthorized access to data in a system or computer” (Oxford Dictionaries, 2013). In the context of this essay the second definition is more appropriate and will be the meaning inferred throughout. This definition also more closely aligns with legal terminology used in the UK when describing the hacking of computers. The Computer Misuse Act (1990) introduced three criminal offenses:

1. Unauthorised access to computer material.
2. Unauthorised access with intent to commit or facilitate commission of further offences.
3. Unauthorised acts with intent to impair, or with recklessness as to impairing, operation of computer, etc.
a. Making, supplying or obtaining articles for use in offence under section 1 or 3

The important phrase to draw from both the dictionary and legal definitions is ‘unauthorised access.’ This will be useful for helping to determine whether the actions of those who hack are really hacking or can be described better by other terminology. This essay will also discuss the issues of hacking from a UK legal perspective.

Who hacks and why?
Those who hack can be split into three generic groups: ‘Black Hat’, ‘White Hats’ and ‘Grey Hats’.
Black Hats
Black Hats gain unauthorised access to computer systems and networks for malicious purposes. They exploit security weaknesses to promote their own interests, be that for criminal purposes (e.g. theft of data, blackmail etc) or simply to increase their reputation within the hacker community. They do not care about the impact they have on others and have complete disregard for the law (Rouse M. , 2007).
White Hats
White Hats, or ‘ethical hackers’, work with companies to find flaws in their computer security. This is done with authorisation and often underpinned by a legally binding contract. The White Hat does not publicise security flaws until after they have been patched and is not motivated by person gain (Rouse M. , 2007).
Grey Hats
As may be imagined, a Grey Hat is a mixture of a White and Black Hat. They will typically gain unauthorised access to systems and networks to find flaws in the security...

Find Another Essay On The Use of Hacking to Identify Weaknesses in Computer Security

The Necessity of Computer Security Essay

1743 words - 7 pages Zimmerman created an extremely powerful civilian encipherment program, called the PGP, for 'Pretty Good Privacy.' In particular, by focusing on cryptography, which was originally intended for military use, this paper will examine just how easy it is to conclude why giving civilians a military-grade encrypting program such as the PGP may be dangerous to national security. Therefore, with any type of new technology, this paper will argue that the

The Use of the Computer Essay

774 words - 3 pages question a few times to get an accurate answer. Computer is also a source of entertainment. We can use computer to entertain us besides doing work or study. We can choose to play fun computer games, listen to our favourite songs or even watch exciting movies. These will keep us entertained during our free time. In this way, computer can help us to release stress. We can always use the computer for play when we are stressed up and then

Computer Security in business

665 words - 3 pages Computer Fraud and Abuse Act of 1996 states general and specific policies that govern the use of computers. In healthcare systems, some people may try to steal medical records of healthy people for some purposes. This act of stealing personal data is against the existing anti-hacking law.Security programs refer to both physical and virtual security strategies. Physical security is the use of physical barriers such as password protected vaults so

Ethical Hacking: The Different Types of Hacking

1061 words - 4 pages does not give you the Ethical Hacker title, but it proves that you are well versed in the computer network industry when it comes to network security protocols. Both an Ethical and an Unethical Hacker use the same type of methods in order to achieve their intended outcome. In the world of hacking, there are three types of methods that most ethical and unethical hackers use when testing a network. (Hafele, 2004). These types of methods in the

Is computer security the only option to combat the misuse of e-mail?

517 words - 2 pages In today's age of technology, internet security options are infinite. Email scams, hoaxes, spam, advertising and viruses are growing at a phenomenal rate. The technologies to prevent malicious emails are not far behind. Whilst computer security is not the only option when combating the misuse of e-mail, it is the most sensible option, and provides an ease of use to the home and commercial user.Spam e-mail's and 'hoax' e-mail's are growing more

the benefit of hacking

1491 words - 6 pages Most people have heard the term “hacking” at least once in this digital age, and most of the time it is in a negative context. The reason for that is the definition of hacking is “gaining unauthorized access to a computer or program that does not belong to you.” That may sound bad, but it can actually be quite beneficial. Hacking can help improve digital security by finding the holes in it or help someone find wrongly hidden information. You see

Identify the methods use to market this new service in relation to market segmentations, targeting, positioning and marketing mix.

3650 words - 15 pages commuting.With over 25 years of experience in the water taxi business and marine industry, we have the experience, skills, and partnerships to provide a level of safety, comfort, and service at the top of our industry. We build passenger vessels standards for use as water taxis, ferries, excursion and glass bottom boats with many different drive systems. Logistics Services Sdn Bhd, has provided services around the globe, helping new and existing

Describe the biological explanation of crime. Identify key aspects of crime that are hard to identify in this way.

676 words - 3 pages The biological explanation of crime is a structural one and argues that some people have a predisposition to engage in criminal activity, due to inherited genes. In the past it was claimed that criminal behaviour could be attributed to brain size and a certain shape of skull. This theory has long been discredited, however it gave rise to the more disquieting practice of eugenics. Most notable was the breeding programme under the Nazi regime, in

How does John Fowles use particular landscapes and places to enhance and identify each character in 'The French Lieutenants Woman'?

1983 words - 8 pages rejection in society.This all shows that the use of landscapes and places in 'The French Lieutenant's Woman' is very helpful in creating and identifying character. Sarah is a wild character, and this wildness is shown through the places in which she chooses to haunt. Charles is a similar, but more sutble character, we identify him with situations and settings, rather than landscapes.

Computer crimes need to be prevented and halted through increased computer network security measures as well as tougher laws and enforcement of those laws in cyberspace

3335 words - 13 pages former computer operations employees.2. Career criminals who use computers to ply their trade.3. The hacker.Outsiders who break into computer systems are sometimes more of a threat, but employees and ex-employees are usually in a better position to steal. Because we rely more and more on computers, we also depend on those who make them and run them. The U.S. Bureau of Labor Statistics projects that the fastest growing employment opportunities are

Hacking In the Business Society

1632 words - 7 pages . Hacking in itself is not a new affair; it is more the vast availability of computers that has revolutionized the network security sector. ("The Era of the Personal Computer" The fact that computers where becoming very cheap opened the market to common home users, and computers became very commercialized. Although this was a great benefit, it also posed a

Similar Essays

Hacking As A Means Of Identifying Weaknesses In Computer Security

1651 words - 7 pages The use of hacking can be very beneficial as a means of identifying weaknesses in computer security. Nowadays, numerous companies and governments use this technique to assess the level of security of their systems and determine if any valuable information is at risk of being accessed unlawfully. Ethical hackers are employed to identify potential threats on a single computer or a whole network of computers. The found potential exploits are later

Is Ethical Hacking The Answer To Ensuring The Safety Of Company’s Computer Systems?

1445 words - 6 pages ethically hacking. An “ethical hacker” is someone who hacks into computers in order to spot security vulnerabilities without the intent of causing harm. This essay will provide arguments for and against the use of ethical hacking to identify weaknesses in computer security. Ethical Hacking to Expose Security Flaws The main argument for ethical hacking is that companies are able to decrease their loss of sensitive information by learning where weak

Security In The Computer World Essay

1434 words - 6 pages INTRODUCTION The main purpose of security is to protect assets. Looking back into history, the big walls acted as a safeguard to a fortress or a kingdom. There were massive and strong doors which stopped any perpetuator from entering without permission. The same thing applies in the computer world, with the only difference being that it's virtual. There are closed networks and open networks. The closed networks are available for a person who

A Snapshot Of Computer Hacking Essay

1272 words - 5 pages A Snapshot of Computer Hacking Computer hacking has been around for over fifty years. Anytime new technology comes to the fore front, there are individuals who want to expand upon it. Hacking in general terms, is simply taking a technology and trying to improve upon it without the permission of the owner. I want to point out two terms that I will use throughout the paper, hacker and cracker. A hacker is a person who has