StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

The Most Famous Hacker of All Time - Assignment Example

Cite this document
Summary
The author of this assignment "The Most Famous Hacker of All Time" describes Adrian that changed sides from a “Good Guy” to a Black Hat Hacker. I believe that Adrian changed because he saw the many evils in the society that went unreported or uncovered…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.5% of users find it useful
The Most Famous Hacker of All Time
Read Text Preview

Extract of sample "The Most Famous Hacker of All Time"

What Do You Believe Motivated Adrian To Commit His Crimes?I believe that he was motivated by the need to know more about the leading companies in the world and the secrets of the highly ranked people. This is because he targeted companies such as Microsoft and prominent people like the jimmy carter (IT Security Editors). He wanted to know the things these entities do in secret, hence he went ahead to hack into their systems to fulfill his desire of knowing everything that goes on behind the public eye.

Does Adrian Fit The Hacker Stereotype?He fits into the hacker stereotype because since childhood when he hacked into systems, he was not interested in pleasing his friends, but he hacked for fun and endeavored to advance his knowledge (IT Security Editors). A hacker stereotype is a smart person who is not concerned with social gains they gain from the actions, but long to know everything that makes them smart on the computer.Do You Feel Adrian’s Punishment Fit His Crime?His punishment fits his crime since he was not judged harshly and he was put under house arrest rather than going to prison.

He confessed to his mistakes and was willing to abandon the bad hacking habits. However, I feel that the damages he had to pay were high since he had no bad intentions.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(The Most Famous Hacker of All Time Assignment Example | Topics and Well Written Essays - 364 words, n.d.)
The Most Famous Hacker of All Time Assignment Example | Topics and Well Written Essays - 364 words. Retrieved from https://studentshare.org/history/1580347-case-study-4-adrian-lamo
(The Most Famous Hacker of All Time Assignment Example | Topics and Well Written Essays - 364 Words)
The Most Famous Hacker of All Time Assignment Example | Topics and Well Written Essays - 364 Words. https://studentshare.org/history/1580347-case-study-4-adrian-lamo.
“The Most Famous Hacker of All Time Assignment Example | Topics and Well Written Essays - 364 Words”, n.d. https://studentshare.org/history/1580347-case-study-4-adrian-lamo.
  • Cited: 0 times

CHECK THESE SAMPLES OF The Most Famous Hacker of All Time

Intrusion Prevention

Individuals can learn the basic concepts and technicalities of hacking from various resources but they cannot develop their own techniques nor can they have experience of all the techniques available.... the most important aspect of any business is the customer and other stakeholders of the business.... This method of solving security issues have existed over a very long period of time, this method has ended up being one of the best ways to solve a user's security issues but on the other hand users are even concerned about the legitimacy of such security providers....
3 Pages (750 words) Essay

Keylogger scam. Computer crimes

Keylogger scam, as discussed in this paper, refers to hidden logging systems installed by hackers which track all activities of users, maintains logs of keys and passwords and gives constant monitoring capabilities.... most of cyber crimes involve hacking and accessing information through keylogger programs which are installed on host machines to track information entered and activities carried out at these workstations....
3 Pages (750 words) Book Report/Review

Risk Assessment Continuity Plan

Similarly, a virus which brings down our network or corrupts the database stored on one location might require the activation of a secondary location where the most recent backup of the database could be used for continuity of business (Britt, 2005).... No matter how careful a company is while making plans to curtail all the risks involved concerning the security of information and the integrity of their database, they must prepare for a situation where information is compromised or the database is damaged....
5 Pages (1250 words) Essay

Password and hacking under the privcy issues

Installing password for online accounts is one of these methods; in fact, it is the most popular one.... It will also describe the most common methods of password violation and the hackers' point of view on this matter, under the privacy issues.... It will analyze the concept of hacking and how it has evolved along time and it will provide a justification for the hackers from the inside point of view.... Of course, a hacker for us represents a law disobedient person, some kind of a rebel that instead of living his life normally chooses to spend days and nights in front of a computer and break into...
21 Pages (5250 words) Research Paper

Hacking Exposed, Underlying Motivation

Top 10 Most Famous Hackers of all time.... As averred by James, “The government didn't take too many measures for security on most of their computers,” James told PBS's Frontline at the time.... I know Unix and C like the back of my hand, because I studied all these books, and I was on the computer for so long.... ?· Based on the six categories of hackers presented in your textbook on page 93, how would you categorize the hacker in your case?...
2 Pages (500 words) Essay

Who Are the Hackers and What Do They Do

This paper "Who Are the Hackers and What Do They Do" discusses the technology that has flourished so much, that all homes have more computers than at least one each, that student's program like professional programmers, and that even exams are sometimes conducted online.... all around, a new term has also sprung up, that of a certain class of programmers called hackers.... Crackers are the ones who love to look into people's personal accounts all over the world by getting past security passes....
8 Pages (2000 words) Case Study

Compromising Digital Devices

With the advent of time and development in the technological world, everything has become dependent on Information Technology (IT) as every organization has employed the latest IT infrastructures within their business premises for gaining competitive edge in the business market.... At the same time, Kevin Mitnick was the leading hacker who hacked into IBM, DEC and Pacific Bell.... hellip; As all the companies have started utilizing the latest IT systems, the computer hacking has become the biggest threat for the computer and Internet users....
12 Pages (3000 words) Essay

Yahoo's Database Security

From that time, Yahoo gradually gained popularity all over the world.... This paper ''Yahoo's Database Security'' will be divided into a number of segments, including types of Yahoo Databases and how they are used, security breach suffered by Yahoo, the problems faced when protecting users' data, and the methods used by Yahoo to safeguard their users' data....
6 Pages (1500 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us