Nobody downloaded yet

Email Hacking - Essay Example

Comments (0) Cite this document
Email Hacking Introduction Information is one of the most fundamental necessities of every individual in the contemporary age. People will access to information find plenty of opportunities of exceling in their academic and professional careers as well as their personal and social life…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER98% of users find it useful
Email Hacking
Read TextPreview

Extract of sample "Email Hacking"

Download file to see previous pages Accordingly, the more technically trained and informed people are in the position to not only subjugate the rights of others but also offend their rights. The technology-savvy people can easy use the Internet to hack into the computer systems so that they can steal money, infect others’ computers with viruses, and change information in their private profiles. Emails are frequently used for business transactions these days. People use email to share vital information with one another. Hacking of an email account can yield disastrous results for the account owner and not many people are quite technically skilled enough to recover their email accounts after they have been hacked. This paper discusses several ways in which email accounts can be hacked and the ethical and legal implications of hacking. If an individual is aware of the potential ways in which he/she can be fooled, he/she can take the preventive measures in time to overcome such threats and has fair chances of escaping the attack by the offender. Issues in Email Hacking Ethical issues According to the Hacker Manifesto, a hacker commits only one crime which is the crime of curiosity (Trodick, 2011). Levy (2010) identified sex tenets to exemplify the ethics of hacker; according to the first tenet, “access to computers - and anything which might teach you about the way the world works- should be unlimited and total” (Levy, 2010, p. 23) whereas according to the second tenet, “all information should be free” (Levy, 2010, p. 24). The hacker ethic is a belief that the sharing of information is a very positive and powerful good. It implies that hackers assume the ethical responsibility to share the expertise they have by enhancing the access to information, writing open-source, and computing all possible resources. There exists a belief that if system is cracked for the purposes of exploration or fun, it is ethically justified till the time the attacker does not commit any vandalism, theft, or a breach of confidentiality. Every time an individual accesses a system in an unauthorized manner, he/she acts unethically. Ethics varies from one individual to another. Ethics cannot be completely defined by one individual so that a certain action can be deemed right or wrong. Nevertheless, in the democratic system that prevails in the society, every individual’s right to security of privacy and property is acknowledged. This privacy covers the information stored by people on their personal computers or the computers that they are authorized to use. “The Fourth Amendment explicitly affirms the 'right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures’” (Head, 2012). The Fourth Amendment is interpreted generally as an individual’s right to privacy, though such right cannot be stated explicitly. Nevertheless, every individual in the US says that he/she has a fundamental privacy right of their possessions, though hackers disagree with this. Legal Issues The Computer Fraud and Abuse Act of 1986 illegalized the unauthorized access to computer or stealing of the information that is related to credit card or private government (, n.d.). According to Section 3, gaining unauthorized access to the government computers is illegal. On the other hand, the hackers argue that as long as they do not take ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(“Email Hacking Essay Example | Topics and Well Written Essays - 2250 words”, n.d.)
Retrieved from
(Email Hacking Essay Example | Topics and Well Written Essays - 2250 Words)
“Email Hacking Essay Example | Topics and Well Written Essays - 2250 Words”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document


Ethical Hacking

...Ethical Hacking 1. Threats There have been many cyber attacks in the past that have weighed heavily on the shoulders of the victims. Three of the many examples are described here. Black Hat Crackers worked to take advantage of computer systems, and Jonathan James has been a big name among black hat crackers. He was sentenced at the age of sixteen and told the press that all he did was for fun. One instance of his great hacking is installing a backdoor into a Defense Threat Reduction Agency server and hacking sensitive information and employees’ data. In June 2005, the computer specialist, Michael Haephrati and his wife Ruth, who belonged to London, were caught sending Trojan horse...
5 Pages(1250 words)Research Paper

Hacking Exposed

...? Hacking Exposed (College Hacking Exposed Adrian Lamo Adrian Lamo is a green hat hacker who hacked a seriesof high-profile computer networks including those of The New York Times, Microsoft, and Yahoo. However, his most notorious computer crime was committed against The New York Times in 2002 when he unauthorizedly accessed into its Times’ private intranet. According to Poulsen (2002), by this hacking, he got unauthorized access mainly into paper’s social security numbers, customers’ order details, and “WireWatch” keywords. The most notable element of Lamo’s hacking activity was that he could access a database of 3000 contributors. Similarly, he could...
2 Pages(500 words)Essay


...? Email to the American Intellectual Union The Head of American Intellectual Union Job Satisfaction The following is a report of a database of selected 30 employees who are members of the American Intellectual Union. The data looks at both the quantitative and qualitative aspects. The employees will profiled using five attributes (age, gender, position, tenure and department). Job satisfaction will be characterized using the four parameters: intrinsic job satisfaction, overall job satisfaction, benefits and extrinsic job satisfactions. The survey is an illustration of a mechanism that can be used in profiling employee’s whit the highest level of job satisfaction thus giving the highest possible performance boosting a...
3 Pages(750 words)Essay

Ethical Hacking

...ETHICAL HACKING Ethical Hacking According to Raymond, the term 'Hacker' has a dual usage in the computer world. Originally, the term was defined as: HACKER noun 1.A person who enjoys learning the details of computer systems and how to stretch their capabilities-as opposed to most users of computers, who prefer to learn only the minimum amount necessary. 2. One who programs enthusiastically or who enjoys programming rather than just theorizing about programming (Raymond, 1991). From the above definition it is clear that, the original idea behind hacking has nothing malicious in its intent. According to me hacking is justified, provided the intent behind performing a...
2 Pages(500 words)Essay

Hacking Exposed

...Hacking Exposed Hacking Exposed In an article en d Jonathan James – 15 Year-Old Cybercriminal Who Hacked NASA published in the website What’s the latest? on June 20, 2010 revealed the criminal escapade involving hacking. The US Legal define computer hacking as “intentionally accesses a computer without authorization or exceeds authorized access” (US Legal, 2010, par. 1). Jonathan James, then 15 years of age, hacked the following organizations: NASA, Defense Department, and the Marshall Space Flight Center. The resulting damages were: $1.7 million software stolen from NASA; viewing the Defense Threat Reduction Agency server, the agency of the Department of Defense; and “downloaded the proprietary environmental control software... for the...
2 Pages(500 words)Essay

Ethical Hacking

.... It can be used to protect an organization against an attack because it spots out and potentially prevents intrusions that breach the system’s firewalls or those that occur behind the local area network (LAN) or the firewall (IATAC, 2009, p.3). Thus, IDS can provide organizations real-time or near-real-time monitoring of a host or a network and defend them from hacking. IDS and Detection of Footprinting stages IDS cannot always detect footprinting stages. The wrong results in an IDS are categorized into two kinds: false positives and false negatives (IATAC, 2009, p.4). False positives happen when an IDS wrongly sees a problem with benign traffic (IATAC, 2009, p.4). False negatives take place when malicious traffic is...
2 Pages(500 words)Essay


...Your full full January 12, Email Dear Paul, My is Ashley Choi. Last month I came for an interview at JJ for which I am thankful to you. Working for a cosmetic company has always been one of my key desires. This is why I am so glad for having an interview or the vacant job position at your company. However, I feel that I my performance in the interview was not up to the standards because I became somewhat confused at that time and was not getting the right words for communicating my stance. That situation left so much for me that I actually wanted to say at the interview. Therefore, I wanted to send a mail to you regarding this. I am sorry if I bothered you. When I came for the interview, I had a feeling that I would...
1 Pages(250 words)Essay


...Internet Security “Hacking” AFFILIATION: Table of Contents Table of Contents 2 Internet Security“Hacking” 3 Brief Introduction of Hacking 3 Motivating factors for hackers 4 Characteristics of hackers 5 Impact of hacking on society / Security on Internet 6 Security issues in electronic transactions 7 Number of Visa users worldwide 8 Facts and figures about electronic crimes worldwide 9 Real life examples of hacking 10 Protection measures against hacking 10 Conclusion 12 References 13 Appendix - Vocabulary 15 Internet Security “Hacking” Brief Introduction of Hacking With the advent of time and development...
12 Pages(3000 words)Essay


...The President, Prestige Mr. Nudgel , Grandiose Development Corp, Newton, Massachusetts 4rth March 09:42:32 +0500 Subject: Praise and Thanks for your Financial support to PU Dear Mr. Nudgel, I want to personally thank you for your email and it was gratifying to have your encouragement and financial support. In your letter you have asked for the admission of your nephew Mr. Herbie. I have evaluated the profile of your nephew Herbie and know the importance of his admission into this university. Keeping in mind the tradition of your family, I would definitely accept the admission of your Nephew. But , your nephew doesn’t fulfill the criteria of the university selection procedure. There are certain skills which your nephew...
1 Pages(250 words)Essay

Ethical hacking

...: (1) giving mysql and ACID to help people examine the information caught, (2) having Snort sent email cautions in regards to specific sorts of endeavors, and (3) firewall setup utilizing iptables. The accomplishment of this methodology urged us to take a gander at applying this engineering to the educating of machine systems (Infs6230). Here we embraced a methodology concentrating on subjects: convention stacks, exemplification of information units, and directing disclosure. We needed our people to have the capacity to distinguish and comprehend information units at each level. Critical apparatuses again here were tcpdump and tethereal for information catch. We picked a dynamic scope of directing revelation, starting...
8 Pages(2000 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Email Hacking for FREE!

Contact Us