Nobody downloaded yet

Email Hacking - Essay Example

Comments (0) Cite this document
Email Hacking Introduction Information is one of the most fundamental necessities of every individual in the contemporary age. People will access to information find plenty of opportunities of exceling in their academic and professional careers as well as their personal and social life…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER96.8% of users find it useful
Email Hacking
Read TextPreview

Extract of sample
"Email Hacking"

Download file to see previous pages Accordingly, the more technically trained and informed people are in the position to not only subjugate the rights of others but also offend their rights. The technology-savvy people can easy use the Internet to hack into the computer systems so that they can steal money, infect others’ computers with viruses, and change information in their private profiles. Emails are frequently used for business transactions these days. People use email to share vital information with one another. Hacking of an email account can yield disastrous results for the account owner and not many people are quite technically skilled enough to recover their email accounts after they have been hacked. This paper discusses several ways in which email accounts can be hacked and the ethical and legal implications of hacking. If an individual is aware of the potential ways in which he/she can be fooled, he/she can take the preventive measures in time to overcome such threats and has fair chances of escaping the attack by the offender. Issues in Email Hacking Ethical issues According to the Hacker Manifesto, a hacker commits only one crime which is the crime of curiosity (Trodick, 2011). Levy (2010) identified sex tenets to exemplify the ethics of hacker; according to the first tenet, “access to computers - and anything which might teach you about the way the world works- should be unlimited and total” (Levy, 2010, p. 23) whereas according to the second tenet, “all information should be free” (Levy, 2010, p. 24). The hacker ethic is a belief that the sharing of information is a very positive and powerful good. It implies that hackers assume the ethical responsibility to share the expertise they have by enhancing the access to information, writing open-source, and computing all possible resources. There exists a belief that if system is cracked for the purposes of exploration or fun, it is ethically justified till the time the attacker does not commit any vandalism, theft, or a breach of confidentiality. Every time an individual accesses a system in an unauthorized manner, he/she acts unethically. Ethics varies from one individual to another. Ethics cannot be completely defined by one individual so that a certain action can be deemed right or wrong. Nevertheless, in the democratic system that prevails in the society, every individual’s right to security of privacy and property is acknowledged. This privacy covers the information stored by people on their personal computers or the computers that they are authorized to use. “The Fourth Amendment explicitly affirms the 'right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures’” (Head, 2012). The Fourth Amendment is interpreted generally as an individual’s right to privacy, though such right cannot be stated explicitly. Nevertheless, every individual in the US says that he/she has a fundamental privacy right of their possessions, though hackers disagree with this. Legal Issues The Computer Fraud and Abuse Act of 1986 illegalized the unauthorized access to computer or stealing of the information that is related to credit card or private government (, n.d.). According to Section 3, gaining unauthorized access to the government computers is illegal. On the other hand, the hackers argue that as long as they do not take ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(“Email Hacking Essay Example | Topics and Well Written Essays - 2250 words”, n.d.)
Retrieved from
(Email Hacking Essay Example | Topics and Well Written Essays - 2250 Words)
“Email Hacking Essay Example | Topics and Well Written Essays - 2250 Words”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document
ESSAY ON EMAIL PRIVACY By Name Course Instructor Institution Location Date Introduction With advancement in technology, there is an increase in demand for computer-based communication applications. Email communication is one example of such computer-based communication platforms; others include internet and wide web programs.
4 Pages(1000 words)Essay
Mobile email devices
How does the use of mobile email devices impact on current understanding of email use? Introduction In today’s advancement of information technology, emails are integral parts of a highly sophisticated communication system. Such sophistication is tantamount to how emails are viewed significant in the communication system by creating more possible options on how they can be accessed for public consumption.
6 Pages(1500 words)Essay
Microsoft Systems
After its successful installation it can reach and contrive personal data, can download other malware or can give a hacker access to user’s PC (Ghorbani, Lu, & Tavallaee, 2009). Denial of services: some malicious software blocks access
1 Pages(250 words)Assignment
Social Engineering (ethical hacking )
ome a platform of gathering different networks that allow individual computers to connect with them in a number of ways such as through dial-ups, gateways, ISPs, etc. In other words, only a computer and network connection are the two major requisites for entering into the world
8 Pages(2000 words)Essay
Keeping in mind the tradition of your family, I would definitely accept the admission of your Nephew. But , your nephew doesn’t fulfill the criteria of the university selection procedure. There are certain skills which your nephew needs to learn . We
1 Pages(250 words)Essay
Assignment 2: Hacking the AIS
Hacking is a global security breach affecting close to all enterprises and organizations operating on networking or online basis. However, social hacking has been the most common form of hacking. Often social hacking attacks are achieved by impersonating an
5 Pages(1250 words)Essay
Hacking and Cracking
However, computer hacking that is currently widely known started one century later. This was after the introduction of the first computer. Hacking was seen as a
4 Pages(1000 words)Essay
Investigate mobile phone hacking techniques
(Cheng) Hacking of smart phone is an open to discussion drill whereby a moderator advances entrance to a specific’s mobile phone over a
3 Pages(750 words)Essay
Ethical hacking
Learners were allocated into groups. They drilled in the classroom utilizing laptops and remote access and afterward kept on working at home,
8 Pages(2000 words)Essay
As all the companies have started utilizing the latest IT systems, the computer hacking has become the biggest threat for the computer and Internet users. The word ‘hacker’ was coined by John Nash in 1980s who was a famous mathematician on the international level. In 1972,
12 Pages(3000 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Let us find you another Essay on topic Email Hacking for FREE!
logo footer
Contact us:
Contact Us Now
FREE Mobile Apps:
  • StudentShare App Store
  • StudentShare Google play
  • About StudentShare
  • Testimonials
  • FAQ
  • Blog
  • Free Essays
  • New Essays
  • Essays
  • Miscellaneous
  • The Newest Essay Topics
  • Index samples by all dates
Join us:
Contact Us