StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Should All Hacking be Banned - Literature review Example

Cite this document
Summary
This paper 'Should All Hacking be Banned' seeks to highlight positive aspects associated with hacking and how they serve the society. The software companies regularly update their products, which serves to keep the level of vulnerability at all-time low…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.3% of users find it useful
Should All Hacking be Banned
Read Text Preview

Extract of sample "Should All Hacking be Banned"

?Should All Hacking be Banned? In a highly evolving world of technology, creative innovations have found their way into the human way of life, with computers considered the most important in the history. Computers are credited for their fast computation of complex data and generation of reliable results. In the present days, computers have grown to generate enormous processing power, which is capable of handling complex analysis of raw data. The internet via the global village has dramatically changed how people communicate, interact and conduct their business. Advancement in technology has made available new communication tools, which enable communication over long distance. The internet is regarded as a source of entertainment, information and communication with activities, which include e-mail, web surfing, shopping and reading news. Internet connections allow easy transfer of a variety of media from one location to another, thus enhancing sharing and building relations among people. It is the increased dependency on computers and internet that fuels cybercrime, which poses an enormous risk to infrastructure that, is dependent on such utilities. The United States ranks first in a list of ten countries known for hacking tendencies as indicated by the table below. Adopted from http://i.huffpost.com/gen/609514/thumbs/o-GLOBAL-HACKING-TOP-TEN-570.jpg?4 Presently, most internet crimes have led to loss of personal information, which is stolen leaving a trail of suffering people. Such heavy damages are usually attributed to hackers or hacker groups who derive their gains from gathered information within a short period. Adopted from http://www.csmonitor.com/var/ezflow_site/storage/images/media/images/0426-password-chart/7780968-1-eng-US/0426-password-chart_full_600.jpg?nav=268203-csm_article-leftColRelated It is for such reasons that software companies regularly update their products, which serves to keep the level of vulnerability at all-time low. Moreover, owing to the risks involved, the public is of the opinion that hacking should be banned forgetting the benefits derived from ethical or controlled hacking. Therefore, most people think that hacking is unconditional malicious and are of the opinion that all hacking should be banned. The benefits derived from controlled hacking are critical to national security as well as in maintaining a high standard in electronic products. It is for this reasons that some level of hacking should be permitted while maintaining surveillance on hackers or hacker groups that are deemed malicious. This paper seeks to highlight positive aspects associated with hacking and how they serve the society. Common beliefs about hacking illustrate hacking as simple operations that involve a sequence of commands, which on the contrary, is a skill. The United States legal definition describes computer hacking as the deliberate access of computer systems without authority or exceeding authorised access. Hacking is the practice of manipulating computer systems and software to perform contrary to what they were initially created for. As such, a hacker presents as a skilful computer programmer or user who uses his ability to gain unauthorised access to data and information. On the other hand, cracking relates to the modifying software with the aim of removing features they deem as limitations to the software’s potential. The targeted features of the software usually include copy protection, date checks, serial numbers and product keys (Negi, 2011).In essence, crackers seek to disable or remove safety measures that often compel computer users to buy original software and products. Crackers often prey on all computer packages ranging from operating systems to games. The crackers then distribute the modified products as pirated versions without charge, which proves to be a headache for software companies due to losses incurred. It is for this reason that software cracking is illegal owing to its malicious nature of their activities. The terms hacker and cracker are often used interchangeably, however, there is notable difference between the two. The most significant of them is that a hacker is more dependent of the networking of computer systems while a cracker focuses on software to inflict damage. However, despite the negative publicity associated with hacking, there are commendable aspects of hacking that have proved effective in establishing loopholes within computer systems. Ethical hacking is considered as a positive entity of hacking as it helps in the identification computer lapses and areas that require improvement in order to enhance the security of software and institution networks. An identifying feature of ethical hacking involves sending reports to vulnerable institutions stating flaws that have been discovered (Beauchamp, 2010). Governments are known to incorporate hacking tactics in a bid to protect vital information and a step ahead of their rivals. As such, highly specialised departments and taskforces have been established perform a wide range of activities are deemed necessary in protecting the nation against espionage and subsequent attacks. The departments are charged with the task of safeguarding national secrets and other key information such as military action plans, missile launch codes, and floor plans of secured places among others. In this manner, the integrity of security measures that have been implemented is maintained. Attacks on these installations can be done by individual hackers, hacker groups or rival governments in an effort to gain financial compensation on the use of information gathered. Rival governments indulge hacking antics in an effort to acquire political supremacy and be a step ahead of the other in terms of technology, military, economy and social organisation (Segal, 2012). Similarly, through proxies, government agencies use hacking tactics to monitor illegal activities over computer networks. Monitoring internet activities entails hacking through various systems in order to get to the person of interest. For instance, while tracking a terrorist cell, government agencies may break into a suspect’s computer remotely in order to monitor their movement and activities. The information acquired is critical to the investigation as it disrupts planned attacks and leads to apprehension of the suspect. In addition, the information is usually used as evidence against the suspect and is admissible in court when appropriate legal procedures are followed. Similarly, those involved in electronic fraud with regard to banking, phishing, and hacking can be traced by government agencies before they can inflict damage on unsuspecting individuals. In such cases, online shopping and banking services are closely monitored to safeguard against malicious attacks. The above is in line with enhancing security of citizens through modern warfare that has forged battlefields into cyberspace while protecting their privacy. In addition, the government’s involvement in hacking ensures a solid defence mechanism against cyber terrorism and hacker activities in that, the process sharpens the skills of personnel. Governments through specialised agencies are also responsible f or shutting down illegal internet services. Internet services that disregard the law in their nature of operations can be shut down and their administrators brought to justice for their disregard for the law. Such services include underage pornography, illegal gambling sites, and assassin services among others. In addition, internet sites associated with the distribution of pirated software and multimedia files have targets of closure due to copyright infringement. For instance, a number of popular file sharing sites have been shut down and their servers sought after following allegations of infringement. As earlier illustrated, there are hackers with the best of intentions who report security vulnerabilities of various networks to their respective administrators. Ethical hackers have the capacity to exploit the computer systems and exposing lapses in security to modification. Ethical hackers are regarded as white hats, a category of hackers who utilise their skills for defensive purposes and usually work with security firms to ensure secure computer systems. In essence, hacking in this regard is aimed at identifying weak points in the security of computer systems within an organisation. By identifying weak points, necessary changes in terms of programming protocols can be implemented as solutions to deter potential cyber-attacks. As such, there are limits that illustrate what an ethical hacker can achieve within the confines of the law. Companies, especially security firms, hire hackers to conduct penetration tests to evaluate their computer systems (Simpson et al., 2010). During these tests, a simulated attack on the systems is initiated by unauthorised access in order to identify the weak links in the network. The attack simulation has a predetermined goal of analysing specified security policies and procedures that has to be achieved in a limited period. These tests are aimed at identifying vulnerabilities within a computer system configuration that might be preyed on by malicious hackers. Following identification of vulnerable points, the hacker reports to the managements providing recommendations on how to fix the problem. The idea behind penetration and vulnerability testing is to fix security holes before malicious hackers strike (Northcutt, 2006). Similarly, hacking protects against cyber bullying, a tactic employed by hacktivists. These are groups of hackers with an agenda and a point to prove to society. Hacktivists target particular organisations that in their opinion have failed to address critical issues that aggrieve them. For instance, hacktivists brought down the Federal Bureau of Investigation’s website following the closure of a popular file-sharing site (Marston, 2013). White hat hackers play a critical role in ensuring that vital information does not fall into the wrong hands during hacktivists’ attacks. This is achieved through monitoring internet protocols and access points by an experienced professional who is capable of identifying any malicious activity and respond promptly to avert any damage. As such, vital information such as passwords and financial records should be safe guarded with up-to-date encryption schemes, which can be provided by skilled professionals. As it takes a thief to know another, the same can be applied to hacking where the best person to deter a hacker is a fellow hacker. Computer viruses are known for their devastating damage on network and computer systems. Viruses have the capacity of propagating and integrating themselves into computer protocols without detection, only to feel the effects. However, hacking provides a unique opportunity to reverse and recover from damage caused by viruses. Through hacking, one can identify hidden codes in terms of malware such as Trojan horses and worms that exploit network vulnerabilities and spread throughout the network. Recognising and subsequent removal malicious codes within an entity of files in a computer system require expertise. Hacking also allows resolution of viral infection remotely via network platforms providing timely solutions that saves resources and prevents further damage. While fixing such infections, malicious codes such as the logic bomb can be unearthed and deactivated to save the company from potential loses. Logic bomb are often set to go off following triggers specified by their programmer to initiate a series of undesired results (Cobb, 2003). Such programmes are hidden within computer systems by employees or other parties in anticipation of trigger. For instance, an employee may write a program that is designed to wipe clean company servers following his termination from the institution. It is critical that such programs are detected and incised without triggering their action where hacking provides opportunities for the safe dismantle of logic bombs. Similarly, bugs within the software, network and operating systems can be fixed through hacking practices. These bugs often in form of errors and incompatibility issues that arising from out-dated protocols to cause inefficiency and lags in computer systems. In conclusion, the exploration into hacking allows us to understand the various disciplines associated with the act, which verifies that not all aspects of it are harmful. With the advances in computer, technology emerges new risks that need to be addressed in kind, as cyber warfare rages one. Hackers and crackers share the platform to take sides between the dark and light practice. It is the dark practice that has established negative publicity, creating room for debate on whether hacking should be banned. This is attributed to the damages inflicted by malicious hackers and crackers that are associated with economic loss. It is for these reasons that most people suggest banning hacking altogether. However, positive aspects of hacking clearly illustrate the need to maintaining such tactics in order to monitor cybercrimes. The benefits generated from positive hacking are numerous and enough to overrule the call for total banning of hacking. It is for these reasons that some level of hacking should be maintained and monitored in order to create a comprehensive buffer in information technology. References Marston, K. (2013). “The Humans behind the Hacking”. ZME Science. Retrieved from http://www.zmescience.com/tech/hacktivists-hackers-people/ Cobb, S. (2003). “When the Logic Bombs”. Chey Cobb. Retrieved from http://www.cheycobb.com/logic_bombs.html Beauchamp, M. (2010). Examples of Ethical Hacking - How Hacking Can Improve Our Lives. Retrieved from http://ezinearticles.com/?Examples-of-Ethical-Hacking---How-Hacking-Can-Improve-Our-Lives&id=5428490 Simpson, M., Backman, K. & Corley, J. (2010). Hands-on Ethical Hacking and Network Defence. Stamford: Cengage Learning. Negi, Y. (2011). Pragmatic Overview of Hacking & Its Counter Measures. Retrieved from http://www.bvicam.ac.in/news/INDIACom%202011/263.pdf Northcutt, S., Shenk, J., Shackleford, D., Rosenberg, T., Siles, R. &Mancini, S. (2006). Penetration Testing: Assessing your Overall Security before Attackers Do. Retrieved from http://www.sans.org/reading_room/analysts_program/PenetrationTesting_June06.pdf Segal, A. (2012). Chinese Computer Games. Foreign Affairs, 91(2), 14-20. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Should all hacking be banned(Persuasive Paper) Research Paper”, n.d.)
Retrieved from https://studentshare.org/information-technology/1471109-should-all-hacking-be-bannedpersuasive-paper
(Should All Hacking Be banned(Persuasive Paper) Research Paper)
https://studentshare.org/information-technology/1471109-should-all-hacking-be-bannedpersuasive-paper.
“Should All Hacking Be banned(Persuasive Paper) Research Paper”, n.d. https://studentshare.org/information-technology/1471109-should-all-hacking-be-bannedpersuasive-paper.
  • Cited: 0 times

CHECK THESE SAMPLES OF Should All Hacking be Banned

Cyber Threat in a Finance Organisation

The surprising fact is that public awareness about the threat of cybercrime, internet hacking is pretty low despite being the fact that activities of hackers are creating a negative impact on the financial system of a country in a regular interval (Fletcher, 2007).... Although the internet has started its journey as the magic technology which provides information later on it has established its ubiquitous presence in all our daily life needs, for example, one can even conduct financial or banking transactions by taking help of internet without going to the bank....
12 Pages (3000 words) Essay

How Hacking Can Be Helpful

The paper "How hacking Can Be Helpful" clears up the practice of hacking can help companies identify vulnerabilities in their security systems or computer networks and improve security levels.... People engage in unethical hacking to demonstrate their programming skills or earn money.... hellip; The majority believes that hacking is an unfair activity that primarily intends to intrude into someone's privacy.... Admittedly, many people negatively use hacking techniques to break into computer systems and the privacy of others without the parties' knowledge....
12 Pages (3000 words) Essay

Contemporary Banking Theory

The rise of the Internet, for example, has increased transparency, improving the ability of all market participants to determine the available range of prices for financial instruments and financial services (Clemons and Hitt, 2000, 4).... The research paper "Contemporary Banking Theory" states that digital technology has greatly reduced the costs of compiling, processing, and distributing information....
11 Pages (2750 words) Research Paper

The Credit Crunch

This coursework "The Credit Crunch" focuses on different reasons a credit crunch can take place.... nbsp;There can be bank failures due to bad loans, creating perceptions of increased risk, which causes other banks to tighten their lending criteria and to restrict credit.... hellip; It's not just that we're borrowing more money and paying it back more slowly; it's that we're spending money we used to consider off-limits....
8 Pages (2000 words) Coursework

Hackers Tools and Techniques: PayPal

Very often employees that have been unhappy with their employers also seek revenge and they engage in hacking the system.... PayPal is the most important of all the electronic banking and commerce institutions and has the best chance of delivering secure, trusted e-commerce transactions.... It is one of the most recognized Internet brands and is all set to lead the financial sector in transacting electronic business....
7 Pages (1750 words) Term Paper

Recent trends in top tier banks in U.S., Europe, Asia, or Latin America - finance

The 21st century has been witnessing complex developments in the banking industry offering an array of services to the world markets and controlling dollars in cash and assets worth several billions.... The advancements in technology have enabled them to find new business… But the bank operations are not uniform....
24 Pages (6000 words) Term Paper

Hacking Exposed, Underlying Motivation

Initially, James was “banned from recreational computer use and was slated to serve a six-month sentence under house arrest with probation.... on June 20, 2010 revealed the criminal escapade involving hacking.... The US Legal define computer hacking as “intentionally accesses a computer… 1).... million software stolen from NASA; hacking Exposed hacking Exposed In an article en d Jonathan James – 15 Year-Old Cybercriminal Who Hacked NASA published in the website What's the latest?...
2 Pages (500 words) Essay

Legal and Practical Aspects of Islamic Securitisation

The fact is the Shariah or Islamic law governs all daily activities of Muslims.... While wealth may be acquired, it may only be acquired by methods that are fair to all participants.... This research study provides a critical analysis of Islamic securitization with a view to identifying what is permitted in terms of Shariah compliant securitization and why....
18 Pages (4500 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us