Hacker Culture - Research Paper Example

Comments (1) Cite this document
Summary
Introduction According to Sterling (1993) definition, “The Hacker Crackdown”, the term “hacking” is the act of intruding into computer systems by stealth and without permission.” The word hacker is highly used by computer programmers because hackers are able to crack the codes in the programming language…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER97.6% of users find it useful
Hacker Culture
Read TextPreview

Extract of sample "Hacker Culture"

Download file to see previous pages Hackers may also block the public from logging in to the site hence the revenue details would be inaccessible. This study will focus on hacker’s motivation, their personality, and action. Personality of a potential hacker Potential hackers are people suspected to have intent to circumventing through a computer’s security system for their own personal gain. They may include students, employees, activists, and criminals among others. Normally, the potential hackers have an intention to access the information from Wisconsin department of revenue for commercial purposes. From a psychological view, hackers may be bitter about the unemployment rates in the society or they may be people with an exploration mind. Hackers use vulnerability scanners, password cracking software, packet sniffer software and spoofing attach to enter a system. However, due to the development in technology, such hackers can be identified by recently developed software. Such software is able to identify any unusual activity in the site hence blocking it (Gayle, 1971). Motivation of hackers Wish to make illegal money by stealing Hackers are people with an intention of making an extra income from conning and swindling online businesspersons. By use of their ability to access secured systems, they are able to access important information for example credit cards data, bank details, identity and various other types of information. With such information, they create rogue accounts which they can use to purchase, borrow advance salary, withdraw cash etc. In case hacker accesses information from Wisconsin department of revenue, the government would loss taxes. The hacker would be able to change the income tax values of companies hence making such companies pay small revenue to the government (Jerome, 1986). This would lead to loss of taxes by the government. These unscrupulous individuals always pay these hackers and companies who need to evade paying taxes. Therefore the money they earn acts as motivation to hacking. Intention to use other people’s ideas The intellectual property rights guide intellectual property. The legal systems of different countries have been designed to provide protection against use of other people’s ideas. However, the hackers are able to access such ideas and present them as their own. The information may include innovations, new formulas, and important research. New ideas and plans of Wisconsin revenue department stay at risk if a hacker has access to their files. Through the intention to use the ideas of other people, hackers are motivated to struggle and circumvent a computer’s security system. Intention to reveal industrial secrets Every business keeps records and files away from the public. Their records remain a deep secret that is only supposed to be accessed by authorized persons only. Such secrets include the marketing policies, the purchasing policies, and company’s plans. In addition, it may include illegal business activities used for the benefit of the company. The competitors are guarded from accessing these secrets as way of safeguarding the benefit and future prosperity of the company in the market. Hackers are therefore motivated to work hard and ensure that such vital data is available to the public or to specific competitors (Gu, 2010). Moreover, a ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Hacker Culture Research Paper Example | Topics and Well Written Essays - 2000 words”, n.d.)
Retrieved from https://studentshare.org/information-technology/1471199-hacker-culture
(Hacker Culture Research Paper Example | Topics and Well Written Essays - 2000 Words)
https://studentshare.org/information-technology/1471199-hacker-culture.
“Hacker Culture Research Paper Example | Topics and Well Written Essays - 2000 Words”, n.d. https://studentshare.org/information-technology/1471199-hacker-culture.
  • Cited: 0 times
Comments (1)
Click to create a comment or rate a document
sh
shieldskaylee added comment 1 month ago
Student rated this paper as
This research paper was always my weak point. I could never complete it successfully. Still, after I found this precise essay, I understood how it should be done. So, I performed my research afterward and completed the research paper in several hours, instead of weeks as it was previously.

CHECK THESE SAMPLES OF Hacker Culture

Hacker Culture and Cyber Security Issues

...? Hacker Culture and Cyber Security Issues Introduction Hacker culture is the composition of human manifestation and experiences that are related to the exploitation of software and hardware. It has existed for many years and has constant influence in various societies across the world. Following the advancing computer knowledge in the current world, hacker culture is increasingly making its way to people’s lives. There are three types of hackers which include the black hat hacker, white hat hacker and the grey hat hacker. The three types of hackers have different intentions and motivations in their activities across the internet. Black hat hackers are the most daring because they use their knowledge to obtain information and data... for...
10 Pages(2500 words)Assignment

Project Paper: Thinking like a hacker to protect your network

...? Thinking like a hacker to protect your network al Affiliation) Introduction The advancement of information technology has brought forth the evolution of the types of threats and methods of attack used to penetrate an organization’s private network. Despite the tight security measures put in place to ensure information security, hackers develop more advance means and methods to compromise the security of a network and manage to access unauthorized information and resources. The sure way to to best ensure network security is by using the view point of a hacker. That is, in order to better identify the system’s weakness and be able to create effective defense mechanisms against hacking is...
7 Pages(1750 words)Essay

Computer Hacker

...is that it infringes on other people’s privacy. More so, since technology levels also keep rising steadily, the future of computer hacking seems bright, as computer hackers will learn and evolve with the increasing technology. However, ethical hackers will also use the advanced technology to offer increased system security to organizations. Either way, computer hacking affects all countries, therefore, it should be the collective responsibility of countries to adopt strategies that will help to curb computer hacking. References Levy, S. (2010). Hackers: Heroes of the computer revolution. California: Octal Publishing Inc. Skibell, R. (2002). The Myth of the Computer...
6 Pages(1500 words)Research Paper

Exploring The Dark Side. Review of hacker sites

...Within the context of a network interconnected world where sensitive corporate data is stored, thereby potentially accessibly, on servers linked to the World Wide Web, security issues are a real and critical concern. Indeed, when questioning my immediate supervisor/manager on the reasons why the company did not open an e-commerce front, the response was "security concerns." There is a belief, at least as expressed my both my manager and several work colleagues, that data stored on servers is potentially accessible by hackers, with the implication being that establishing an e-commerce front would render the company highly vulnerable to what Schwartau (1994) termed Level Two Attacks. Paradoxically, however, following an...
4 Pages(1000 words)Essay

Hacker Hunters

...CASE STUDY---HACKER HUNTERS Answer The contemporary era is the era of information technology, where fast and speedy flow of information is the keyto success for the great brands and multinational organizations carrying vast business volume and sound corporate reputation at global level. The most meaningful way, Gates observes, to differentiate your company from your competitor, the best way to put distance between you and the crowd is to do an outstanding job with information and management. How you gather, manage, and use information will determine whether you win or loose. (1999: 2) Fast information technology provides the retailers a comprehensive, an accurate and detailed picture of the entire socioeconomic,...
4 Pages(1000 words)Essay

Culture

...Running head: THE TRAVELLERS The Travellers: Racism in Ireland (school affiliation) Traditionally a nomadic people of Irish origin, the Irish Travellers are not, as many believe, related to the romani, gypsies often found in countries throughout eastern and western Europe of murky decent but thought to have their roots in India. Travellers, or as they are more colloquially called Irish gypsies, to the best of what is known have their cultural roots in Ireland. As a group living within the country but outside of the Irish cultural mainstream, they have been the target of racism--singled out for scorn, ridicule and unequal treatment not only by their fellow Irishman but by Irish institutions, the result of...
8 Pages(2000 words)Research Paper

Hacker Gary McKinnon

...Hacker Gary McKinnon Gary McKinnon, the systems administrator from Scotland, is the alleged hacker behind the US Military and NASA computer hacking between the years 2001 and 2002. This notorious hacker taught the world about the importance of security measures to be adopted to stop hackers from accessing highly confidential data. Thesis statement: Tight security measures with the help of security programs, effective preventive measures, and regular security verification could have prevented Hacker Gary McKinnon from hacking US Military and NASA computers. What could have been done to stop the hacker? First of all, Gary McKinnon’s...
2 Pages(500 words)Essay

Computer Hacking or Hacker

...Hackers gain access to RSA’s SecurID tokens: A review Hackers gain access to RSA’s SecurID tokens: A review The article recentlypublished in Government Computer News website reveals that hackers have breached the security of the renowned security and cryptography Company RSA. The attack has targeted SecurID two-factor authentication product used for bank accounts and network access. The scheme uses a personal identification number and a token that generates a one-time password every 60 seconds to prove the users identity (Jackson, Hackers gain access to RSAs SecurID security tokens, 2011). The information extracted on the SecurID customers does not enable a successful direct attack for the moment according to the company’s... to targeted...
2 Pages(500 words)Book Report/Review

Hacker Culture and Mitigation

...Hacker Culture and Mitigation Introduction 3 Hacker’s culture 3 Mitigation/ measures 4 Past incidents in cyber crime 5 Identity theft 5 Online stalking 5 Third party involvement. 6 Methods employed by organization to discourage hackers. 6 Conclusion 7 References 9 Hacker Culture and Mitigation Table of Contents Introduction 3 Hacker’s culture 3 Mitigation/ measures 4 Past incidents in cyber crime 5 Identity theft 5 Online stalking 5 Third party involvement. 6 Methods employed by organization to discourage hackers. 6 Conclusion 7 References 9 Introduction The most...
5 Pages(1250 words)Assignment

Hacker Target and Response

...Hacker Target Response s Hacker Target Response With the advancing development of information systems and networks, security is any organization’s key concern. The foundational aims of information security systems are integrity, privacy, and accessibility (Covaleski, 2013). Information security systems are vital to an organization because their function is to protect any form of unauthorized access or to hack with the purpose of obtaining sensitive data. The most dangerous individuals who might desire to attack a company’s information system are employees either who still work on the firm’s premises or those who have been terminated from work. The principal objective of this paper is to identify the areas and the information... for the sake...
6 Pages(1500 words)Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Research Paper on topic Hacker Culture for FREE!

Contact Us