Contact Us
Sign In / Sign Up for FREE
Go to advanced search...

Computer Hacking - Dissertation Example

Comments (0) Cite this document
The major focus of this argumentative paper “Computer Hacking” is to analyze a number of controversies and risks associated with the existence of the Internet. Experts have clarified that the internet, along with its bounties, has brought a number of risks…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93.8% of users find it useful
Computer Hacking
Read Text Preview

Extract of sample "Computer Hacking"

Download file to see previous pages Although internet has been a notion of blessing for the human race, on the other hand, one can witness a number of controversies and risks associated with its existence, one of specific, experts used to consider hackers as skilled individuals who were involved in discovering innovative aspects of the information systems, and they were enthusiastic about different components of the computer networks that may result in benefits to the users and computing field beyond the known limits. In this regard, hackers completely were different from the rest of the computer users who were only keen to learn things required for normal usage of computers and the internet. In particular, hackers were skilled and efficient programmers and developers, and as the years passed, the world of hacking continued to include the number of enthusiastic computer lovers that began to create new programs and languages to improve and enhance capabilities and functions of existing computer the programs (Harris & Ness, pp. 48-53). Unfortunately, such the cope and working of hacking did not acquire similar respect, as a number of individuals began to employ their computer networking skills for fun intentions by intruding in other computers. In the beginning, these computer fun-loving individuals kept their tricks for fun purposes limited to their colleagues and acquaintance. However, after a couple of occurrences, experts have indicated that individual began to cause damage to the computer systems with their knowledge of information systems on the internet, and that resulted in ending up of such news on the media. Regrettably, experts and media at that time did not choose the appropriate phrase for such individuals, and media chose the term hacking was these occurrences rather than using terms such as cybercriminals, intruders, crackers to indicate individuals who were causing damage to the internet society (Erickson, pp. 67-70). Unluckily, nobody put efforts to indicate such a mistake of the media, as well as the experts, and it has been an observation that such erroneous action has resulted in shadowing of actual benefits of hacking. In the result, for crackers and cybercriminals, hacking has now become a compliment for them, and that has resulted in an increment in the number all over the globe. Nowadays, experts and professionals use the term ‘hacking’ or ‘hacker’ to describe an individual who causes threats, risks, and damages in the computer security that is against the actual definition of the term hacking, as well as its real usage. In this regard, this paper will include arguments regarding the benefits and efficient usage of hacking. ...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
(“Computer Hacking Dissertation Example | Topics and Well Written Essays - 3500 words”, n.d.)
Computer Hacking Dissertation Example | Topics and Well Written Essays - 3500 words. Retrieved from
(Computer Hacking Dissertation Example | Topics and Well Written Essays - 3500 Words)
Computer Hacking Dissertation Example | Topics and Well Written Essays - 3500 Words.
“Computer Hacking Dissertation Example | Topics and Well Written Essays - 3500 Words”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document


Ethical Hacking

...Ethical Hacking 1. Threats There have been many cyber attacks in the past that have weighed heavily on the shoulders of the victims. Three of the many examples are described here. Black Hat Crackers worked to take advantage of computer systems, and Jonathan James has been a big name among black hat crackers. He was sentenced at the age of sixteen and told the press that all he did was for fun. One instance of his great hacking is installing a backdoor into a Defense Threat Reduction Agency server and hacking sensitive information and employees’ data. In June 2005, the computer specialist, Michael Haephrati and his wife Ruth, who belonged to London, were caught sending Trojan horse softwares to criminal parties. Due to this, the US...
5 Pages (1250 words) Research Paper

Hacking Exposed

...? Hacking Exposed (College Hacking Exposed Adrian Lamo Adrian Lamo is a green hat hacker who hacked a seriesof high-profile computer networks including those of The New York Times, Microsoft, and Yahoo. However, his most notorious computer crime was committed against The New York Times in 2002 when he unauthorizedly accessed into its Times’ private intranet. According to Poulsen (2002), by this hacking, he got unauthorized access mainly into paper’s social security numbers, customers’ order details, and “WireWatch” keywords. The most notable element of Lamo’s hacking activity was that he could access a database of 3000 contributors. Similarly, he could acquire social security numbers of many persons at reputed ranks. Lamo misused Times...
2 Pages (500 words) Essay

Ethical hacking

...? 245CT: Ethical Hacking Word Count: 2,000 (8 pages) 245CT Ethical Hacking Lab Book work) Session 11 - Semester 2 Sur First Name: SID: Lab Day: Wednesday Lab Time: Lab: 11.00 – 13.00 AS236 & ASG22 This lab book constitutes 50% of your overall module mark for 245CT, so it is VERY IMPORTANT! Index 245CT: Ethical Hacking 1 1 245CT 2 Ethical Hacking 1 2 Lab Book (Coursework) 2 This lab book constitutes 50% of your overall module mark for 245CT, so it is VERY IMPORTANT! 2 Index 3 Coursework 4 Lab 2 - Essential TCP/IP tools 5 Note: Use right-click/Update Field/Update Entire Table/OK to refresh the index above when you have added a new lab to the lab book. This note will self-destruct after you have read it. Or you could delete the note yourself...
8 Pages (2000 words) Coursework

Ethical Hacking

...? Ethical Hacking Ethical issues have been raised concerning the use of hackers to secure the network systems of companies, from other hackers with malicious intent. Some have argued that the ethical issues concerned are not related to the hacking itself but vary according to what the different members of the society may think. It is a situation where ethics are judged, not by the universal definitions concerning hacking, but according to the society within which the use of ethical hackers has become commonplace. Introduction Ethical hacking describes the procedure where individuals are employed by companies to attack the companies’ computer systems so that their vulnerabilities can be detected and fixed. An ethical hacker will attempt...
5 Pages (1250 words) Research Paper

Ethical Hacking

...ETHICAL HACKING Ethical Hacking According to Raymond, the term 'Hacker' has a dual usage in the computer world. Originally, the term was defined as: HACKER noun 1.A person who enjoys learning the details of computer systems and how to stretch their capabilities-as opposed to most users of computers, who prefer to learn only the minimum amount necessary. 2. One who programs enthusiastically or who enjoys programming rather than just theorizing about programming (Raymond, 1991). From the above definition it is clear that, the original idea behind hacking has nothing malicious in its intent. According to me hacking is justified, provided the intent behind performing a hack is not destructive. Today organizations are increasingly getting...
2 Pages (500 words) Essay

Ethical Hacking

.... It can be used to protect an organization against an attack because it spots out and potentially prevents intrusions that breach the system’s firewalls or those that occur behind the local area network (LAN) or the firewall (IATAC, 2009, p.3). Thus, IDS can provide organizations real-time or near-real-time monitoring of a host or a network and defend them from hacking. IDS and Detection of Footprinting stages IDS cannot always detect footprinting stages. The wrong results in an IDS are categorized into two kinds: false positives and false negatives (IATAC, 2009, p.4). False positives happen when an IDS wrongly sees a problem with benign traffic (IATAC, 2009, p.4). False negatives take place when malicious traffic is not recognized...
2 Pages (500 words) Essay


... IT infrastructures within their business premises for gaining competitive edge in the business market. As all the companies have started utilizing the latest IT systems, the computer hacking has become the biggest threat for the computer and Internet users. The word ‘hacker’ was coined by John Nash in 1980s who was a famous mathematician on the international level. In 1972, the first technology for hacks was determined; a single whistle from the box ‘Cap n’ Crunch’ was being used for making long distance phone calls free of any charge (Himma, 2007). In 1981, Ian Murphy hacked data of AT&T and changed the clocks so that people could avail late night discounts and he was the first hacker to be convicted of felony charges. At the same time...
12 Pages (3000 words) Essay

Computer Memory Hacking

...Computer Memory Hacking Hacking has become so common in today’s world that almost every person who uses computer and internet can be a victim of hackers. According to Ciampa (2009), a hacker is a person who uses advanced programming skills and techniques to break into any specific computer system (p. 16). Hackers can gain control of computer memory or RAM to commit theft of information or to steal private information. There are many important files that a person stores in the computer memory. Hackers gain control of the system’s memory to access those files and manipulate them according to their needs. There exist some common tools that hackers normally use to intrude into the memory of computer systems. One of those common tools...
2 Pages (500 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Dissertation on topic Computer Hacking for FREE!

Contact Us