StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Should All Hacking Be Banned - Coursework Example

Cite this document
Summary
This coursework "Should All Hacking Be Banned" seeks to highlight positive aspects associated with hacking and how they serve society. Common beliefs about hacking illustrate hacking as simple operations that involve a sequence of commands, which on the contrary, is a skill…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.8% of users find it useful
Should All Hacking Be Banned
Read Text Preview

Extract of sample "Should All Hacking Be Banned"

Should All Hacking be Banned? In a highly evolving world of technology, creative innovations have found their way into the human way of life, with computers considered the most important in the history. Computers are credited for their fast computation of complex data and generation of reliable results. In the present days, computers have grown to generate enormous processing power, which is capable of handling complex analysis of raw data. The internet via the global village has dramatically changed how people communicate, interact and conduct their business. Advancement in technology has made available new communication tools, which enable communication over long distance. The internet is regarded as a source of entertainment, information and communication with activities, which include e-mail, web surfing, shopping and reading news. Internet connections allow easy transfer of a variety of media from one location to another, thus enhancing sharing and building relations among people. It is the increased dependency on computers and internet that fuels cybercrime, which poses an enormous risk to infrastructure that, is dependent on such utilities. The United States ranks first in a list of ten countries known for hacking tendencies as indicated by the table below. Adopted from http://i.huffpost.com/gen/609514/thumbs/o-GLOBAL-HACKING-TOP-TEN-570.jpg?4 Presently, most internet crimes have led to loss of personal information, which is stolen leaving a trail of suffering people. Such heavy damages are usually attributed to hackers or hacker groups who derive their gains from gathered information within a short period. Adopted from http://www.csmonitor.com/var/ezflow_site/storage/images/media/images/0426-password-chart/7780968-1-eng-US/0426-password-chart_full_600.jpg?nav=268203-csm_article-leftColRelated It is for such reasons that software companies regularly update their products, which serves to keep the level of vulnerability at all-time low. Moreover, owing to the risks involved, the public is of the opinion that hacking should be banned forgetting the benefits derived from ethical or controlled hacking. Therefore, most people think that hacking is unconditional malicious and are of the opinion that all hacking should be banned. The benefits derived from controlled hacking are critical to national security as well as in maintaining a high standard in electronic products. It is for this reasons that some level of hacking should be permitted while maintaining surveillance on hackers or hacker groups that are deemed malicious. This paper seeks to highlight positive aspects associated with hacking and how they serve the society. Common beliefs about hacking illustrate hacking as simple operations that involve a sequence of commands, which on the contrary, is a skill. The United States legal definition describes computer hacking as the deliberate access of computer systems without authority or exceeding authorised access. Hacking is the practice of manipulating computer systems and software to perform contrary to what they were initially created for. As such, a hacker presents as a skilful computer programmer or user who uses his ability to gain unauthorised access to data and information. On the other hand, cracking relates to the modifying software with the aim of removing features they deem as limitations to the software’s potential. The targeted features of the software usually include copy protection, date checks, serial numbers and product keys (Negi, 2011).In essence, crackers seek to disable or remove safety measures that often compel computer users to buy original software and products. Crackers often prey on all computer packages ranging from operating systems to games. The crackers then distribute the modified products as pirated versions without charge, which proves to be a headache for software companies due to losses incurred. It is for this reason that software cracking is illegal owing to its malicious nature of their activities. The terms hacker and cracker are often used interchangeably, however, there is notable difference between the two. The most significant of them is that a hacker is more dependent of the networking of computer systems while a cracker focuses on software to inflict damage. However, despite the negative publicity associated with hacking, there are commendable aspects of hacking that have proved effective in establishing loopholes within computer systems. Ethical hacking is considered as a positive entity of hacking as it helps in the identification computer lapses and areas that require improvement in order to enhance the security of software and institution networks. An identifying feature of ethical hacking involves sending reports to vulnerable institutions stating flaws that have been discovered (Beauchamp, 2010). Governments are known to incorporate hacking tactics in a bid to protect vital information and a step ahead of their rivals. As such, highly specialised departments and taskforces have been established perform a wide range of activities are deemed necessary in protecting the nation against espionage and subsequent attacks. The departments are charged with the task of safeguarding national secrets and other key information such as military action plans, missile launch codes, and floor plans of secured places among others. In this manner, the integrity of security measures that have been implemented is maintained. Attacks on these installations can be done by individual hackers, hacker groups or rival governments in an effort to gain financial compensation on the use of information gathered. Rival governments indulge hacking antics in an effort to acquire political supremacy and be a step ahead of the other in terms of technology, military, economy and social organisation (Segal, 2012). Similarly, through proxies, government agencies use hacking tactics to monitor illegal activities over computer networks. Monitoring internet activities entails hacking through various systems in order to get to the person of interest. For instance, while tracking a terrorist cell, government agencies may break into a suspect’s computer remotely in order to monitor their movement and activities. The information acquired is critical to the investigation as it disrupts planned attacks and leads to apprehension of the suspect. In addition, the information is usually used as evidence against the suspect and is admissible in court when appropriate legal procedures are followed. Similarly, those involved in electronic fraud with regard to banking, phishing, and hacking can be traced by government agencies before they can inflict damage on unsuspecting individuals. In such cases, online shopping and banking services are closely monitored to safeguard against malicious attacks. The above is in line with enhancing security of citizens through modern warfare that has forged battlefields into cyberspace while protecting their privacy. In addition, the government’s involvement in hacking ensures a solid defence mechanism against cyber terrorism and hacker activities in that, the process sharpens the skills of personnel. Governments through specialised agencies are also responsible f or shutting down illegal internet services. Internet services that disregard the law in their nature of operations can be shut down and their administrators brought to justice for their disregard for the law. Such services include underage pornography, illegal gambling sites, and assassin services among others. In addition, internet sites associated with the distribution of pirated software and multimedia files have targets of closure due to copyright infringement. For instance, a number of popular file sharing sites have been shut down and their servers sought after following allegations of infringement. As earlier illustrated, there are hackers with the best of intentions who report security vulnerabilities of various networks to their respective administrators. Ethical hackers have the capacity to exploit the computer systems and exposing lapses in security to modification. Ethical hackers are regarded as white hats, a category of hackers who utilise their skills for defensive purposes and usually work with security firms to ensure secure computer systems. In essence, hacking in this regard is aimed at identifying weak points in the security of computer systems within an organisation. By identifying weak points, necessary changes in terms of programming protocols can be implemented as solutions to deter potential cyber-attacks. As such, there are limits that illustrate what an ethical hacker can achieve within the confines of the law. Companies, especially security firms, hire hackers to conduct penetration tests to evaluate their computer systems (Simpson et al., 2010). During these tests, a simulated attack on the systems is initiated by unauthorised access in order to identify the weak links in the network. The attack simulation has a predetermined goal of analysing specified security policies and procedures that has to be achieved in a limited period. These tests are aimed at identifying vulnerabilities within a computer system configuration that might be preyed on by malicious hackers. Following identification of vulnerable points, the hacker reports to the managements providing recommendations on how to fix the problem. The idea behind penetration and vulnerability testing is to fix security holes before malicious hackers strike (Northcutt, 2006). Similarly, hacking protects against cyber bullying, a tactic employed by hacktivists. These are groups of hackers with an agenda and a point to prove to society. Hacktivists target particular organisations that in their opinion have failed to address critical issues that aggrieve them. For instance, hacktivists brought down the Federal Bureau of Investigation’s website following the closure of a popular file-sharing site (Marston, 2013). White hat hackers play a critical role in ensuring that vital information does not fall into the wrong hands during hacktivists’ attacks. This is achieved through monitoring internet protocols and access points by an experienced professional who is capable of identifying any malicious activity and respond promptly to avert any damage. As such, vital information such as passwords and financial records should be safe guarded with up-to-date encryption schemes, which can be provided by skilled professionals. As it takes a thief to know another, the same can be applied to hacking where the best person to deter a hacker is a fellow hacker. Computer viruses are known for their devastating damage on network and computer systems. Viruses have the capacity of propagating and integrating themselves into computer protocols without detection, only to feel the effects. However, hacking provides a unique opportunity to reverse and recover from damage caused by viruses. Through hacking, one can identify hidden codes in terms of malware such as Trojan horses and worms that exploit network vulnerabilities and spread throughout the network. Recognising and subsequent removal malicious codes within an entity of files in a computer system require expertise. Hacking also allows resolution of viral infection remotely via network platforms providing timely solutions that saves resources and prevents further damage. While fixing such infections, malicious codes such as the logic bomb can be unearthed and deactivated to save the company from potential loses. Logic bomb are often set to go off following triggers specified by their programmer to initiate a series of undesired results (Cobb, 2003). Such programmes are hidden within computer systems by employees or other parties in anticipation of trigger. For instance, an employee may write a program that is designed to wipe clean company servers following his termination from the institution. It is critical that such programs are detected and incised without triggering their action where hacking provides opportunities for the safe dismantle of logic bombs. Similarly, bugs within the software, network and operating systems can be fixed through hacking practices. These bugs often in form of errors and incompatibility issues that arising from out-dated protocols to cause inefficiency and lags in computer systems. In conclusion, the exploration into hacking allows us to understand the various disciplines associated with the act, which verifies that not all aspects of it are harmful. With the advances in computer, technology emerges new risks that need to be addressed in kind, as cyber warfare rages one. Hackers and crackers share the platform to take sides between the dark and light practice. It is the dark practice that has established negative publicity, creating room for debate on whether hacking should be banned. This is attributed to the damages inflicted by malicious hackers and crackers that are associated with economic loss. It is for these reasons that most people suggest banning hacking altogether. However, positive aspects of hacking clearly illustrate the need to maintaining such tactics in order to monitor cybercrimes. The benefits generated from positive hacking are numerous and enough to overrule the call for total banning of hacking. It is for these reasons that some level of hacking should be maintained and monitored in order to create a comprehensive buffer in information technology. References Marston, K. (2013). “The Humans behind the Hacking”. ZME Science. Retrieved from http://www.zmescience.com/tech/hacktivists-hackers-people/ Cobb, S. (2003). “When the Logic Bombs”. Chey Cobb. Retrieved from http://www.cheycobb.com/logic_bombs.html Beauchamp, M. (2010). Examples of Ethical Hacking - How Hacking Can Improve Our Lives. Retrieved from http://ezinearticles.com/?Examples-of-Ethical-Hacking---How-Hacking-Can-Improve-Our-Lives&id=5428490 Simpson, M., Backman, K. & Corley, J. (2010). Hands-on Ethical Hacking and Network Defence. Stamford: Cengage Learning. Negi, Y. (2011). Pragmatic Overview of Hacking & Its Counter Measures. Retrieved from http://www.bvicam.ac.in/news/INDIACom%202011/263.pdf Northcutt, S., Shenk, J., Shackleford, D., Rosenberg, T., Siles, R. &Mancini, S. (2006). Penetration Testing: Assessing your Overall Security before Attackers Do. Retrieved from http://www.sans.org/reading_room/analysts_program/PenetrationTesting_June06.pdf Segal, A. (2012). Chinese Computer Games. Foreign Affairs, 91(2), 14-20. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Should All Hacking Be Banned Coursework Example | Topics and Well Written Essays - 1750 words - 1, n.d.)
Should All Hacking Be Banned Coursework Example | Topics and Well Written Essays - 1750 words - 1. https://studentshare.org/information-technology/1798307-should-all-hacking-be-bannedpersuasive-paper
(Should All Hacking Be Banned Coursework Example | Topics and Well Written Essays - 1750 Words - 1)
Should All Hacking Be Banned Coursework Example | Topics and Well Written Essays - 1750 Words - 1. https://studentshare.org/information-technology/1798307-should-all-hacking-be-bannedpersuasive-paper.
“Should All Hacking Be Banned Coursework Example | Topics and Well Written Essays - 1750 Words - 1”. https://studentshare.org/information-technology/1798307-should-all-hacking-be-bannedpersuasive-paper.
  • Cited: 0 times

CHECK THESE SAMPLES OF Should All Hacking Be Banned

Operations security and production controls

… The concept of security should encompass both the concepts of physical as well as intangible materials like information which can be orally compromised.... The organization that I work for has well defined rules to regulate operational security and production controls.... Each rule is well defined and the system ensures that each rule is well audited by the superseding rule....
4 Pages (1000 words) Essay

Commercial Banking in the 1980's

It is also critical to understand that the banks were specifically restricted to offer interest rates on the checking accounts thus restricting them to engage into price wars and keep themselves under restricted conditions so as to basically allow all the banks to operate at even terms....
5 Pages (1250 words) Essay

Ship Breaking Industry

Stock markets all over the world have shown negative results because of recession.... It came at an unexpected time and many countries and industries failed to take any precautionary measures to tackle it.... India as a country escaped from the recession… In fact, Indian ship breaking industry has got more business in the current recession period compared to other years....
3 Pages (750 words) Essay

Made in the USA

?? , where the products which were banned in US were being exported at about 10 to 30% of normal wholesale price index with an intention to clear or to dump the… Manufacturers which dump the product overseas are either motivated by profits or just try to avoid the financial loss.... ?? , where the products which were banned in US were being exported at about 10 to 30% of normal wholesale price index with an intention to clear or to dump the banned stocks on overseas markets....
2 Pages (500 words) Term Paper

The public and popular article

It is also true that non-finance students of a nation should realize the worth of this profession and should accordingly take up this prospective occupation in future.... Since globalization, investment is treated as a single tool of growth for any modern market economic system....
4 Pages (1000 words) Admission/Application Essay

EBusiness and Ethics

Several decades ago, it was safe to store data in the computer since there were no cases of hacking and data theft.... all these measures are put in place to ensure that the cell phones that will be used as projector are efficient and that data contained in them are not lost or stolen.... Also, the cell phones should have protection from viruses that destroy and might consequently steal data....
2 Pages (500 words) Essay

Using Your Manager Skills

Consequently, the global perspective to industrialization and technological development has changed in favor of environmental conservation.... Several companies that manufacture packaging material… The biodegradable material are those that degrade both in aerobic and anaerobic conditions found in compost and landfills (Lerner, & Lerner, 2012)....
4 Pages (1000 words) Research Paper

Operating Systems and Security

bin/bash## A menu-driven Shell script which has the following options# List of all Processes running on your Linux machine# List of users currently logged# Present handling directory# List disk space/ System Health# Show Content of '/etc' directory# Backup current Directory files# List content of files backed up!... List of all Processes running on your machine"echo "2.... Exit"echo -n "Please select option between [1 - 8] then press [enter] Key:"read optcase $opt in1) echo "************ List of all Processes running *************";ps aux | less;2) echo "*********** List of users currently logged";who | more /etc/passwd;;1....
5 Pages (1250 words) Report
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us