StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Nobody downloaded yet

How has Hacking and the Motivation of Attackers Evolved - Research Paper Example

Comments (0) Cite this document
Summary
This paper describes the original definition of a hacker as “a person who enjoys learning the details of computer systems and how to stretch their capabilities—as opposed to most users of computers, who prefer to learn only the minimum amount necessary”. Hacking today constitutes one of the greatest cybercrimes across the world, and has profound effects on the society, individuals etc…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.7% of users find it useful
How has Hacking and the Motivation of Attackers Evolved
Read Text Preview

Extract of sample "How has Hacking and the Motivation of Attackers Evolved"

Download file to see previous pages However, as early as 1870s, misdirection of telephone calls and eavesdropping of conversations was established by the employees working in Bells Telephone Company. Earlier well known, MIT students became experts in hacking operations since their access to and study of computing after 1960s. In the modern world, with the widespread knowledge of computing and programming, hackers have increased; both ethical and criminal hackers who have distinguished motives.
The Asian community today produces majority of computer hackers, and comprises the major drivers in technology evolution across the world. Literally, hackers are taken to be technically proficient people in specific areas. Palmer describes the original definition of a hacker as “a person who enjoys learning the details of computer systems and how to stretch their capabilities—as opposed to most users of computers, who prefer to learn only the minimum amount necessary” (2001, p. 769). However, besides expert enthusiasts, the term also refers to malicious meddlers into computers or systems for criminal objectives like theft of confidential information. Hacking today constitutes one of the greatest cybercrimes across the world, and has profound effects on the society, individuals, organizations and governments at large. Though still used to develop solutions to existing problems, some hackers have embraced the skills to challenge systems/developers, for fame, intentional damage and theft among others. Gone are the times when hacking was considered benign; computer systems or networks today are built to withstand hacking and the risks attackers pose.
Graham Bell’s invention of the telephone came at a time western nations sought to improve communication. The telephone technology that later employed switchboards in its communication exchange provided several opportunities for hacking and unethical conducts. ...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(How has Hacking and the Motivation of Attackers Evolved Research Paper Example | Topics and Well Written Essays - 3000 words, n.d.)
How has Hacking and the Motivation of Attackers Evolved Research Paper Example | Topics and Well Written Essays - 3000 words. https://studentshare.org/information-technology/1849842-how-has-hacking-and-the-motivation-of-attackers-evolved
(How Has Hacking and the Motivation of Attackers Evolved Research Paper Example | Topics and Well Written Essays - 3000 Words)
How Has Hacking and the Motivation of Attackers Evolved Research Paper Example | Topics and Well Written Essays - 3000 Words. https://studentshare.org/information-technology/1849842-how-has-hacking-and-the-motivation-of-attackers-evolved.
“How Has Hacking and the Motivation of Attackers Evolved Research Paper Example | Topics and Well Written Essays - 3000 Words”. https://studentshare.org/information-technology/1849842-how-has-hacking-and-the-motivation-of-attackers-evolved.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF How has Hacking and the Motivation of Attackers Evolved

Hacking Exposed

...How has Hacking and the Motivation of Attackers Evolved... How has Hacking and the Motivation of Attackers Evolved... Hacking Exposed (College Hacking Exposed Adrian Lamo Adrian Lamo is a green hat hacker who hacked a seriesof high-profile computer networks including those of The New York Times, Microsoft, and Yahoo. However, his most notorious computer crime was committed against The New York Times in 2002 when he unauthorizedly accessed into its Times’ private intranet. According to Poulsen (2002), by this hacking, he got unauthorized access mainly into paper’s social security numbers, customers’ order details, and “WireWatch” keywords. The most notable element of Lamo’s hacking activity was that he could access a database of 3000 contributors. ...
2 Pages (500 words) Essay

Ethical hacking

...How has Hacking and the Motivation of Attackers Evolved... How has Hacking and the Motivation of Attackers Evolved... 245CT: Ethical Hacking Word Count: 2,000 (8 pages) 245CT Ethical Hacking Lab Book work) Session 11 - Semester 2 Sur First Name: SID: Lab Day: Wednesday Lab Time: Lab: 11.00 – 13.00 AS236 & ASG22 This lab book constitutes 50% of your overall module mark for 245CT, so it is VERY IMPORTANT! Index 245CT: Ethical Hacking 1 1 245CT 2 Ethical Hacking 1 2 Lab Book (Coursework) 2 This lab book constitutes 50% of your overall module mark for 245CT, so it is VERY IMPORTANT! 2 Index 3 Coursework 4 Lab 2 - Essential TCP/IP tools 5 Note: Use right-click/Update Field/Update Entire Table/OK to refresh the index above when you have added a new lab ...
8 Pages (2000 words) Coursework

Ethical Hacking

...How has Hacking and the Motivation of Attackers Evolved... How has Hacking and the Motivation of Attackers Evolved... Ethical Hacking Ethical issues have been raised concerning the use of hackers to secure the network systems of companies, from other hackers with malicious intent. Some have argued that the ethical issues concerned are not related to the hacking itself but vary according to what the different members of the society may think. It is a situation where ethics are judged, not by the universal definitions concerning hacking, but according to the society within which the use of ethical hackers has become commonplace. Introduction Ethical hacking describes the procedure where individuals are employed by companies to attack the companies’ ...
5 Pages (1250 words) Research Paper

How Has Peacekeeping Evolved

...How has Hacking and the Motivation of Attackers Evolved... United Nations The year 1991. The strategic war between the two superpowers, the United s and the Soviet Union had ceased. This is becauseof the collapse of Soviet Communism in the USSR itself. Now that the Cold War is all but over, the role of the United Nations as world arbiter had considerably diminished, for the conflict between two great nations had ceased. However, UN peacekeeping had not ceased, because turmoil and conflicts still mar the international community, therefore, the need for them, for ceasefires are not permanent. As a general policy upheld until now, they were only fielded in peacekeeping zones after a ceasefire was declared by both conflicting parties, and they...
2 Pages (500 words) Essay

Hacking

...How has Hacking and the Motivation of Attackers Evolved... How has Hacking and the Motivation of Attackers Evolved... Security “Hacking” AFFILIATION: Table of Contents Table of Contents 2 Internet Security“Hacking” 3 Brief Introduction of Hacking 3 Motivating factors for hackers 4 Characteristics of hackers 5 Impact of hacking on society / Security on Internet 6 Security issues in electronic transactions 7 Number of Visa users worldwide 8 Facts and figures about electronic crimes worldwide 9 Real life examples of hacking 10 Protection measures against hacking 10 Conclusion 12 References 13 Appendix - Vocabulary 15 Internet Security “Hacking” Brief Introduction of Hacking With the advent of time and development in the technological world, everythi...
12 Pages (3000 words) Essay

How have the criminal justice system evolved

...How has Hacking and the Motivation of Attackers Evolved... How has Hacking and the Motivation of Attackers Evolved... Has the Criminal Justice System Evolved? Introduction: A criminal justice system is formed in order to deal with crimes thatoccur within a country or within a state (Siegel & Worrall, 2012, p.8). The system includes collection of federal, state, and local public agencies that take responsibilities of dealing with different crimes. Suspects and defendants are processed by these agencies and their decisions are interdependent affecting each others’ processes (The Structure of Criminal Justice, n.d.). The present study focuses on the process of evolution of such a system of criminal justice intending to deal with different crimes. ...
4 Pages (1000 words) Research Paper

How Parthian Kingship Evolved and Developed

...How has Hacking and the Motivation of Attackers Evolved... How has Hacking and the Motivation of Attackers Evolved... Parthian Kingship Evolved and Developed Insert Insert The royal image of the Parthian kings has been analyzed by the use of the coinage that initially belonged to the early Arsacids who are also known as Parthian kings. The Parthian empire grew enormously and was vast. The Arsacids were able to overtake the territory of the Seleucid and at time; they fended off their previous primitive overlords. Finally, the Parthians survived as Seleucid dynasty finally disappeared. They remained a challenging force, rivals to small states and the Roman Empire. Hence, it becomes now the Parthian Empire. The study of Parthian Empire has been...
11 Pages (2750 words) Essay

Computer Hacking

...How has Hacking and the Motivation of Attackers Evolved... How has Hacking and the Motivation of Attackers Evolved... Computer Hacking Introduction Ever since its commencement during the late 90s, the internet has been triumphant in inclining a gigantic number of computer users in different parts of the globe. Additionally, from the day one until today, the internet has now become a journey; starting from a single network to an environment of millions of computers connecting with each other through various sources (Erickson, pp. 23-25). Users are now using dial-ups, gateways, ISPs, etc to connect to the internet for various educational, social, political, and personal reasons. In other words, internet has now become a global village that only...
14 Pages (3500 words) Dissertation

Cyber Security Issues

...How has Hacking and the Motivation of Attackers Evolved... How has Hacking and the Motivation of Attackers Evolved... - CYBER SECURITY Introduction Day in and out, reports of cyber related security issues keep coming up. The target of these cyber attacks haveoften been individuals, corporate institutions and in worse cases, governmental institutions. Perhaps not much has been done to track down the prevailing situation because of the ever-increasing complex nature of information technology systems used by culprits. These sophistications actually make surveillance and control difficult and thus require further multi-dimensional that is made up of topics at different layers of systems (Lye and Wing, 2005). A modern phenomenon that is fast growing am...
38 Pages (9500 words) Report

Types of Hacking

...How has Hacking and the Motivation of Attackers Evolved... How has Hacking and the Motivation of Attackers Evolved... Before any meaningful empirical research can be done, a better understanding of attacker taxonomy needs to be delineated. The current tradition that involves categorizing all individuals who have participated in the many differing forms of computer specific attack activities as “hackers” is, ultimately, a far too generic term to be of any real use (Post, 1996; Rogers, 2001). The term “hacker” is presently too broad to represent the specifics of the different sorts of computer related attacks. In order to incorporate all of the different computer attacks in a way that facilitates understanding it will be necessary to identify...
24 Pages (6000 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Research Paper on topic How has Hacking and the Motivation of Attackers Evolved for FREE!

Contact Us