StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Hacking: A Modern Dilemma That Calls for Modern Solutions - Essay Example

Cite this document
Summary
In the paper "Hacking: A Modern Dilemma That Calls for Modern Solutions" the hackers will be identified by answering such questions: Who are the hackers? What are they capable of? Why are they hacking? It is also imperative for people and societies to look upon other options to combat this problem…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.2% of users find it useful
Hacking: A Modern Dilemma That Calls for Modern Solutions
Read Text Preview

Extract of sample "Hacking: A Modern Dilemma That Calls for Modern Solutions"

Hacking: A Modern Dilemma that Calls for Modern Solutions The modern way of living has been made more convenient, more efficient and moreproductive by the developments in technology. This is best exemplified by computers, Internet and wireless connectivity. On the other hand, these new realities also brought new problems like hacking. The paper shall explore on the different threats and disruptions posed by the hackers in the Internet. The hackers will also be identified by answering the questions. Who are the hackers What are they capable of Why are they hacking It is also imperative for people and societies to look upon other options to combat this problem and thereby discourage any further hacking endeavors. Research Method Used This paper shall dwell and tackle the different issues that confront the Internet community today as regards the hacking problem. The discussion will take into account some of the problems caused by hackers and the different analysis and evaluation given to these. Various literatures from books, journals, news articles and web sites that contribute to the bulk of knowledge regarding hackers shall be used. Findings I. Introduction One of the most unique offences that can only be committed in the Internet environment is hacking. Movies and television shows would feature hackers as those young adults who spend all their days and weeks in front of the computer. They can come up with various ways to cause disruptions. Some do it for fun. Some do it for money. Some do it for the lack of any other thing to do. If that is the case, then this is really a big issue. Hacking is a serious matter that has to be inquired into so that the problem can be addressed and resolved properly. II. The Advent of Hacking There are claims that hacking started in the 1980's. This was the time when personal computers and computer networking came into fore as technologies enjoyed by mankind. As computer users grow in number, a new breed of threat of 'computer invaders' also came. Hackers, or the 'computerphiles' as some would call them, are people who have very good knowledge of computer technology. They use such knowledge to take over computers of other people to get, delete or tamper with the data or programs (Encarta, 2005). Say the word 'hacker' today and people who own computers or who hold important information would be alerted right away. It is like a modern pirate out to get treasured belongings of people they run counter to. This is a very negative reality that has replaced the old connotation of the term. A person can pay a computer expert or aficionado with the highest respect and regard by calling the latter a hacker (Levy, 1984). Initially, the advent of the computer technology entailed as a promise to the ordinary people. It was deemed as an equalizing factor, wherein the information and the power it brings can be made more available to the public. This was the ideal but this is not the case anymore today. However, certain forces came to fore and controlled this technology. The likes of Bill Gates and the other owners of leading computer processor and program manufacturers and developers had great degree of hold on how the technology shall be distributed (Hollinger, 1991). These various events may have frustrated the initial ideal aimed for. Some may have simply conceded but there are still many who espouse the original plan. These people believe that the access to all kinds of electronic information is a right inherent in this generation. This served as the advent of the computer hackers (Hollinger, 1991). Hacking became the new way of rebelling against the system and against those who have the control of the power of knowledge and information (Graham, 2004). They believe that by shaking the normal course of the businesses, they will be able to shake the status quo which rebels have strongly deviated from. Sometimes, the effects are so devastating that it becomes more than just mere expression of the self or assertion of a stand. Hacking has taken on a more negative meaning. Hackers have taken off the mainstream and are now considered as undesirable elements. They have developed this art of making things more complicated in the computer world and Internet community that many despise them now (Zetter and Brandt, 2006). III. Hacking: the Past and Present Hacking can take on various forms to accomplish the agenda of the hacker. A hacker can carry on different ways to execute a plan desired. These are people who have learned the different computer processes and programs, even to the last detailed vulnerability of operating systems and applications used in a particular network. This made them capable of doing things from taking hold of passwords to breaking into firewalls and security devices (Scambray et al., 2000). In as early as the 1970s in the United States, some people are capable of breaking into the main telephone system to make calls for free, otherwise called 'phone phreaking' (Sophos, 2004). Hackers can send virus and bugs to disrupt another system, either temporarily or permanently. In 1988, over 6000 installations, including government centers were infected and damaged by a 'worm,' sent out by a graduate student (Spafford, 1989). A few years ago, the 'I Love You' virus had sent hundreds, if not thousands, of computer terminals down, disabling users and companies from using their system, with just a simple click on a 'compassionate title' of a message. Some hackers also resort to 'online theft' to actually seize on some financial accounts of online users. They call it 'phishing' where users are tricked to give out their information. This is done by sending convincingly authentic-looking messages from well-known Internet companies to recipients. Individuals who deal with the fake web sites will really believe that they are dealing with the real institution. There are also instances, like in the case in Brazil, where 'phishers' are able to acquire important account and financial information by just sending out 'Trojan virus' to computer users (Sophos, 2004). Aside from business establishments, educational institutions are also threatened. Student records and accounts are main target too for those who want to take over (Zetter and Brandt, 2006). What makes hackers do what they do The tendency of people today is to think that hackers are out for the money. There are findings that most hackers today are paid by certain companies for commercial and profitable purposes. This is one way for professionals to get information away from another rival company and to make goods available for sale in the market (McPartlin, 2006). There were earlier studies showing that approximately three-fourths of the hacking cases in the 1980's are carried out by employees against their firms to have some monetary gains (Hollinger, 1991). In this regard, the advent of computer hacking can be considered in the changing values of the society. This modern age has paved way to a new apple of the eye for everyone. Information and communication technologies are the 'new gold.' Everything is turning into something that depends on a computer technical device, the cellular phones, digital cameras, refrigerators and even journals. Many people are recognizing this growing trend and they would not allow themselves to be left behind. Many people are bent into believing that this hacking is the latest 'cool' option to take. The computer and Internet are the mediums of expression for this generation. This makes people explore their various options, even if it includes hacking. They see the endeavor as an opportunity to make wealth, even if it is at the expense of another (Graham, 2004). However, one should go beyond a simplistic way of looking at the reality of hacking. IV. Addressing the Problem with Hackers Traditionally, the approach to counter the intrusive acts and damaging effects of hacking was focused on backing up systems to prepare for any attacks. This is done by refraining from opening suspicious messages or limiting the sites that can be opened in a terminal. There are some firms that require constant scanning and updates in software. Such methods focused more on minimizing the damages but this can be very taxing and impractical in the long run (Scambray et al., 2000). The trend recently is to put in a more offensive approach to this whole matter. Rather than provide security that anticipates a particular kind of attack, it is better to set up systems and administrative processes that will withstand and even possibly defeat the problem (Scambray et al., 2000). The technology and techniques are constantly developing and in each day a new software or program can be created to implement malicious intents. Today, there are options to also learn the tools used by the 'bad guys' so that any attack will be rendered baseless. There are internet tools, virus scanning software and security patches that can protect a system (Zetter and Brandt, 2006). There are some state policies and legislations that have structured ways to counter the damaging effects of hacking. There are some that voiced out a proposal to criminalize hacking. In the United States, the first federal law was passed in 1984 the Public Law 98-473 or the "Counterfeit Access Device and Computer Fraud and Abuse Act" (Hollinger, 1991). This came out as a response to the growing need then to protect hundreds of corporate firms who lose millions every year due to the victimization of computer crimes. However, there were also difficulties at that time. There are earlier studies that have characterized majority of the hackers as below 25 years old and the bulk of it are still juveniles. They are far from the conventional criminals that are chased off in the streets. Furthermore, there were also instances when tracking down a 'hacker' will take considerable time. These led to the difficulty of implementing laws against the offenders (Hollinger, 1991). These realities however were very characteristic only of the 1990s. The various disruptions caused by the hackers and the different crimes committed with the aid of hacking skills and the changes that happened in the past years have contributed to the modifications in the way computer technologies and hackers are viewed today. Before, they were only threats to certain individuals or companies. They were occasionally disrupting government services yet it was only of recent import that they have posed the big threats to the society. The onset of the problem with terrorism that was intensified by the September 11 attacks has paved the way to give a stricter treatment on hacking. Hacking is not anymore a matter of expressing a statement. Today, it has become a dilemma that can become a matter of national security (Shea, 2003). As such it has become imperative for the government to be involved more than ever in this problem. Government intervention might just be the best way to secure the resolution in this dilemma over hackers. It might be that due to the circumstances in committing hacking the offenders cannot be completely kept away from the temptation. Yet, there are still options to minimize the occurrence of the threat. Before the onset of the new millennium, the relationship between the security agencies of the state and the various companies in the industry was very unstable still. There were laws that target the offenders. However, there were some difficulties at this point. Proper coordination and cooperation between the government agencies and companies used to be difficult to achieve because of the different aims between the two. At some point, there were claims that many private companies used to be placed in a very disadvantaged position as the 'intelligence' gathered by the government are not extended to them (Drumheller, 1999). Today, it is claimed that many government intelligence agencies are taking over the matter to insure the safety of a nation. It is possible to trace and capture a hacker, although this whole system can result to a battle among parties who can manipulate the technology to serve their purposes. Presently, there are various efforts and measures already to counter any of the efforts coming from the hackers. These measures range from providing stricter access, more secured processes and even coming up with complicated systems. Many industries, companies and even household today depend on information and communication technology. Policies of governments are made to focus on protecting the critical institutions of the country from being vulnerable to any of these attacks. From the Computer Fraud and Abuse Act in 1984, United States today has their Homeland Security Act that specifically mentions the 'critical infrastructures' (Shea, 2003). Societies recognize the 'critical infrastructures' or those public necessities like telecommunications, banking and energy supply that depend wholly or to a large extent on computer systems (Radvanovsky, 2005). Today, 'critical infrastructure protection' or CIP activities are being developed and implemented to ensure the stability of important systems. Human, physical and technological resources are being utilized to complete the effort against the security threats. These methods are aimed to mitigate if not completely dissuade any of impending attacks from hackers and terrorists (Shea, 2003). Conclusions Hackers may have had their moment in history when they offered the people a choice in a system with an impending threat of oppression. In this regard, there are people who appreciated them. In this generation, such is not the case anymore. Computer skills that are utilized to get the better out of people who simply go on with their day-to-day lives are not to be bragged about. No reason or explanation would suffice in cases where ordinary people and national security are at stake. There is no dignity in depriving another person of his or her means to proceed with the respective work, especially in this time when processes depend on information and communications technology. It even gets worse when fraudulent acts are perpetrated. These are not doings of people with principle. It is just another case by an offender. As such, it is only imperative that policies and laws are strongly implemented to respond to the problem. One must assert for the rights that people deserve against the offenders. References Drumheller, M. (1999). Hackers intensify fears of industrial espionage. [online]. National Defense Magazine. Available from: [Accessed 28 July 2006]. Graham, P. (2004). Hackers and painters: big ideas from the computer age. O'Reilly Hollinger, RC. (1991). Hackers: computer heroes or electronic highwaymen. Computers & Society, 21(1), p.6-17. Levy, Steven. (1984). Hackers: heroes of the computer revolution McPartlin, J. (2006). Hackers find backers: computer crime is now a game for professionals. Are companies prepared to respond" CFO Magazine, January 01. Scambray, J., McClure, S. and Kurtz, G. (2000). Hacking exposed: network security secrets & solutions. 2nd ed. McGraw Hill. Shea, Dana. (2003) Critical infrastructure: control systems and the terrorist threat. [onine].Available from: [Accessed 27 July 2006]. Sophos. (2004) Phishing and the threat to corporate networks. Genesis. Available from [Accessed 27 July 2006]. Spafford, EH. (1989). The Internet worm: crisis and aftermath.Communications of the ACM 32, p.678-687. Zetter, K. and Brandt, A. (2001). How hackers hack: the tricks hacker use and what you can do to foil them. [online]. PC World. Available from: [Accessed 27 July 2006]. Appendix A Appendix B Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Hacking: A Modern Dilemma that Calls for Modern Solutions Essay”, n.d.)
Hacking: A Modern Dilemma that Calls for Modern Solutions Essay. Retrieved from https://studentshare.org/miscellaneous/1523782-hacking-a-modern-dilemma-that-calls-for-modern-solutions
(Hacking: A Modern Dilemma That Calls for Modern Solutions Essay)
Hacking: A Modern Dilemma That Calls for Modern Solutions Essay. https://studentshare.org/miscellaneous/1523782-hacking-a-modern-dilemma-that-calls-for-modern-solutions.
“Hacking: A Modern Dilemma That Calls for Modern Solutions Essay”, n.d. https://studentshare.org/miscellaneous/1523782-hacking-a-modern-dilemma-that-calls-for-modern-solutions.
  • Cited: 0 times

CHECK THESE SAMPLES OF Hacking: A Modern Dilemma That Calls for Modern Solutions

Voice over Internet Protocol Security Vulnerability and Risk Analysis

In modern times different means and mechanisms are being introduced for establishing communication with one another.... Types of calls possible with VOIP: Unicast calls: This kind of calling conversation involves the minimum number of parties, one at each end.... Multi cast calls (limited number of callers): This includes more than two users involved in a conversation at one time....
4 Pages (1000 words) Literature review

Ethical Considerations: Prejudicial Employment Practices

Part ii) Professional mission statement'To achieve excellence in leadership in the dynamic modern world'Part iii) Definition of key terms in decision making Decision-making is primarily concerned with approving the course of action to be taken in pursuit of certain goals to be achieved and is mainly practiced at the top management level within large organizations (Kleynhans et al 2007)....
8 Pages (2000 words) Case Study

Information Security: Security Policies for the User Domain

The author of the paper titled "Information Security: Security Policies for the User Domain" argues that user domain settings and guidelines are essential for any organization.... Policies such as SAP, AUP, and PAA are crucial to regulating user domains.... ... ... ... Security Assessment Policy is governing legislation that outlines Information Security policies, employee orientation, security incidents, and plans for new and existing users....
6 Pages (1500 words) Term Paper

The Interaction of Modern Computer Technologies

The paper "The Interaction of modern Computer Technologies" highlights the application of IT in businesses.... Monitoring telephone conversations, text messages, or emails to investigate various interests and aspects is now easy for companies and governments using modern technologies.... otably, computer ethics is significant and interesting since computers play special roles in modern society.... The most dominant ethical problems in IT include ownership disputes, cybercrime, data theft, and hacking, viral infection, unauthorized access to data, hardware, and software, responsibility for computer failure, and inefficiency (Berzai 1)....
6 Pages (1500 words) Essay

Business Ethics in Banking

The second dilemma involves the coercion of bank customers in order to provide prizes for a bank fundraiser.... Both of these issues create an ethical dilemma for Shelby and she is not sure what to do.... This research will begin with the statement that Ben Garrison is having a challenge with the new ethical policies at his office....
9 Pages (2250 words) Case Study

The Energy Dilemma of the UK

The first and foremost dilemma that the UK faces is in terms of energy security.... "The Energy dilemma of the UK" paper attempts to examine the proposition that the UK faces an energy dilemma.... The transportation sector is one of the largest contributors to greenhouse gases and the UK's commitment to meet EU guidelines poses a veritable energy dilemma for the country.... Bradshaw (2010) argues that the current energy system is in the genesis of climate change and until the world has a clean, secure, and affordable source of the energy system, it will continue to face the energy dilemma and the UK's position is in no way different....
10 Pages (2500 words) Coursework

Benefits and Problems with Student Teams

In the report 'Benefits and Problems with Student Teams' the author analyzes modern organizations, which face an array of issues and dilemmas that threaten to ground smooth running of these organizations as well as compromise the organizational culture and leadership.... ... ... ...
7 Pages (1750 words) Research Paper

Key Professional Roles and Responsibilities for a Modern ICT Professional

This calls for a proactive engagement by offering technological solutions that can create a balance in solving the development needs of society.... As the paper "Key Professional Roles and Responsibilities for a modern ICT Professional" outlines, humanity is faced with myriad development challenges....
13 Pages (3250 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us