StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Hacking: Definition, Types, and Facts - Essay Example

Cite this document
Summary
This essay "Hacking: Definition, Types, and Facts" examines the theoretical and contextual perspective of hacking. It also examines the comparison of various types of hacking and evaluation with their interpretations. It further examines the social and political hacking of media…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.8% of users find it useful
Hacking: Definition, Types, and Facts
Read Text Preview

Extract of sample "Hacking: Definition, Types, and Facts"

Hacking By: Location Un ized and illegal activities that are perpetrated via computer are refereed to as computer crimes. An example of a computer crime is use of various techniques to corrupt or compromise data stored in a computer system. In particular, hacking involves network security compromising, interference with security network of computer system and creation of malicious software often regarded as viruses. However, hacking is a skill and not a sequence of command or operation as many may tend to think. It is also not a specified term since it varies from simply being invasive and annoying even up to illegal activities. Hacking can be dated back to 1978 in the earlier days of Bell Telephone Companies, where earliest mischief’s of application of modern community were experienced. However, at the moment it was not known as hacking. This paper aptly examines the theoretical and contextual perspective of hacking. It also examines the comparison of various types of hacking and evaluation with their interpretations. It further examines the social and political hacking of media. Introduction Hacking comes with different and conflicting definitions. For the purpose of this paper, Hacking is defined to “unauthorized access to a computer network” (Kumar, 2012, P.1). Hacking can also be defined as the use of various software methodologies using programming experimentation to achieve intended ill gain. According to Kumar (2012), hacking can be stated as unauthorized intrusion; hence the act of gaining access to a computer network with an absence of legal authority. The person who performs the act is a hacker. However, it must be noted that not all hackers are bad (Kumar, 2012), since the government and some huge companies use hackers to maintain their computer network security in order (Rogers 1994).Computer intrusion is regarded as unethical act (Doss, Smith &Yurcik, 2001), and there are laws that have been passed for purposes of prosecuting such acts (Spafford, 1992, p.7), hence it is regarded that once an individual uses his hacking ability to perpetrate a crime, he is deemed as a criminal (Doss, Smith &Yurcik, 2001). Numerous debates have sparked off in matters regarding to ethical hacking and crime intrusion (Doss, Smith &Yurcik, 2001, p.54). Ethical intrusion is associated with ethical hackers who tend to utilize their knowledge in hacking to improve the system (Doss, Smith &Yurcik, 2001). Conversely, illegal hacking has continued to enjoy triumph celebration from hacking community. History of Hacking According to Leeson, hacking has a long histology which can be traced back to 1960s when members of tech model rail road club in America hacked the control system of trains so that they could run faster than they were designed ( Leeson p. 3). Serious hacking activities were experienced in 1969 when Dennis Ritchie and Ken Thompson who were both workers at Bell lab created a fore runner operating system of open source which was named as UNIX. This was quickly adapted into a standard computing language. However, it can be inferred that this initial stage of hacking was not associated with illegal activities or cyber crimes. On the contrary, it improved the system by then rather than compromising computer network system (Leeuw & Bergstra, 2007, p.707). As explained by Leeson, by 1970s things had started to change, since hackers had started to realize some potential opportunities that could be translated into personal gains. Hacking activities were more directed to telephone system through an activity known as “phreaking” ( Leeson) Increase in affordability of personal computers, online world and spurred publicity in computer hacking led to the prevalent increase in 1980s (Jordan & Taylor 1998). Among critical development of hacking in this period was emergence of hacking gangs like 414 that constituted die hackers who hacked los Alamos National Laboratory (Knittel & Soto, 2003, 12). The laboratory was used for developing nuclear weapons. In addition, they also hacked into Sloan Kettering Cancer Centre in New York (Leeson). In 1984 the government of United States made it a crime for an individual to gainaccess to computer net work system illegally (Leeson). However, hackers’ activities are not limited to computer network breaking, since in 1988 the world witnessed a new type of hacking of its kind, where internet worm was created by Robert Morris. Later, Robert Morris was fined $10,000 and given a prison sentence of three years (Leeson). In addition, this was the first hacking activity directed towards the government witnessed in 1980s. In 1990s, hackers had started directing their activities toward bigdeals, where two Russian hackers stole$ 10,000 from City Bank and in response more serious similar hacking attempt were witnessed. It was during 1998 that United State government unveiled national information infrastructure protection centre. This center was designed to protect telecommunication, technological system and transport system from hacking threat. In the new millennium, the level of seriousness of hacking attacks increased with hackers creating “denial of service” type of hack which crushed network of large companies like yahoo. This translated to millions dollars loss for the yahoo company and other companies concerned. Hacking in these millenniums was a global phenomenon. An example is that in 2000 “ I LOVE YOU” virus is estimated to have impacted the global economy $ 9 billions (CEI 2002).Currently, most cases of hacking involve unauthorized access which constitutes security threat. Types of Hackers White hat hacking, this is nothing but using hacking techniques by tweaking them. White hat hackers can be referred as internet legend because always are looking for exploits with aim of fixing them (Kizza, 2009, p. 115). Good hacker are often referred as ethical hacker, (Doss, Smith &Yurcik, 2001) ethical hacker use information gained from hacking in improved security system, when they discover security flaws, they do not exploit it ,but rather disclose relevant information to the user of the affected system (Miche, 2001, p.34). Conversely, unethical hackers gain information and use it to subvert systems. Ethical hackers perform valuable service where they report security holes to computers users and programmers, where this information is used to patch those holes which strengthen vulnerabilities, (Miche, 2001, p.76) hence preventing intrusion by less benevolent hackers. Due to the fact that their is natural escalation of hacking or attack threat , yet no practical system that have been build is invulnerable attack including some paramount organization system where computer network is critical, they have demonstrated susceptibility to attack (Miche, 2001). Good hacker are involved in testing security flaws that are naturally attraction to hackers, hence they facilitate exposing and patching of vulnerabilities (Miche, 2001). Ethical hacking is evolving as potential solution to computer network compromise through fixing a system by first compromising it (Kilger, 2013). Blackhat Blackhat hacking, this are type of hackers who always has malicious motive, they try to compromise security system of a computer with aim of making profit. These types of hacker try to concentrate on weak parts of the internet user (FBI Computer Crime Survey Report, 2005). Social and Political Context of Hacking Motivating Factors Psychology and sociology is being applied in odder to understand criminal behavior related to hackers, a number of motivational factor have been identified through an interview with hacking community (Jordan & Taylor, 1992). There are different motives for hacking. According to Kigler (2010), there are six key motives that drive hacking and they are curiosity, ego, status, money, cause and money. According to Ryan (2006b), motivation varies across place and time such that a driving force in one country differs with a driving force in another country. Also, different people are motivated by different factors, hence making it difficult to identify a single motive that may lead to cyber attack. Entrance to social group: This issue can be traced back in 1980s where individuals who had developed a unique skill attracted attention from highly skilled peoples in the hacker community (Holt, 2007). The individual who have demonstrated high programming skills were integrated in the group of hacker in order to expand their hacking capacity (Meyer, 1989). An example, kilger et al (2004) identified a Russian hacker group which consisted of people with different programming skills and they worked together for the purpose of creating exploits and powerful tools with various application to various target (Holt, Sols & leslie, 2008). Curiosity: Hackers claimed to be addict to computer science and computer network, where they feel strong compulsion to hack. Curiosity about what they can find in world wide network and the more network system is securing the more unending search of hacking possibilities (Alexandra, 2013). Ego: it is another motive that contributes to hacking (kilger et al, 2004). This is where an individual generate respect and recognition from others due to their ability in noble hacking (Jordan &Taylor 1998). An Individual gains status by acquisition or access to sensitive information. An example is Kelvin Mitnick ability to hack and technical skill and ability to run from the hand of the made him gain status in the community of hackers (Holt, 2012, p.89) Money: According to Franklin et al (2007), increased independency on technological resources in both private and public sector with on going development of world wide web and increasing sensitive information that is available online (Franklin et al, 2007). This have resulted to hackers targeting retailers and financial institutions by use of pushing attacks (James, 2005, p. 63) ,hence increasing data compromise in a large scale where they are sold through open market to generate profit (Franklin et al, 2007). This information includes financial service product like bank account information, credit card numbers, and login information (Kilger, 2010). Cause: over the last decade their has been an increase in cause driven hacking (Halliday,2011) with an increased use of internet to express religious, political and nationalistic issues (Kigler2010). Malicious hackers apply their knowledge to engage in a number of attacks on behalf of their belief system aiming to influence policies or action for opposing groups (Denning, 2010). Like Anonymous group engaged in a series of attacks against MasterCard and PayPal, after cutting of financial services processing for wiki leaks website (Holliday, 2010). According to Halliday (2010), the group was expressing their dissatisfaction from practice of these companies after release of sensitive diplomatic information. Hacking As a Crime Computer hacking directed towards committing financial fraud is a serious offense that can not go unpunished. Federal laws describe computer hacking to be a process where an individual uses his computer or machine to have accesses to restricted information (Newman, 2009). According to Kumar (United States Department of Justice), doing hacking is regarded as engaging in illegal activity. However, individuals had started commenting about hacking as an illegal activity without proper knowledge about it. Information technology act was passed with the objective of promoting electronic secure environment like In electronic transaction and electronic communication. The acts also tend to set various authority levels to help and regulate information technology systems (United States Department of Justice). The information technology act also provide for establishment of Cyber Regulation Appellate Tribunal that decides appeals against order that are pass by adjudicating officer, since the act provide specialized adjudicate machinery that is bound to enhance decision making in respect to many qualities (Clarke, clawson & cordell, 2003,p. 45). Political Context of Hacking In politics, hacking has been described as hacking for political cause which involve hacking and activism which is referred as hacktivism (Samuel, 2001). Hactivists use knowledge in computer programming and network design to stage disruption in the internet which are politically motivated (Samuel 2001). These disruptions are usually in various forms like “denial of service” which compromise security of corporate sites, also theft and publication of private related information on the internet (Blake, 1994). According to Samuel (2001), hacktivist define themselves as a common community despite geographical and political diversity. They operate website, hold online discussion and even conferences, with this entire forum marked by fractious debate and strategies (Bidgoli, 2006, 173). Security Measures Computer system security is concerned particularly with preventing information and stored in or used within computer network systems from being stolen, altered or used I perpetrating criminal activities (Holts, 2007). The field is concerned with protection of electronic fund transfers which relates to property information (product designs, client lists, etc.), computer programs, and other computer related communications, as well as the protection from computer viruses (Ryan, 2006a). Fortunately, companies have the potential to protect themselves from most of computer breach through use of security range methods option available. Some of these measures are mainly designed in such a way they can either counter threats fro within the system or counter attack from outside the system (Kevin, 2001). Impact of Hacking The most expensive and hardly hit victim of hacking has been business industries. In 2003, virus creation cost businesses about $55 billions which was almost double amount of the amount inflicted in 2002 (Leeson). Most businesses are targeted for their customers and financial data and in most cases individuals who always perpetrate theses crimes are employees working within the business. They perform these crimes mostly because they are disgruntled or just because they are opportunistic (Brown, 2008, 14). Therefore, businesses loose billions of dollars resulting from hacking in additional to other computer breechings (Richard & Brown, 2001). However, the actual business cost can not be evaluated, since the effect of computer system breach by a hacker can be felt for many years after the attack (Sterling & Bruce, 1991). Computer net work system hacking can translate to loss of consumer confidence with the company. The cost of recovering from computer security compromise can last for a long period of time added the legal fees, reputation cost and investigative expenses (Sterling & Bruce, 1991) Conclusion Hacking is a new type of crime that is associated with increasing computerization and rapid growth in information technology (Narenndra, 2012, p. 99). Cyber crimes are increasing by bound due to increasing internet connectivity. Computer crime has become a daily event, where a computer crime occurs when one compromise with security of computer network in unauthorized way referred to as hacking. In today’s computer dependent society, hacking is a serious issue that attracts political, social and economical attention, hence it needs to be addressed by stronger measures and if hackers still succeed they should be severely punished (Ryan, 2006). Bibliography Alexandra Samuel. digital disobedience: hacktivism in political context .2001. Retrieved on April 4, 2013 From Blake, Roger.Hackers in the Mist. Chicago, 1994. Retrieved on April 4, 2013 From Brown, G. (2008). Social media 100 success secrets: social media, web 2.0 user-generated content and virtual communities ; 100 most asked mass collaboration questions. S.l, Emereo Pty Ltd.?]. Bidgoli, H. (2006). Handbook of Information Security Volume 2. Hoboken, John Wiley & Sons. http://public.eblib.com/EBLPublic/PublicView.do?ptiID=255385. Denning, Dorothy. Information Warfare and Security Reading: 1998. Retrieved on April 4 ,2013.From Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Issues in Contemporary media and cultural studies(Journal) Essay”, n.d.)
Retrieved de https://studentshare.org/miscellaneous/1619882-issues-in-contemporary-media-and-cultural-studiesjournal
(Issues in Contemporary Media and Cultural studies(Journal) Essay)
https://studentshare.org/miscellaneous/1619882-issues-in-contemporary-media-and-cultural-studiesjournal.
“Issues in Contemporary Media and Cultural studies(Journal) Essay”, n.d. https://studentshare.org/miscellaneous/1619882-issues-in-contemporary-media-and-cultural-studiesjournal.
  • Cited: 0 times

CHECK THESE SAMPLES OF Hacking: Definition, Types, and Facts

Computer Hacking

ccording to Webster's definition, the hacker is 'an expert at programming and solving problems with a computer' (Webster, 2003).... The other definition of the hacker by Webster is 'a person who illegally gains access to and sometimes tampers with information in a computer system' (Webster, 2003).... This research paper "Computer hacking" shows that technology has facilitated the shrinking of the globe into a global village where access to almost everything is not more than a matter of a click....
15 Pages (3750 words) Research Paper

Government Strategies to Cyber Networking in the U.K and Saudi Arabia

20 Defining types of terrorism Figure 2 p.... 32 types of Internet Users Figure 3 p.... Cyber Terrorism: Comparative Study of Government Strategies to Counter Ideological Extremism and Cyber Networking in the U.... .... and Saudi Arabia Omar M.... Alkahtani University Of Plymouth Supervisors: Dr Mohammed Zaki Ahmed Dr Ibrahim Elbeltagi 15/02/2011 Table of Contents Abstract 5 1Chapter 1: Introduction 6 1....
101 Pages (25250 words) Dissertation

Hacking with Hacktivism

This essay "hacking with Hacktivism" is about the marriage of computer hacking and political activism.... It is a combination of grassroots political protest with computer hacking.... hacking is typically an ethical issue.... The popular theory of ethics is ethical relativism that suggests the need for universal moral rights and wrongs to allow hacking to be taken place.... 4 Hackers should be judged solely by their skills at hacking, rather than by race, class, age, gender, or position....
15 Pages (3750 words) Essay

Hacking and Cracking

hacking started way back in the 19th century after the invention of telephones by Bell Company.... However, computer hacking that is currently widely known started one century later.... hacking was seen as a This means that the person performing hacking had to modify system operations to attain what they require or to perform unusual functions (Peterson and Bender, 2011).... Later in 1980s hacking and cracking where differentiated by the Massachusetts Institute of Technology (MIT)....
4 Pages (1000 words) Essay

Cyber Crime A Global Crime

Although cybercrime was in existence This paper attempts to present a brief overview of cybercrime, beginning with its varying definitions, how it evolved and became dangerous, its types, and past real-world instances.... This definition however is not completely representative of cybercrime.... A more extensive definition was given by the Council of Europe's Budapest Convention on Cyber Crime that defined cybercrime as – ...
14 Pages (3500 words) Research Paper

Ethical versus Unethical Hacking

However, the term's definition has two sides: the good side, which entails gaining knowledge about systems for purposes of enhancing security, and the bad side, which involves gaining illegal access to systems so as to steal or damage information.... The paper "Ethical versus Unethical hacking" highlights that the boundary between ethical and unethical hacking is slim, and it calls for qualities such as trustworthiness to ensure that system administrators do not use sensitive information maliciously....
10 Pages (2500 words) Research Paper

The Impact of Hacking in Todays Firms

This paper will define hacking, discuss the types and techniques of hacking, and give examples of companies that have been hacked.... types of hacking include password cracking, brute force, Denial of Service, Viruses, crimeware, and bots.... hacking is an activity that is a major concern for many organizations.... This paper tells that hacking is frequently perceived as a form of computer crime.... hacking entails amending features of a computer system to perform a different function that the computer was not intended for....
6 Pages (1500 words) Term Paper

Types of Hacking

The paper "types of Hacking" discusses that recent years have seen the development of a number of interesting developments which detail how the techniques of cyber intrusions and attacks may be used on a national level, executing of host applications, and specific malicious actions.... hacking is a specialized activity that requires a very specific skill set, a familiarity with computers, with multiple systems or networks, as well as a, relatively, advanced understanding of computer technologies (Howard, 1997)....
24 Pages (6000 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us