StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Hacking and Cracking - Essay Example

Cite this document
Summary
Hacking started way back in the 19th century after the invention of telephones by Bell Company. The workers hired by Bell Company started…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.4% of users find it useful
Hacking and Cracking
Read Text Preview

Extract of sample "Hacking and Cracking"

Download file to see previous pages

This means that the person performing hacking had to modify system operations to attain what they require or to perform unusual functions (Peterson and Bender, 2011). Hacking evolved after the invention of the fist computer in the 1950s and was widely changed and used to test the strength of systems. Later in 1980s hacking and cracking where differentiated by the Massachusetts Institute of Technology (MIT). According to MIT, hacking is ethical non-destructive performances while cracking is non-ethical performances aimed at destroying computer systems either by breaking, wiping out data or infecting the system with viruses or malware.

The 21st century description for hacking is based on the following terms. Hacking must follow safety measures, must not be destructive and must not have effect on any person emotionally, physically or mentally. Hacking is performed with the help of the following programming languages, telnet, Trojan horses and key loggers. Hacking with the use of Trojan horses helps the hacker to passwords. A Trojan horse is a kind of program that is only meant for hacking and not like viruses or worms. Viruses and worms replicate themselves and are meant for destruction of programs in the system (Peterson and Bender, 2011).

According to Syed (2004), hacking is an illegal act if a person does not have authority to perform such actions. Hacking operation can be performed on various systems such as emails whereby persons hack email. Hacking is also done by computer experts who are able to write programs or have wide knowledge of programming languages. Hacking is mainly performed to ascertain the strength of company’s security system. In this way, the organization can pin-point and correct the security flaws in the organization to avoid loss of data or computer virus infections.

Cracking is done with help of software. However, the person cracking must also have a bit of knowledge of programming

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Hacking and Cracking Essay Example | Topics and Well Written Essays - 1000 words”, n.d.)
Hacking and Cracking Essay Example | Topics and Well Written Essays - 1000 words. Retrieved from https://studentshare.org/miscellaneous/1627953-hacking-and-cracking
(Hacking and Cracking Essay Example | Topics and Well Written Essays - 1000 Words)
Hacking and Cracking Essay Example | Topics and Well Written Essays - 1000 Words. https://studentshare.org/miscellaneous/1627953-hacking-and-cracking.
“Hacking and Cracking Essay Example | Topics and Well Written Essays - 1000 Words”, n.d. https://studentshare.org/miscellaneous/1627953-hacking-and-cracking.
  • Cited: 0 times

CHECK THESE SAMPLES OF Hacking and Cracking

Domestic Violence in a Nutshell

This essay "Domestic Violence in a Nutshell" explains how domestic violence has been defined in various ways in the legal, social science, and psychology fields.... Within the legal field alone, the term carries a different meaning depending on whether state or federal law governs and whether a case arises in the criminal or civil sphere....
6 Pages (1500 words) Essay

Does Information Technology Matter

Institutions and corporations are transforming their book keeping and production from the earlier manual systems to the more sophisticated and efficient information… Questions has been raised on the significance of information technology but considering its definition which changes the meaning of time, it would be true to say that more can be achieved through IT than without it (Reynolds 2009 p 27)....
13 Pages (3250 words) Essay

Computer Crime and Safety Issues among Companies and Organization

Computer and cyber crime include:- hacking, copying of copyrighted material, theft and misuse of confidential information of someone… Using a computer as an instrument of the crime.... hacking is one common name meaning having unlawful access to another computer....
4 Pages (1000 words) Essay

Hacking the Accounting Information System

According to ( Smith,2012)“In simple terms computer Hacking and Cracking reflects, the intentional, unauthorized access to an organization's computer system”.... Today, the whole business works with internet facility hence the risk of hacking on accounting information system in high.... hacking is of growing concern as One of the companies which got hacked in recent times is Microsoft .... The Microsoft security response centre states the Microsoft Active Protection was a program that provide security for program that gives anti –hacking tool facility....
4 Pages (1000 words) Research Paper

Cracking time for different protocols

This effect occurs because high security protocols identify packet loss because of hacking and recover the required data.... SMTP, Running Head: cracking TIME FOR DIFFERENT PROTOCOLS cracking TIME FOR DIFFERENT PROTOCOLS By University nameCity, StateDate cracking Time for Different Protocols Different protocols affect the hacking time required to break.... These mechanisms consists of password-cracking mechanisms, protocol cracking, and manipulation instruments (Miltchev et al....
2 Pages (500 words) Essay

Fracking: the Process of Extracting and Drilling

Fracking is the process of extracting and drilling deep down to the ground followed by an injection of a high-pressure water mixture to the rocks with the primary objective of releasing the gas inside.... Sand, water and other chemicals are added into the rocks at high pressure,… Fracking is also termed as “hydraulic fracturing,” it is a vicious procedure that major organizations such as BP, Halliburton employ to remove natural gas and oil from the rocks deep down the earth....
4 Pages (1000 words) Essay

How Private Entities Help International Security

The paper "How Private Entities Help International Security" discusses that the world has changed with the changing times, and it is about time that positive developments also start taking place for the wellness of the different societies of the world.... hellip; The one statement that must remain supreme in the wake of adversarial times and shall by no means suggest that any entity has the right to invade peculiar zones which have been earmarked....
7 Pages (1750 words) Essay

Fracking Process Peculiarities

This work called "Fracking" focuses on hydraulic fracturing, the use of pressurized liquid to fracture the rock.... The author outlines the environment, economic, legal, political aspects of fracking, its advantages, and disadvantages.... From this work, it is clear about regulations and taxing in Pennsylvania, Ohio, and Colorado....
9 Pages (2250 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us