Nobody downloaded yet

Hacking and Hacktivism - Essay Example

Comments (0) Cite this document
1The phenomenon of hacktivism reveals the extent of the challenge of translating democratic discussion to the Internet. Hacktivism is, as the name proposes, the marriage of computer hacking and political activism.
Hacktivism is the emergence of popular political action, of the self activity of groups of people, in a cyberspace…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER91.6% of users find it useful
Hacking and Hacktivism
Read TextPreview

Extract of sample
"Hacking and Hacktivism"

Download file to see previous pages Social movements and popular protest are integral parts of twenty-first-century societies. Hacktivism is activism gone electronic (Tim Jordan, Paul A. Taylor, 2004).
According Utilitarianism, many people would perhaps consider themselves to operate according to a certain set of rules, whether stipulated by a cultural frame of reference or according to what they believe to be rational laws or instructions. To make more simply, utilitarianism considers intended actions as a means to an end (the maximization of basic good), but the approach known as deontological ethics.
The difference between a deontological ethics, the duty to obey a definite imperative that we believe must be collective, and a utilitarian ethic, that seeks to evaluate and amplify the amount of good in the world.
The hacker ethic, then, accomplishes three main functions: central to it is the idea of individual activity over any form of corporate authority or system of ideals; it also supports a completely free-market approach to the trade of information and admittance; lastly, it promotes the notion that computers can have a beneficial indeed, life-changing effect. Documents based on this hacker ethic have been socializing the Internet since eighties. As it is perhaps going too far to suggest that the hacker ethic be a precise formulation yet that it would welcome such a claim, it in any case clearly aspires to a deontological to a certain extent than utilitarian and relativism position: aphorisms such as 'all information must be free' (or, more commonly, 'all information wants to be free') are offered as universal maxims.
The hacker ethic is a permissive and individualist code, a particular brand of anarchy that, at its best, does some promises made by corporate capitalist meritocracy that are rarely achieved outside a cyberspace. A hacker ethic shows that cyberspace is a contested territory, and that the discussion of free-market economics and moderate democracy that has offered the foundation for much online activity is taken more critically than corporate oligarchies that pay lip-service to an open market that they look to monopolize: information wants to be free.
Hackers are not the only means of thinking through an ethics of a cyberspace, but they possibly symbolize the most considerable contribution made by cyberspace and new technologies to our daily lives and practices. The ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(“Hacking and Hacktivism Essay Example | Topics and Well Written Essays - 3000 words”, n.d.)
Retrieved from
(Hacking and Hacktivism Essay Example | Topics and Well Written Essays - 3000 Words)
“Hacking and Hacktivism Essay Example | Topics and Well Written Essays - 3000 Words”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document
Ethical Hacking
...Ethical Hacking 1. Threats There have been many cyber attacks in the past that have weighed heavily on the shoulders of the victims. Three of the many examples are described here. Black Hat Crackers worked to take advantage of computer systems, and Jonathan James has been a big name among black hat crackers. He was sentenced at the age of sixteen and told the press that all he did was for fun. One instance of his great hacking is installing a backdoor into a Defense Threat Reduction Agency server and hacking sensitive information and employees’ data. In June 2005, the computer specialist, Michael Haephrati and his wife Ruth, who belonged to London, were caught sending Trojan horse...
5 Pages(1250 words)Research Paper
Hacking Exposed
...? Hacking Exposed (College Hacking Exposed Adrian Lamo Adrian Lamo is a green hat hacker who hacked a seriesof high-profile computer networks including those of The New York Times, Microsoft, and Yahoo. However, his most notorious computer crime was committed against The New York Times in 2002 when he unauthorizedly accessed into its Times’ private intranet. According to Poulsen (2002), by this hacking, he got unauthorized access mainly into paper’s social security numbers, customers’ order details, and “WireWatch” keywords. The most notable element of Lamo’s hacking activity was that he could access a database of 3000 contributors. Similarly, he could...
2 Pages(500 words)Essay
Ethical hacking
...? 245CT: Ethical Hacking Word Count: 2,000 (8 pages) 245CT Ethical Hacking Lab Book work) Session 11 - Semester 2 Sur First Name: SID: Lab Day: Wednesday Lab Time: Lab: 11.00 – 13.00 AS236 & ASG22 This lab book constitutes 50% of your overall module mark for 245CT, so it is VERY IMPORTANT! Index 245CT: Ethical Hacking 1 1 245CT 2 Ethical Hacking 1 2 Lab Book (Coursework) 2 This lab book constitutes 50% of your overall module mark for 245CT, so it is VERY IMPORTANT! 2 Index 3 Coursework 4 Lab 2 - Essential TCP/IP tools 5 Note: Use right-click/Update Field/Update Entire Table/OK to refresh the index above when you have added a new lab to the lab book. This note will...
8 Pages(2000 words)Coursework
Email Hacking
...?Email Hacking Introduction Information is one of the most fundamental necessities of every individual in the contemporary age. People will access toinformation find plenty of opportunities of exceling in their academic and professional careers as well as their personal and social life. These days, the Internet is the fundamental source of information for people of all age groups everywhere in the world. Many companies e.g. budget airlines employ the Internet as their only means through which they conduct the business. This provides people with a good know-how of the use of networks as well as access to them have a great edge over others who do not have these resources. Accordingly, the more technically trained and informed people... are in...
9 Pages(2250 words)Essay
Ethical Hacking
...ETHICAL HACKING Ethical Hacking According to Raymond, the term 'Hacker' has a dual usage in the computer world. Originally, the term was defined as: HACKER noun 1.A person who enjoys learning the details of computer systems and how to stretch their capabilities-as opposed to most users of computers, who prefer to learn only the minimum amount necessary. 2. One who programs enthusiastically or who enjoys programming rather than just theorizing about programming (Raymond, 1991). From the above definition it is clear that, the original idea behind hacking has nothing malicious in its intent. According to me hacking is justified, provided the intent behind performing a...
2 Pages(500 words)Essay
Hacking Exposed
...Hacking Exposed Hacking Exposed In an article en d Jonathan James – 15 Year-Old Cybercriminal Who Hacked NASA published in the website What’s the latest? on June 20, 2010 revealed the criminal escapade involving hacking. The US Legal define computer hacking as “intentionally accesses a computer without authorization or exceeds authorized access” (US Legal, 2010, par. 1). Jonathan James, then 15 years of age, hacked the following organizations: NASA, Defense Department, and the Marshall Space Flight Center. The resulting damages were: $1.7 million software stolen from NASA; viewing the Defense Threat Reduction Agency server, the agency of the Department of Defense; and “downloaded the proprietary environmental control software... for the...
2 Pages(500 words)Essay
Ethical Hacking
.... It can be used to protect an organization against an attack because it spots out and potentially prevents intrusions that breach the system’s firewalls or those that occur behind the local area network (LAN) or the firewall (IATAC, 2009, p.3). Thus, IDS can provide organizations real-time or near-real-time monitoring of a host or a network and defend them from hacking. IDS and Detection of Footprinting stages IDS cannot always detect footprinting stages. The wrong results in an IDS are categorized into two kinds: false positives and false negatives (IATAC, 2009, p.4). False positives happen when an IDS wrongly sees a problem with benign traffic (IATAC, 2009, p.4). False negatives take place when malicious traffic is...
2 Pages(500 words)Essay
...Internet Security “Hacking” AFFILIATION: Table of Contents Table of Contents 2 Internet Security“Hacking” 3 Brief Introduction of Hacking 3 Motivating factors for hackers 4 Characteristics of hackers 5 Impact of hacking on society / Security on Internet 6 Security issues in electronic transactions 7 Number of Visa users worldwide 8 Facts and figures about electronic crimes worldwide 9 Real life examples of hacking 10 Protection measures against hacking 10 Conclusion 12 References 13 Appendix - Vocabulary 15 Internet Security “Hacking” Brief Introduction of Hacking With the advent of time and development...
12 Pages(3000 words)Essay
Cyber activism and hacktivism
...Cyber Activism and Hacktivism Cyber Activism and Hacktivism Cyber activism entails the use of internet to undertake ordinary activities while pursuing specific agendas or goals. Cyber activism does not disrupt other processes that other users may be undertaking. Hacktivism refers to a combination of hacking activities and activism. Activism as part of hacktivism refers to the fact that the user undertakes hacking activities with a specified goal in mind. Unlike actual activism, hacktivism seeks to invade a target site and disrupt normal activities (Denning, 1999). Hacktivism harbors ill intent while...
4 Pages(1000 words)Essay
Ethical hacking
... Press. McLaughlin, S., Podkuiko, D., Miadzvezhanka, S., Delozier, A., & McDaniel, P. (2010, December). Multi-vendor penetration testing in the advanced metering infrastructure. In Proceedings of the 26th Annual Computer Security Applications Conference (pp. 107- 116). ACM. Wilhelm, T. (2013). Professional Penetration Testing: Creating and Learning in a Hacking Lab (Vol. 1). Newnes.... [Penetration testing documentation] By Introduction The Xen show of virtual machines offered our understudies serverautonomy giving every learner control of a neighborhood arrangement and of a remarkable IP address on the "virtual" system for each one server so that people could work in groups, incorporating in separation taking in circumstances, and...
8 Pages(2000 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Let us find you another Essay on topic Hacking and Hacktivism for FREE!
logo footer
Contact us:
Contact Us Now
FREE Mobile Apps:
  • StudentShare App Store
  • StudentShare Google play
  • About StudentShare
  • Testimonials
  • FAQ
  • Blog
  • Free Essays
  • New Essays
  • Essays
  • Miscellaneous
  • The Newest Essay Topics
  • Index samples by all dates
Join us:
Contact Us