StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Hacking Exposed, Underlying Motivation - Essay Example

Cite this document
Summary
The paper "Hacking Exposed, Underlying Motivation" states that the criminal act is an opening call for an improvement in the computer security of high-profile and sensitive organizations to ensure that their systems are ultimately foolproof and safe…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91% of users find it useful
Hacking Exposed, Underlying Motivation
Read Text Preview

Extract of sample "Hacking Exposed, Underlying Motivation"

Jonathan James, 15 years of age, hacked the following organizations: NASA, Defense Department, and the Marshall Space Flight Center. The resulting damages were: $1.7 million in software stolen from NASA; viewing the Defense Threat Reduction Agency server, the agency of the Department of Defense; and “downloaded the proprietary environmental control software for the International Space Station — the programming that controlled the temperature and humidity in the station’s living space” (What’s the latest, 2010, par.1). Initially, James was “banned from recreational computer use and was slated to serve a six-month sentence under house arrest with probation. However, he served six months in prison for violation of parole” (IT Security, 2010, par.7).

Underlying Motivation
It was indicated in the article that James hacked computers for fun. He was exposed to computers at a very young age. His father remembers James as “a passionate computer geek, who started playing with the family PC at the age of 6 and switched his computer from Windows to Linux in middle school” (What’s the latest, 2010, par. 8).
• Based on the six categories of hackers presented in your textbook on page 93, how would you categorize the hacker in your case? Why? (Larry, you said you would take care of this portion).

Punishment
Due to the tender age of James, at 16, when he was sentenced for the crimes committed, what could have been a 10-year sentence of incarceration for an adult for the crime, he was only restricted from using the computer and was on house arrest with clear probation.

Given the sensitivity of the organizations he hacked, he should have been given a more stringent punishment in terms of an extended period of incarceration (or house arrest, for that matter). Or, since he has proven to have the intelligence and the capacity to intrude into sensitive software of top organizations, one of these organizations could have used his potential to productive use. By merely letting him go after the punishment, he was again suspected of “being part of the conspiracy responsible for the largest identity theft in U.S. history. He was found dead of a self-inflicted gunshot wound in his home on May 18, 2008, less than two weeks after agents raided his house in connection with a hacking ring that penetrated TJX, DSW, and OfficeMax, among others” (Whats, 2010, par.6). Ultimately, death was the punishment for his crime.

Looking Inside the Box
The crime could have been deterred by a more effective and serious computer security system. As averred by James, “The government didn’t take too many measures for security on most of their computers,” James told PBS’s Frontline at the time. “They lack some serious computer security, and the hard part is learning it. I know Unix and C like the back of my hand, because I studied all these books, and I was on the computer for so long. But the hard part isn’t getting in. It’s learning to know what it is that you’re doing.” (What’s, 2010, par. 4). Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Hacking Exposed Essay Example | Topics and Well Written Essays - 500 words - 1”, n.d.)
Retrieved from https://studentshare.org/miscellaneous/1573290-hacking-exposed
(Hacking Exposed Essay Example | Topics and Well Written Essays - 500 Words - 1)
https://studentshare.org/miscellaneous/1573290-hacking-exposed.
“Hacking Exposed Essay Example | Topics and Well Written Essays - 500 Words - 1”, n.d. https://studentshare.org/miscellaneous/1573290-hacking-exposed.
  • Cited: 0 times

CHECK THESE SAMPLES OF Hacking Exposed, Underlying Motivation

Process Theories of Motivation

The paper "Process Theories of motivation" discusses that the process theory of motivation is effective in providing valid, reliable, and predictable explanations for productive behavior in most situations, and encourages people in a positive manner to achieve organizational goals.... Performance related to resources and financial performance in any organization is closely linked to the performance of the human resources, and therefore motivation plays a crucial role in performance management....
19 Pages (4750 words) Essay

Exploring The Dark Side. Review of hacker sites

The intent to expose, as Gold (2001) contends, is not accompanied by an underlying criminal or financial motivation but simply by the determination to prove that the security systems which companies have invested large amounts of money in are, indeed, flawed and easily penetrated by professional hackers.... thorough review of four hacker websites, those being The Hacker Quarterly Magazine, Cult of the Dead Cow, I Hack Stuff and Black Hat Convention, seems to suggest an antithetical purpose to hacking than is popularly assumed....
4 Pages (1000 words) Essay

Management and Organization in Financial Services

Human nature has remained a constant: The same basic The same theories and principles of motivation obtain in the workplace.... his paper aims to discuss the concept and theories of motivation and seek to analyze how they apply in the workplaces of the US financial services industry.... Despite the fact that every individual is unique, certain underlying principles and theories of motivation can be applied by managers to enable them to understand as well as predict peoples responses to task challenges....
12 Pages (3000 words) Essay

Audiences and Fandom: Spectacle/Performance Paradigm

herefore, this study falls under the SPP paradigm, considering that it is a study that seeks to understand the behavior and motivation of 'diffused audience' on the internet, through the application of the theoretical framework of the spectacle/performance paradigm (SPP) (Gülnar, Balcı & Cakır, 2010:164)....
8 Pages (2000 words) Annotated Bibliography

Vulnerability in the Communication System

While using these versions, the company's PDF files were exposed to attacks and access by unauthorized individuals.... This case study "Vulnerability in the Communication System" focuses on the problem that the system run by the organization does not have necessary checks against information stored in PDF format because the company uses Adobe Reader and the Adobe Acrobat to access PDF files....
6 Pages (1500 words) Case Study

Analysis of Motivation Theories

The paper "Analysis of motivation Theories " is a great example of a research proposal on management.... There are many theories of motivation but this research will just focus on three areas, including self-determined theory (SDT); the hierarchy theory, and the two factors (hygiene).... The paper "Analysis of motivation Theories " is a great example of a research proposal on management.... There are many theories of motivation but this research will just focus on three areas, including self-determined theory (SDT); the hierarchy theory, and the two factors (hygiene)....
17 Pages (4250 words) Research Proposal

Hacking Strategies and Online Security Measures

This paper 'hacking Strategies and Online Security Measures' is aimed at identifying the various ways hackers use to penetrate computer systems, with the particular focus on the use of malware, social engineering tactics, cyberespionage, and advanced persistent threats (APT).... This paper focuses on the four main hacking strategies, which include the use of malware, social engineering tactics, cyberespionage, and advanced persistent threats (APT).... hacking computer systems has become almost common practice in the modern business world, with media reports reporting hacking instances almost on weekly basis....
10 Pages (2500 words) Research Proposal

Relationship between the Staff Training and Their Performance Concerning the Bank

Besides, the collected data from the questionnaire creates little ground for the comparison needs and the underlying conclusions and recommendations are drawn.... The paper 'Relationship between the Staff Training and Their Performance Concerning the Bank' is an impressive example of human resources research paper....
7 Pages (1750 words) Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us