Computer Hacking Epidemic

Computer Hacking Epidemic

Length: 1383 words (4 double-spaced pages)

Rating: Excellent

Open Document

Essay Preview

More ↓
Computer hackers could arguably be the next epidemic in America and as the world becomes more and more reliant on computers the computer hacking industry is greatly rising to dangerous levels. With such hackers as Kevin Mitnick, who is known as a computer terrorist, computerized information isn't safe any more. Kevin is known as the most high-profiled computer criminal and responsible for reaping the most havoc in the computer world today. He considered this an easy and fun task. He finally got caught and was thrown into prison, but once he got out nothing changed. Kevin stated that as long as the technology is there it just calls to people to break into it.
Computer hackers usually start off young, thinking that it is nothing but a little harmless fun. But as they get older, they realize it has turned into an addiction. The definition of a hacker according to the "Hacker's Dictionary", is a person who enjoys exploring the details of program and how to stretch their capabilities. The Internet is just another playing field. Hackers regard hacking as a game in which their mind is up against that of the system designers. The Internet allows the hackers to take files, programs, passwords, and other information from users that are surf the web. They use this as a tool to make it easier to beat the system. There are three types of hackers, one with good intentions, also known as an ethical hacker, but gets slapped in the face due to the bad reputation of others, there are the hackers with bad intentions, and there are the hackers that fit in between. The bad hacker category is the largest by far. A bad hacker's motives are to punish someone or retaliate against the owner of a computer system. Computer terrorists fall under this category. Some bad hackers may also hack just to challenge the programmer. The hacker feels that if they can break into a program then they are much more superior to the person who actually wrote the code. They can feel so superior that they might enter a virus to eliminate a program that was not worthy of their abilities. One of the other many goals of a hacker is to steal passwords. Hackers can steal your password in about four different ways. Intercepting your password through email is not that difficult.

How to Cite this Page

MLA Citation:
"Computer Hacking Epidemic." 26 Feb 2020

Need Writing Help?

Get feedback on grammar, clarity, concision and logic instantly.

Check your paper »

The Past, Present And Future Of Computer Hacking Essay

- Abstract Society relies heavily on technology for many things, but our use of technology opens us up to become victims of cybercrimes, like computer hacking. Hackers can be divided into three main categories: novice, intermediate, and elite. Hacking has been in the information technology (IT) field for a while. The first hackers appeared in the nineteen sixties and hackers have continued to make progress since then. People hack for a variety of reasons including ego, fun, knowledge, and profit. The first major hacking program, SATAN, caused controversy in 1995, and numerous hacking programs exist today....   [tags: Computer Network Security hacking]

Free Essays
1857 words (5.3 pages)

Essay about Ethics of Computer Hacking

- Hackers: Control and Property The ethical issues surrounding hacking, stem from several sources mainly dealing with order and control, and information ownership. What is difficult to decipher from all the media hoopla surrounding the terms, "hacker" and "hacking" is both the simultaneous sensationalism and the condemnation of said activities. Of course just recently, even a movie was made and was appropriately called Hackers. The term and all that it implies has truly entered our popular consciousness when Hollywood has made a box office movie on it....   [tags: Hacker Hacking Computer Technology Internet]

Research Papers
857 words (2.4 pages)

Essay on Ethical Computer Hacking

- Have you ever been a victim of a cyber crime. Something as simple as a weird pop up that won't go away. Or maybe something a little bit more serious like your personal web page gets hi-jacked. All this "malicious" damage that causes you much grief isn't so much the work of a hacker, per se, but more the work of a "cracker" or a "script kiddie". Now you're confused right. Well let's just say everyone who knows how manipulate a computer isn't doing it on bad and evil terms, like writing a virus to deploy on a certain date to permanently delete certain file extensions....   [tags: Hacking Computer Security]

Research Papers
980 words (2.8 pages)

The Escalation Of Computer Hacking Crimes Essay

- The Escalation of Computer Hacking Crimes The advancement of computer technology makes the world easier place to live by facilitating the fields of science, medicine, and education. Although computers benefit us from many aspects, they also have negative implications. Many criminals use the computer to take or alter data, and to gain unlawful access of computers, by using computer worms, viruses, and Trojans. Which has posed new challenges for the government and the society. Due to the versatility of the computer, drawing lines between criminal and non-criminal behavior regarding its use can be difficult....   [tags: Computer, Personal computer, Malware]

Research Papers
1504 words (4.3 pages)

Essay on A Calculator Sized Computer Memory Hacking

- a “calculator-sized Computer Memory Hacking Computer memory hacking is the exercise of improved computer hardware and software. To achieve goal outside of the maker’s normal purpose person who participate in computer hacking deeds are usually called hackers. Although some hackers aren’t concerned about the emanation of their action there is some dispute about the truth that hacking has different negative effects. Business and governments pay a huge amount of money to avoid damage from hacking. Hacking on large scale can affect massive website damage, a long lasting inconvenience computer hacking is largely common between teenagers and young adult....   [tags: Computer, Computer security, Hacker, Computing]

Research Papers
1184 words (3.4 pages)

Essay on Annotated Bibliography On Computer Memory Hacking

- Computer Memory Hacking Pamela Riddle Professor Patricia Riley CIS 106 November 20, 2014 Technology continues to evolve exponentially. However these technological advancements continue to pose a threat to both individuals and information resources of companies and governments. There is therefore the need to protect one’s data and information due to the emerging threats and risks. Hacking is where third parties create a backdoor version of a hardware and software so as to manipulate or unlock hidden functionalities on a machine....   [tags: Computer data storage, Computer, Malware]

Research Papers
902 words (2.6 pages)

Key Events in The History of Computer Hacking Essay

- When the public hears the term hacking, they often think of theft, defacement, crime, and other illegal activities. Nowadays, this view is correct to some degree. It is appropriate to say that multitudes of hackers are malevolent; however, this is the 21st century. We are the most technologically advanced generation. Everyone either has a smartphone, computer, or a tablet – frequently even all three. The view of hackers has changed drastically over time; hackers are now viewed as criminals, but that has not always been the case, countless hackers are in-fact harmless, curious individuals looking to make a difference....   [tags: technology, computers, operating system]

Research Papers
1359 words (3.9 pages)

The Dangers of Hacking Essay

- Electronic hacking - a silent perpetrator, breaking through our defenses unnoticed. These silent criminals are way more dangerous than they seem. It is one of the most easiest, yet most treacherous types of offenses. This can be done through the Internet, electronic devices, and even personal personal accounts can get hacked. There are numerous threats that hacking brings to our world today. Despite this appalling fact, there are measures we can take to prevent it. Electronic hacking can be a deadly in many ways, but there are ways to prevent being affected....   [tags: Electronic Hacking Essays]

Research Papers
1073 words (3.1 pages)

Hacking Truths Manual Essay

- Hacking Truths Manual Welcome to another Hacking Truths Manual. This time I have a collection of Tips and Tricks which no body normally knows, the secrets which Microsoft is afraid to tell the people, the information which you will seldom find all gathered up and arranged in a single file. To fully reap this Manual you need to have a basic understanding of the Windows Registry, as almost all the Tricks and Tips involve this file. Important Note: **************** Before you read on, you need to keep one thing in mind....   [tags: Hacking Hackers Computers Software Essays]

Free Essays
5247 words (15 pages)

Essay on Computer Hacking

- Computer Hacking Precis of 'Who's reading your E-mail" The article exposes the vulnerability of computer data and of corporations with the popularity of the Internet. The Internet can allow hackers access to any computer in the world, with understated ease. Break-ins can go virtually undetected. Major corporations and government security departments have acknowledged that hacker break-ins are out of control. Some companies are too fearful to join networks because of this. Software programs brought out to deal with the growing problem, such as firewalls, are no longer totally effective....   [tags: essays papers]

Free Essays
2133 words (6.1 pages)

Related Searches

This is by far the easiest method because all they have to do is take the email as it is being sent to you. Hackers can also use a program called a password cracker to actually learn you password. There are two types of theses but both have their own flaws. The first checks every password possible from the entry site. The second uses a program that goes in and reads the passwords off one by one. The problem with both is that you have to get the cracker into the site, undetected, you must also cover you trail. Some prefer the manual method first. There are actually lists of a 100 or more most-used passwords. Hackers have reported that, a simple password that appears in the English dictionary will take about an hour or less for a hacker to crack. This is not considered a long time to a hacker. Third, they use what is called web spoofing. This is the most dangerous because they see what ever you are doing. They can get you passwords plus any other information you might have. This web spoofing is caused by a middle man who can redirect information from your page, to his page, to the page you were sending the information to. The middle man sees all. This is above all the easiest way to get any information that they might want or need. The last method is through Java. Through a program they can hack into a computers hard drive through your Java program. That is why if you can avoid keeping your passwords on your hard drive do it. Some people keep their passwords on three by five cards and store them which is much safer. The best method to securing yourself is always backing up files; that way if a virus or hacker crashes you computer you will be safe. Another very safe method is to change your password often and don't use the same password for everything. If they already know another one of your passwords, they will try them first. Consider rotating your passwords, just make sure they are not available on you hard drive. In the long run it will be safer to go through the trouble then risk your password being seen.
They use web spoofing to look at a person's credit card numbers while they type them in. Rule #1, nothing on the internet is secure, even if it says it is. This is considered to be the golden rule of safety on the Internet. Many people think that the internet is safe but there is always that little chance that someone could be watching. The novice computer hacker usually doesn't try anything as challenging as credit card fraud of password stealing. They usually are just pranksters looking for a good time. They are the ones who often release computer viruses. Theses viruses are dangerous because they can erase, change files or can even disable computers access to the internet. These viruses are starting to become more of a nuisance. The release of the love bug virus is a good example of this. It is suspected that a young adult had released this just to see the effects. This virus steals the passwords and deletes certain information of your machine. This type of virus also was created to spread from one person to all of the people in their computer address book throughout their email. The computer specialists working for the government have to learn how to solve this problem. Good hackers do exist; they are the ones who work for the government. They are also the ones who use their knowledge to try to stop to bad hackers from striking again. Their knowledge is used to try and outsmart the enemy. Their job is to try and predict what kind of viruses will be made as well as the existing viruses. They try to get in the mind of their evil counter-parts. They learn to explore what is going on in the hacker's brain. Good hackers try to eliminate viruses and find ways to stop people from uploading them. Their goals are to write software to prevent such occurrences. They are hired by companies to find safety measures that will help the company. Web servers are introducing new software that is close to being hacker-proof. These good hackers are essential for the survival of technology and the Internet. Hackers will be around no matter what happens. There will always be loop holes that the hacker can break into. It is a constant war between good and evil. The government and other companies will spend millions and millions of dollars each year just to try and keep their information safe. This is one thing that our tax dollars go too. There are underground hacker groups that hack just for the fun of it. Because they are "underground" police and government agents have a hard time tracking them down. All hackers are linked together through their hobby even though they never meet each other personally. On occasion you might even have a team of hackers working together. This is not very common but can happen when the job is too big for one hacker alone. But more often than not the hackers are soloists. It is been said that when hackers work together they get caught more often. Hackers will always do their work just like doctors will always treat patience. With the growth of technology come new threats, and new problems. This will continue to be on the rise due to advances in the world. Millions and millions of dollars will be put to end this but this will not work because new ways of hacking will always be made.
Return to