The Dangers of Hacking Essay

The Dangers of Hacking Essay

Length: 1073 words (3.1 double-spaced pages)

Rating: Strong Essays

Open Document

Essay Preview

Electronic hacking - a silent perpetrator, breaking through our defenses unnoticed. These silent criminals are way more dangerous than they seem. It is one of the most easiest, yet most treacherous types of offenses. This can be done through the Internet, electronic devices, and even personal personal accounts can get hacked. There are numerous threats that hacking brings to our world today. Despite this appalling fact, there are measures we can take to prevent it. Electronic hacking can be a deadly in many ways, but there are ways to prevent being affected.

To begin with, on of the most common forms of hacking is done in a network that connects us all: the Internet. Through the Internet, social networks such as Facebook and Twitter have been hacked. In fact, the Syrian Electronic Army was able to hack the Cable News Network (CNN)’s Facebook and Twitter accounts (“Syrian Electronic Army Targets CNN.”). Social networks are not the only Internet related targets, though. You and your privacy may be at risk, too. Some casual websites that seem harmless actually can be a virused website with hackers. You may think that a site that has a secure Hypertext Transfer Protocol over Secure Socket Layer (HTTPS) connection is safe, but it could still be a dangerous site, since the HTTPS at the beginning of a Uniform Resource Locator (URL) only signals that the owner paid for a security certificate (“Chrome Bug Allows Sites to Listen.”). This means that it can still be hacked or hack you. Furthermore, certain sites that have a legitimate purpose sometimes are actually designed to hack your computer. These websites work by taking advantage of privileges and errors in web browsers. One of such incidents is shown through Google Chrome. Google ...

... middle of paper ...

...anie. "Mass Hack Affects Almost 2 Million Internet Accounts." USA Today. Gannett, 5 Dec. 2014. Web. 04 Feb. 2014.
Goodin, Dan. "Speech Recognition Hack Turns Google Chrome into Advanced Bugging Device." Ars Technica. Condé Nast, 2014. Web. 04 Feb. 2014.
Hacking Tip: Password Cracking with Cain & Abel. YouTube. YouTube, 02 Mar. 2013. Web. 11 Feb. 2014.
"IPhones Can Be Hacked While Charging." USA Today. Gannett, 12 Nov. 2013. Web. 31 Jan. 2014.
Perlroth, Nicole. "The Year in Hacking, by the Numbers." Bits The Year in Hacking by the Numbers Comments. The New York Times Company, 2014. Web. 05 Feb. 2014.
"Syrian Electronic Army of Hackers Targets CNN." The Times of Israel. THE TIMES OF ISRAEL, 24 Jan. 2014. Web. 31 Jan. 2014.
"Threat Matrix: Malware and Hacking Pose Dangers to Medical Devices." Healthcare IT News. Healthcare IT News, 24 May 2013. Web. 05 Feb. 2014.

Need Writing Help?

Get feedback on grammar, clarity, concision and logic instantly.

Check your paper »

Ethical Hacking Essay

- Ethical hacking, in my opinion, is just as much as an oxymoron as ‘constructive criticism’. Before I go on to show that ‘ethical hacking’ is but an oxymoron only in the literal sense, it is essential for one to understand the words ’ethical’ and ‘hacking’ - origin, meaning and the misconception. ‘Ethical’ can be defined as ‘working with high professional morals and principles’. The original hacker was a person who liked to tinker with software and hardware alike, enjoying and exploring the way the things work....   [tags: Ethics]

Strong Essays
843 words (2.4 pages)

Essay about The Dangers Of Police Violence

- Gone are the days of Andy Griffin and Barney Fife type of policing where either they didn’t carry a gun or carried a gun with the bullet in the shirt pocket. Those were the times when crime was low or almost nonexistent. A time when people didn’t have to lock the doors on their homes or cars. Currently, society seems to be going back to the western days, when almost everyone carried a gun and was prepared to use it if necessary. Presently, police are being hunted like animals in the woods and killed by crazed gunman sometimes for unknown reasons....   [tags: Police, Crime, Illegal drug trade]

Strong Essays
791 words (2.3 pages)

How Hacking Has Historically Been Associated With Shady Behavior Or Criminal Connotations?

- Hacking has historically been associated with shady behavior or criminal connotations. It is very rare that a person condones hacking or thinks of it as anything other than a crime. However, in his article “Academic Freedom and the Hacker Ethic”, Tom Cross challenges us to redefine a hacker and what they actually do. He forces the audience to think as he states that “knowing how to do something that might be harmful is not the same as causing harm” (Cross, 38). Using this powerful statement, Cross uses his article to give the reader a new take on hacking....   [tags: Human rights, Ethics, Freedom of speech, Hacker]

Strong Essays
970 words (2.8 pages)

Essay on Dangers of the Internet

- Dangers of the Internet There are many pitfalls and perils on the Internet. Some of them are easy to avoid while other are not so obvious. Some of the Pitfalls and perils are annoying, while others are deadly to your computer. Still others are humorous and entertaining. There are many dangers on the Internet. This paper will try to cover some of them. The biggest dangers of the Internet are virus. Viruses are small programs that "infect" computers. Most viruses are made to "steal" and or "destroy" data stored on the infected computer....   [tags: Expository Essays]

Strong Essays
1017 words (2.9 pages)

Essay about Is Personal Privacy Dead?

- Have you ever felt violated. Like somebody knew too much about you that they didn’t need to know. Or have you ever felt like someone was watching you. As if somebody knew your every move. Most people don’t normally feel this way; most people feel safe in their general surroundings. Although with the constant use of technology in today’s era, it’s time to ask: Should we, as American citizens, feel as safe as we do. Personal privacy is such a simple phrase for such a complex idea. The definition given in the Merriam-Webster’s dictionary of privacy is, “the quality or state of being apart from company or observation.” And “personal” meaning, “Relating to the person or body.” In other words: set...   [tags: technology, privacy, hacking, computer]

Strong Essays
1024 words (2.9 pages)

The Dangers of Cyber-Terrorism Essay

- In the future, cyber crime will become the leading threat to the safety and security of the American people. Experts on cyber crime agree that cyber crime is an issue that needs to be focused on more in-depth because the wide-spread use of computers by the global economy has made the use of computers and internet vital to everyday life (Siegel, 2009; FBI, 2011). There are 3 major types of cyber crime which includes: cyber fraud, cyber vandalism, and cyber terrorism (Seigel, 2009; Thio, 2010). Cyber terrorism, the more dangerous of the 3, is defined as the use of digital equipment to bring down a country by tapping into its computer based programs and dismantling its infrastructure which incl...   [tags: Terrorism Without Borders]

Strong Essays
1452 words (4.1 pages)

The Dangers Of Cyber Terrorism Essay

- available to everyone. This is great for advancement of programs, but awful for their security. For example, in the article Huston states that under the current IPv4, which is relatively small at 4 billion addresses, it would take just 5 minutes for a complete scan of all addresses to take place. However, under his and others highly recommended change to the IPv6, a scan of the entire system of 340 undecillion addresses would take 41 thousand years. The IPv6 is vast, which means there will be much more privacy than currently possible with the IPv4....   [tags: Developing country, Developed country, Internet]

Strong Essays
1159 words (3.3 pages)

Ethical Hacking: The Different Types of Hacking Essay

- For much of the new millennia, computer network and security administrators have faced an ever-growing generation of evil, “Hackers.” Hackers wreak havoc on computer networks that do not have proper protection in place. They steal your information and sell it to the highest bidder, not thinking about what it would do to the person or company that they hacked. Let us take for instance, Edward Snowden, who is currently in Russia seeking asylum from the United States. Mr. Snowden illegally hacked the CIA network, stole classified documents, and sold them to the highest bidder....   [tags: inside, outside, hacking, ethical]

Strong Essays
819 words (2.3 pages)

Essay on Staying Safe from Cyber-Crime

- ... Sid Kirchheimer states in his research on the matter: “Those self-described 'African kings' who offer to make you a millionaire by helping move an overseas fortune into the safety of your bank account are old hat. Really old.” In another Newspaper named USA Today is an article called “Scam calls: Pay up or be arrested.” explains a ploy where the victim receives a call from the scam artist pretending to be local police asking for a fee to be paid through wire transfer or the victim will face charges These schemes are almost classic nowadays and at most times seem far too obvious to fall for....   [tags: hacking, internet fraud]

Strong Essays
1429 words (4.1 pages)

Essay about Ethics of Computer Hacking

- Hackers: Control and Property The ethical issues surrounding hacking, stem from several sources mainly dealing with order and control, and information ownership. What is difficult to decipher from all the media hoopla surrounding the terms, "hacker" and "hacking" is both the simultaneous sensationalism and the condemnation of said activities. Of course just recently, even a movie was made and was appropriately called Hackers. The term and all that it implies has truly entered our popular consciousness when Hollywood has made a box office movie on it....   [tags: Hacker Hacking Computer Technology Internet]

Strong Essays
857 words (2.4 pages)