Once You Get Hacked, You Never Go Back

2048 Words5 Pages

Is there such a thing as good hacking? Yes, it may sound like an oxymoron but it does exist. Computer hacking is the practice of altering computer hardware and software to achieve a goal different from that of the creator’s original purpose. The people who participate in these activities are called hackers. These hackers cause a lot of complications to corporations and personal owners with malware and hacking attempts. According to Verizon’s Business 2010 Data Breach Investigations for the year of 2009, hacking attempts and malware were the two and three spots in corporate data breaches. About forty percent of the breaches were due to hacking. These actions are caused by the “black hat hackers,” who like to break into companies to show their security system has flaws. Hackers use security exploits that help them take advantage of a known weakness. Corporations must hire high tech security teams in order to protect themselves from hackers, but they might have to hire a reformed hacker or two to get the job done.

There is a very long history of hacking that has dated back to when text were first becoming scripted. Hacking originally began when text first became scripted and was put up on Egyptian walls called hieroglyphics. Hieroglyphics were encrypted messages that people put up to hide valuable secrets from enemies. Researchers believe Egyptian hieroglyphs came from the Sumerian script, which was the earliest known from of written expression. The Sumerian script consists of a combination of logophonetic, consonantal alphabetic and syllabic signs. Hieroglyphs are modified Sumerian scripts in which they have phonetic glyphs, logographs and determinatives. When the writing of these became more and more common, simplified forms of ...

... middle of paper ...

...ient Egypt - Gods, Pyramids, Mummies, Pharaohs, Queens, Hieroglyphics, History, Life in Ancient Egypt, Maps. Web. 15 Oct. 2011. .

Editors, Focus. "The History of Hacking." Focus - Connect with 1000s of Leading Business Experts. Get Quality Answers to Your Business Questions. Web. 13 Oct. 2011. .

Kreider, Aaron. "Ambiguous Definitions of Hacker: Conflicting Discourses and Their Impact upon the Possibilities of Resistance." Campus Activism. Web. 15 Oct. 2011. .

"Timeline: A 40-year History of Hacking - CNN." Featured Articles from CNN. 19 Nov. 2001. Web. 14 Oct. 2011. .

Open Document