Information technology (IT) is evolving everyday and our day-to-day life is becoming more and more dependent on it. In this twenty first century, we cannot imagine ourselves without emails, online banking systems and health care systems and without World Wide Web. In other words, evolution of IT has given a modern, technologically advanced and convenient life to the society. But, over the time we are also observing explosive growth in the darker side of the IT - regarding hacking and cyber crimes. Activities like unauthorized computer intrusion, denial of service (DOS), stealing computer passwords and secure data; causing damage to computer systems and databases and causing damage to individuals/society are not very rare these days.
As we go further on this paper, we will see different aspects of hacking, from harmless (simply looking around thru web) to dangerously harmful (cyber-terrorism). Irrespective of harmless or harmful, we need to understand is it ethical and how does it impact the global world. This paper is intended to discuss the ethical issues and moral values involved with this darker side of information technology. This paper also includes discussion on the good side of hacking and how hacking can lead to serious cyber crimes and causes harm to world community.
What is a computer hacker?
The definition of the computer hacker can be described as follows,
1. In programming, a computing enthusiast. The term is normally applied to people who
take a delight in experimenting with system hardware (the electronics), software
(computer programs) and communication systems (telephone lines, computer networks
2. In data (information...
... middle of paper ...
...Security” - Dorothy Denning and Frank Drake, From Chapter 2, Computers, Ethics and Social values by Johnson and Nissenbaum.
5. “Computer Security and computer crimes” From Chapter 7, Case Studies in Information and computer ethics by Richard Spinello
6. Hacker Crackdown - By Bruce Sterling http://www.lysator.liu.se/etexts/hacker/
7. Computer Hacking and Ethics by Brian Harvey http://www.cs.berkeley.edu/~bh/hackers.html
8. Hacking: Ethical Issues of the Internet Revolution http://blacksun.box.sk/tutorials.php/id/155
9. Cyber-terrorism http://www-cs.etsu-tn.edu/gotterbarn/stdntppr/
10. “Frameworks of ethical analysis “ From Chapter 2, Case Studies in information and computer ethics by Richard Spinello
11. Soren Kierkegaard http://plato.stanford.edu/entries/kierkegaard
12. Are hackers terrorists? http://zdnet.com.com/2102-11-528326.html
Need Writing Help?
Get feedback on grammar, clarity, concision and logic instantly.Check your paper »
- We have learned many different things in the terms of cybernetics. In fact there are way more than what we ever imagined. Learning about all of the different ways that crimes can be carried out through the uses of technology and how communications are a very important part in giving and receiving specified information. How that all different organizations use this communication to put all of information together to get one big piece of information. What is an insider threat. Insider threat has been defined as a malicious hacker who is an employee of office of a business, institution or agency.... [tags: cyber terrorism, hacking, strategic intelligence]
1221 words (3.5 pages)
- ... This was worried about the most because chemicals were easy to buy in most stores and if terrorists have easier access to these chemicals they can start killing off people more easily. Terrorism happens all around the world. For example terrorism has happened mostly in the Middle East. Just Like in the following places Europe, Asia, Africa, and Latin America. But, the most important terrorism attacks were on the Pearl Harbor and nine – eleven. These were the most influential attacks that have happened in the United States.... [tags: hacking, computer security, viruses, violence]
1686 words (4.8 pages)
- ... It can be important weaken the country's economy, thus denying access to important resources and making it more vulnerable to military attack. Cyber violence can also affect Internet-based business. As bricks and mortar retailers and service providers, many Web sites income product (whether through advertising, financial exchange of goods or services paid) can stand to lose money if the downtime created by cybercriminals. An Internet business has increased its economic interest to the nation, what is usually the cyber crime – cyber attacks to be more in the United States in other countries.... [tags: hacking, warfare, network, exchange]
536 words (1.5 pages)
- In the future, cyber crime will become the leading threat to the safety and security of the American people. Experts on cyber crime agree that cyber crime is an issue that needs to be focused on more in-depth because the wide-spread use of computers by the global economy has made the use of computers and internet vital to everyday life (Siegel, 2009; FBI, 2011). There are 3 major types of cyber crime which includes: cyber fraud, cyber vandalism, and cyber terrorism (Seigel, 2009; Thio, 2010). Cyber terrorism, the more dangerous of the 3, is defined as the use of digital equipment to bring down a country by tapping into its computer based programs and dismantling its infrastructure which incl... [tags: Terrorism Without Borders]
1452 words (4.1 pages)
- Cyber Security as an International Security Threat National and International Security is a sum of the actions taken by countries and other organizations that can guarantee the safety and well being of their population. It is vital for a nation to pre-emptively discover what issues could affect their security, and take action to prevent any detrimental or harmful events from happening. With the development of technology and the transition into a more technologically savvy society, cyber security has become one of the most prevalent and important economic and national security issues that the United States will come to face.... [tags: cyber terrorists, cyberspace]
2186 words (6.2 pages)
- The term “cyber terrorism” refers to the use of the Internet as a medium in which an attack can be launched such as hacking into electrical grids, security systems, and vital information networks. Over the past four decades, cyber terrorists have been using the Internet as an advanced communication tool in which to quickly spread and organize their members and resources. For instance, by using the instantaneous spread of information provided by the Internet, several terrorist’s groups have been able to quickly share information, coordinate attacks, spread propaganda, raise funds, and find new recruits for their cause.... [tags: Terrorism, Counter-terrorism, Irregular military]
1724 words (4.9 pages)
- available to everyone. This is great for advancement of programs, but awful for their security. For example, in the article Huston states that under the current IPv4, which is relatively small at 4 billion addresses, it would take just 5 minutes for a complete scan of all addresses to take place. However, under his and others highly recommended change to the IPv6, a scan of the entire system of 340 undecillion addresses would take 41 thousand years. The IPv6 is vast, which means there will be much more privacy than currently possible with the IPv4.... [tags: Developing country, Developed country, Internet]
1159 words (3.3 pages)
- Breaches and Security Implications by Penetration of the Western Interconnection’s Traffic Control System and its Effects on Modern Day Life Year after year, a number of films are released involving computer hacking of some sort along with cyber-villainy. As entertaining as they are, the validity of these possibilities is not explored. Many of these films center revolve around a chaotic vehicle-related scene where a form of the government’s transportation grid is compromised. The breach typically involves traffic control.... [tags: Cyber Terrorism, Cyber Terrorists]
3307 words (9.4 pages)
- What is Cyber Security. Cyber Security can be defined as “measures taken to protect a computer or computer system (as on the internet) against unauthorized access or attack”. (Bullock 283). In other words, an attempt by individuals to protect their personal information and other digital resources from attacks from the cyber world. Why is Cyber Security important. Cyber security was created because of the sensitive information that is frequently stored on computers that are attached to the Internet.... [tags: hacking, cybercrime, access to information online]
939 words (2.7 pages)
- Cyber-Terrorism Cyber-Terrorism is a reality in the modern age of rapid technological advancement. As fast as new technology is established, people find ways to hack and corrupt it. Many times there is malicious intent behind such actions. These acts can include everything from computer viruses to contraband network servers to pirated IP addresses and credit account fraud. All of the stories we hear and those annoying emails that warn of a multitude of viruses can lull us into complacency when none of them come to fruition.... [tags: Papers]
968 words (2.8 pages)