Essay on The Use of Hacking to Identify Weaknesses in Computer Security

Essay on The Use of Hacking to Identify Weaknesses in Computer Security

Length: 1406 words (4 double-spaced pages)

Rating: Powerful Essays

Open Document

Essay Preview

Introduction
The use of hacking to identify weaknesses in computer security has become an increasingly controversial issue in recent years. Awareness of this issue is important, because our ever increasing reliance on technology means that breaches in computer security have the potential to have wide-ranging and devastating consequences to society, worldwide. This essay will begin by clearly defining the term ‘hacking’ and will examine the type of people who hack and for what reasons. There will then follow a discussion of the moral argument on hacking before examining a few brief examples. The essay will then conclude by arguing against the use of hacking as a means of identifying weaknesses in computer security.

What is it to ‘hack’?
Hacking has two primary definitions; the first refers to the enthusiastic and skilful use of computers to solve problems (Techterms, 2013); the second, to “gain unauthorized access to data in a system or computer” (Oxford Dictionaries, 2013). In the context of this essay the second definition is more appropriate and will be the meaning inferred throughout. This definition also more closely aligns with legal terminology used in the UK when describing the hacking of computers. The Computer Misuse Act (1990) introduced three criminal offenses:

1. Unauthorised access to computer material.
2. Unauthorised access with intent to commit or facilitate commission of further offences.
3. Unauthorised acts with intent to impair, or with recklessness as to impairing, operation of computer, etc.
a. Making, supplying or obtaining articles for use in offence under section 1 or 3

The important phrase to draw from both the dictionary and legal definitions is ‘unauthorised access.’ This will be useful for helping t...


... middle of paper ...


...tionaries.com/definition/english/hack

Rouse, M. (2007). Definition: Black Hat. Retrieved 11 17, 2013, from searchsecurity.techtarget.com: http://searchsecurity.techtarget.com/definition/black-hat

Rouse, M. (2007). Definition: White Hat. Retrieved 11 17, 2013, from searchsecurity.techtarget.com: http://searchsecurity.techtarget.com/definition/white-hat

Staff, A. (2011). Lulz? Sony hackers deny responsibility for misuse of leaked data. Retrieved 11 17, 2013, from arstechnic.com: http://arstechnica.com/tech-policy/2011/06/lulz-sony-hackers-deny-responsibility-for-misuse-of-leaked-data/

Techterms. (2013). Hacker. Retrieved 11 17, 2013, from techterms.com: http://www.techterms.com/definition/hacker

Yeo, V. (2006). Do former black hats make good hires? Retrieved Feburary 1, 2014, from www.zdnet.com: http://www.zdnet.com/do-former-black-hats-make-good-hires-2061955207/

Need Writing Help?

Get feedback on grammar, clarity, concision and logic instantly.

Check your paper »

Hacking: Past, Present, and Future Essay

- Hacking has been in existence for more than a century. It all began when a group of teenage boys who were interested in knowing how the telephone worked than in making proper connections and directing calls to the correct place. Originally, hacking was not even seen as a negative connotation with which we associate the term with in today’s world. The term "hack" is a shortcut that would modify and improve the performance of a computer's operating system that would take less time to complete. (http://findarticles.com) This all started way back in 1971 where people began to hack into everything from phones, to bank accounts and then to computers....   [tags: Hacking Technology]

Powerful Essays
2488 words (7.1 pages)

Essay about Hacking And The Ethical Implications Of Hacking

- In this report there are many different implications of hacking which would be discussed, about the social and ethical implication that hacking has on the society, and so through discussing many ‘For’ and ‘Against’ arguments this would allow the reader to finally be able to reach a conclusion. The structuring of the report will be as follows. Firstly, it will cover the aims and points of social implication of hacking, and then the ethical implications of hacking. This would allow being able to meet the aims of the report and identify many different sides of hacking both ethically and socially....   [tags: Ethics, Computer, Computer security, Computing]

Powerful Essays
1500 words (4.3 pages)

Unscrupulous Programmer: Computer Security Risks Essay examples

- Nowadays, people often use computers to store various personal data, and valuable data on the business of the company and others. Every computer should have security to protect all important data from computer security risk, such as attacks from hackers, crackers and also cyber terrorisms. A computer security risk is any event or action that could cause a loss or damage to computer hardware, software, data, or information. The intruders acted intentionally or accidentally. Some intruders breach the computer security by accessing data without modifying the data and some of them access, modify and sometimes delete the data....   [tags: Computer, Crime, Hacking]

Powerful Essays
956 words (2.7 pages)

Hacking as a Means of Identifying Weaknesses in Computer Security Essay

- The use of hacking can be very beneficial as a means of identifying weaknesses in computer security. Nowadays, numerous companies and governments use this technique to assess the level of security of their systems and determine if any valuable information is at risk of being accessed unlawfully. Ethical hackers are employed to identify potential threats on a single computer or a whole network of computers. The found potential exploits are later patched thus decreasing the chance of a breach in the system and increasing its overall security and reliability....   [tags: ethical hackers, penetration testing]

Powerful Essays
1402 words (4 pages)

Is Ethical Hacking the Answer to Ensuring the Safety of Company’s Computer Systems?

- Introduction Modern society relies more on computers and the Internet now than ever before as a means to exchange information. Computer infrastructures are continually evolving and developing which has lead to an increase of reliance on technology, and an increasing amount of personal data being shared between computers and over the Internet. For these reasons it imperative to keep these infrastructures safe from those who do not belong or mean to cause harm, commonly called hackers. Hackers are people who gain unauthorized access to someone else’s computer....   [tags: modern societies, exchange information]

Powerful Essays
1104 words (3.2 pages)

Essay about Application Of Computer Information Systems

- Computer information system makes a system in the organizations. It is frequently termed as Information Technology. It also allows the organizations to identify how to improve the organizational system as well as promote the necessary system skills that encourage us. It is the best method to acquire knowledge of technology that I collected from several career paths. Those career paths which I continued for taking computer information systems. Design systems solutions for maintaining the organizational competence....   [tags: Security, Computer security, Computer, Management]

Powerful Essays
1119 words (3.2 pages)

The Threats For Computer Crime Essay examples

- Businesses and government agencies are not the only targets for hackers, they do attack colleges and universities. There have been other higher education institutions which have been hacked and they have put in measures to try to prevent reoccurring hacking. There are processes, methodologies, and technology that can be purchased to lower the threats for computer crime. Laws have been put in place to protect universities, companies, government agencies, and other facilities, which are used to convict offenders....   [tags: Computer security, Security, Authentication]

Powerful Essays
2193 words (6.3 pages)

Essay about The Federal Information Security Management Act

- The National Institute of Standards and Technology (NIST) provides an extensive amount of information, resources, and guidance on IT and information security topics. The Federal Information Security Management Act (FISMA) provides standards and guidelines for establishing information security within federal systems. However, there have been, and continues to be, numerous security incidents including data breaches within federal systems. In this paper I will first describe the data breach incident and the primary causes of the data breach....   [tags: Security, Computer security, National security]

Powerful Essays
1168 words (3.3 pages)

Essay on Should We Be Legal For Cyber Security?

- Should be people be able to obstruct their identities online. People around the world have emails, bank accounts, social media accounts, and credit cards. Thousands of cards and account passwords are entered into the internet every day, but are we secure. Today our world is so technologically advanced that any hacker, stalker, or pedophile can have our information with a click of a button. There are several ways that they get our information such as phishing, fake websites, emails, and many others....   [tags: Computer security, Computer, Password]

Powerful Essays
1210 words (3.5 pages)

The Security Weaknesses Of Aircraft Solutions Essay

- Executive Summary The reason of this information is to identify the security weakness in the Aircraft Solutions inter structure. Aircraft solutions is a known frontrunner in the design and manufacture of component for commercial, defense, and aerospace industry headquartered in San Diego, CA. I have found two security vulnerabilities in the organization, first there is software issue of not having a firewall between the Commercial Division and the internet world, which can be solved by installing a fire between CD and internet....   [tags: Computer security, Security, IP address, Risk]

Powerful Essays
1057 words (3 pages)