• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Hacking In the Business Society.

Extracts from this document...

Introduction

Hacking In the Business Society From history we can observer that "human society" is easily influenced, and often mislead. There is a near endless amount of examples for this, ranging from the Suicidal Sect leaders (David Koresh http://www.rickross.com/reference/waco/waco321.html ), to mad dictators, with aspirations of taking over the world. This human susceptibility of being easily mislead, is clearly apparent when dealing with the issue of "Hacking", and "Hacking In the Business Society". The movie industry has played a great role in misinforming society of who a hacker is, and what they can do. ("How Hollywood portrays hackers" Andrew Brandet http://edition.cnn.com/2001/TECH/internet/04/05/hacking.hollywood.idg/ ) For this reason it is essential to define key concepts and terminology before one can discus this issue. "Hacking", unfortunately, has become a word, with many various meanings. For the sake of discussion, hacking will be defined, here, as: "Breaking into a system", where "system" is defined to be a computer, server, database, software, or any other source of computerized information. Another term that is not evident is "Business Society". The business society comprises of: i. Organizations (Firms, Companies, etc) ii. Employees iii. Consumers iv. The Government v. Hackers This may seem a strange way to describe the "Business Society", but it is vital to realize that they all play a very significant role in Business, and hence all should be included when discussing this matter. ...read more.

Middle

According to Joel Smith, a business writer from 'USA Today, The Detroit News' (http://www.usatoday.com/tech/columnist/ccjoe026.htm) , Software Piracy costs businesses in the United States of America (USA) alone, $3.2 billion. When looking at this figure one must not only concern themselves with the loss to the company, for the Organization is but one part of the "Business Society". This loss of $3.2 billon also effects the Employees'. According to the same report, this enormous loss cost 109,000 jobs in the USA alone. This amounts to $4.5 billion in lost wages and $1 billion lost in tax revenue" Using the following two examples we can see how hackers have not only damaged Organizations, and Employee's but also Consumers. A very illustrious game creator company, Valve, intended on bringing out the much anticipated "Half-Life 2". A hacker however, managed to hack and retrieve the source code for the game, and posted it on the forum as a trophy. This not only cost the Organization money, but postponed the release by a year. This happened only a few months ago, and emphasizing the relevance of the problem today. (http://www.gamespot.com/pc/action/halflife2/news_6076314.html Sam Parker Game Spot) Credit Card companies have also suffered a great blow, as fraud is on the rise. When it comes to Credit Cards, it is not only the responsibility of the Credit card companies to be vigilant, but also of sites that use e-commerce. ...read more.

Conclusion

The Bad are the malicious hackers who are there to do some damage, whether it be passive damage (stealing information without removing or changing anything) or physical damage (destroying a system, or erasing files). And finally the Ugly, also known as "script kiddies". These are amateurs that get there hands on pre written code which they use to attempt to do damage in a fashion they don't understand. Afentis, a IT security Consultant company who's employs are the first of the three. They say, "The importance of security is rising - protecting information and computer assets has become a prime concern. Entrust Afentis to become your security partner and validate the integrity of your organization's network." (http://www.afentis.com/services/index.html Afentis) Protecting ones "system", has become a full time job and if the problem of hacking is to be reduced it must be treated like a full time job. For a business to ensure security it must implement measure to protect against both internal and external attacks. These measures may seem drastic to many privacy groups, however the sacrifice may be far less than the one paid at compromised data. Data is not only games, or source code, it could be as seen above credit card numbers, addresses, phone numbers. All this must be taken into consideration. Ideally a system would be devised where internal systems could be monitored without intrusion of privacy, but until then the sacrifice is less than the potential danger. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level ICT in Business section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level ICT in Business essays

  1. For my business report I am investigating the Co-op erative society supermarket.

    In consequence managers and good workers are often drawn to higher-paid jobs in commercial businesses. * Another weakness of Co-op erative ownership is that the mass of members may lose interest in running the organization and let a small group take it over and manage it for their own benefit.

  2. E-commerce in Business Companies of Bangladesh.

    Posting of government documents and publications including budgetary information on the Web should be instructed. 3. Contracts and other alternates to Letter-of-Credit (L/C) should be allowed as legal methods for international transactions. 4. Foreign exchange controls on travel and for business should be relaxed. Long term Program : 1.

  1. In this coursework I need to produce a detailed business report on one medium-sized ...

    A computer-based information management system provides the mean to communicate, collect, store, summarise, analyse and present information in a way that best suits the controlling and decision making needs of different managers. Inform received by one department or section can be further processed before it passed onto other departments through the organisations computer network.

  2. The Use of Geographical Information Systems (GIS) And International Technology Transfer by Non-Governmental ...

    In Senegal, routine data collected from health posts served as a basis for the analysis. While the Ecological Monitory Centre (CSE) supply the reference data. While in Morocco, surveillance data from the Schistosomiasis control programme were integrated. TRAINING In utilising the GIS, the ability to ensure appropriate training is a key components.

  1. Unit 3 'ICT and society'

    The response center can them send this information to the police who are then able to intercept the stolen vehicle. Information services Information kiosks An information kiosk is a small structure, usually with a computer and monitor in it, that displays information for the public.

  2. I.C.T & Society

    I joined and started to use the library. Each book has a barcode which is used to check out books. The information on the bar code sets out the name of the book, what date it is given out and the date it should be returned.

  1. Unit 9 Impact Of ICT on society

    * Supports use of diverse media - Graphics and photos look great on video and can help to communicate a difficult concept. This bullet point emphasizes how the media can satisfy the newspaper companies need on being able to provide a diverse range of media * Document sharing facilitates collaboration

  2. My aim is to research and produce a formal business report on my the ...

    But unite in your hundreds and thousands, and you suddenly have a very loud voice. Co-operation was never intended to be militant. Success would come slowly but surely, its believers insisted, by force of argument rather than by force of arms.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work