• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Computer Hacking is never acceptable. Discuss.

Extracts from this document...

Introduction

Computer Hacking is never acceptable. Discuss. Nowadays, the world-wide network, the Internet, is a very popular place for people. Regardless of which interests people might have, they can always find something interesting on the Internet. The Internet has become more and more well-known, and therefore the number of people using it increases all the time. It also gives possibilities for people who have another purpose than just surfing on the Internet. That is where computer hacking comes in to the subject. When people hear the word "hacking", the first thing they always think of is people breaking into others' computers and causing damage. This is correct, because "computer hacking always involves some degree of infringement on the privacy of others or damage to computer-based property such as files, web pages or software" (Stone, 1999). Furthermore, a computer hacker is a person who breaks into others' computers. A computer hacker is someone who lives and breathes computers, someone who knows all about computers, and who can get a computer to do anything. Equally important, though, is the hacker's attitude. "Not all hackers break into systems just for the fun of it. Some do it for profit - and some of these are even legitimate" (Cheswick et al., p. 132). ...read more.

Middle

the caller said, "This is Eduardo in the Billing Department. I've got a lady on hold, she's a secretary in the executive offices that works for one of the vice presidents, and she's asking for some information and I can't use my computer. I got an email from this girl in Human Resources that said `ILOVEYOU,' and when I opened the attachment, I couldn't use my machine any more. A virus. I got caught by a stupid virus. Anyways, could you look up some customer information for me?" "Sure," Janie answered. "It crashed your computer? That's terrible." "Yeah." "How can I help?" Janie asked. Here the attacker called on information from his advance research to make himself sound authentic. He had learned that the information he wanted was restored in something called the Customer Billing Information System, and he had found out how employees referred to the system. He asked, "Can you bring up an account on CBIS?" "Yes, what's the account number?" "I don't have the number; I need you to bring it up by name." "Okay, what's the name?" "It's Heather Marning." He spelled the name, and Janie typed it in. "Okay, I have it up." "Great. Is the account current?" "Uh huh, it's current." "What's the account number?" ...read more.

Conclusion

In my opinion, I think that as long as the break-in on a computer does not cause any problems or damage to the system itself or to the company and has positive intentions - for example to prevent other uncomfortable and harmful situations happening, then computer hacking should be seen as an acceptable and legal action. References Cheswick, William R. et al. (2003): Firewalls and Internet Security: Repelling the Wily Hacker. 2^nd Edition. Addison-Wesley. Canada digi.no (2004): "Hacker-konge holder sikkerhetskurs i Norge." Available: [1]http://www.digi.no/php/art.php?id=100610&f=katnav [downloaded 18.08.04, 01:44] interhack.net (2000): "What Is A Hacker?" Available: [2]http://www.interhack.net/hacker.html [downloaded 27.08.04, 20:59] itavsisen.no (2002): "15-�ring Hacket Skolen." Available: [3]www.itavsien.no/art/1300208.html [downloaded 27.07.04, 21:10] Mitnick, D. Kevin & William L., Simon (2002): The Art of Deception: Controlling the Human Element of Security. Wiley Publishing, Inc., Indianapolis, Indiana. Canada Raymond, Eric S. (n.d.): "The New Hacker's Dictionary" Available: [4]http://www.logophilia.com/jargon/jargon_toc.html [downloaded 06.08.04, 01:00] Stone, David M. (1999): "Computer Hacking." Available: [5]http://lrs.ed.uiuc.edu/wp/crime/hacking.htm [downloaded 28.07.04, 23:38] vg.no (2001): "Vil D�mme Hackere Som Terrorister." Available: [6]http://www.vg.no/pub/vgart.hbs?artid=226516 [downloaded 28.07.04, 23:55] vg.no A (2003): "Krever 90 dagers fengsel for DVD-Jon." Available: [7]http://www.vg.no/pub/vgart.hbs?artid=205206 [downloaded 26.08.04, 21:22] vg.no B (2003): "DVD-Jon vant igjen." Available: [8]http://www.vg.no/pub/vgart.hbs?artid=206915 [downloaded 26.08.04, 21:45] vg.no A (2004): "Hacket nettbank." Available: [9]http://www.vg.no/pub/vgart.hbs?artid=231632 [downloaded 06.08.04, 11:40] vg.no B (2004): "Hissig dataorm sprer seg." Available: [10]http://www.vg.no/pub/vgart.hbs?artid=211998 [downloaded 06.08.04, 12:05] vg.no C (2004): "MP3-kopier er lov!" Available: [11]http://www.vg.no/pub/vgart.hbs?artid=215998 [downloaded 26.08. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Information Systems and Communication section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Information Systems and Communication essays

  1. Peer reviewed

    Computer Crime

    5 star(s)

    data stored on the I-Phone and routed to a remote sever with ease and without the user noticing. To get his point across, Seriot created a spyware dubbed "SpyPhone". This shook the world of the Apple Company, as this one innocent looking applet, running in the background or even under

  2. Computer Hacking

    This was the "Golden Age" of the computer hacker. The machines were large, slow, cumbersome to use, and it took an extraordinary effort to make the do even the simplest computation. As computers spread to other parts of the country, so did the hacker culture.

  1. Data Processing Task. Mr Peters, the man who runs this particular Samsung store ...

    Switchboard form Macro Guidelines The macros in the system are designed to make the system as easy as possible for the user as the switchboard is brought up automatically once the Enter button is pressed and so decisions can be made quickly.

  2. Health Book

    the ability to pull up these personalized settings, game saves and gamer profile regardless if they have moved computers or even countries. Information Privacy and Security Information privacy and security are both vital to the integrity of any organisation, no matter how big or small.

  1. BTEC ND IT Computer Systems M&A 2

    Virtual memory causes applications to use physical memory, for example RAM to make it more efficient than the programs without virtual memory. Users are able to alter the amount of virtual memory that's assigned to the applications adapting the performance of the programs running.

  2. HCI is known for Human Computer Interaction, and basically it interacts with user and ...

    The output is connecting and voice receiving and sending. 3) Interaction (Interface) This is the most important part of HCI components, because this helps user and system to communicate with each other, when data is inputted and outputted. Interaction is basically the source that is used to communicate with the system, by the user, for example, Mouse, keyboard, buttons etc.

  1. ict as level coursework

    This involves going to the toolbox and clicking on the command button icon. After clicking this icon then a text box will occur on the user form which then can be resized and a name of the button can be keyed in.

  2. Cunha & Ribeiro Ltd: Stock Control & Invoice Database

    This means that I would be able to gain the best information about the current system so that I could then help him solve the problem that he faces. Furthermore, by conducting one-on-one interviews with the user, I am able to gain a better feeling of the problem and see

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work