• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Computer Hacking is never acceptable. Discuss.

Extracts from this document...

Introduction

Computer Hacking is never acceptable. Discuss. Nowadays, the world-wide network, the Internet, is a very popular place for people. Regardless of which interests people might have, they can always find something interesting on the Internet. The Internet has become more and more well-known, and therefore the number of people using it increases all the time. It also gives possibilities for people who have another purpose than just surfing on the Internet. That is where computer hacking comes in to the subject. When people hear the word "hacking", the first thing they always think of is people breaking into others' computers and causing damage. This is correct, because "computer hacking always involves some degree of infringement on the privacy of others or damage to computer-based property such as files, web pages or software" (Stone, 1999). Furthermore, a computer hacker is a person who breaks into others' computers. A computer hacker is someone who lives and breathes computers, someone who knows all about computers, and who can get a computer to do anything. Equally important, though, is the hacker's attitude. "Not all hackers break into systems just for the fun of it. Some do it for profit - and some of these are even legitimate" (Cheswick et al., p. 132). ...read more.

Middle

the caller said, "This is Eduardo in the Billing Department. I've got a lady on hold, she's a secretary in the executive offices that works for one of the vice presidents, and she's asking for some information and I can't use my computer. I got an email from this girl in Human Resources that said `ILOVEYOU,' and when I opened the attachment, I couldn't use my machine any more. A virus. I got caught by a stupid virus. Anyways, could you look up some customer information for me?" "Sure," Janie answered. "It crashed your computer? That's terrible." "Yeah." "How can I help?" Janie asked. Here the attacker called on information from his advance research to make himself sound authentic. He had learned that the information he wanted was restored in something called the Customer Billing Information System, and he had found out how employees referred to the system. He asked, "Can you bring up an account on CBIS?" "Yes, what's the account number?" "I don't have the number; I need you to bring it up by name." "Okay, what's the name?" "It's Heather Marning." He spelled the name, and Janie typed it in. "Okay, I have it up." "Great. Is the account current?" "Uh huh, it's current." "What's the account number?" ...read more.

Conclusion

In my opinion, I think that as long as the break-in on a computer does not cause any problems or damage to the system itself or to the company and has positive intentions - for example to prevent other uncomfortable and harmful situations happening, then computer hacking should be seen as an acceptable and legal action. References Cheswick, William R. et al. (2003): Firewalls and Internet Security: Repelling the Wily Hacker. 2^nd Edition. Addison-Wesley. Canada digi.no (2004): "Hacker-konge holder sikkerhetskurs i Norge." Available: [1]http://www.digi.no/php/art.php?id=100610&f=katnav [downloaded 18.08.04, 01:44] interhack.net (2000): "What Is A Hacker?" Available: [2]http://www.interhack.net/hacker.html [downloaded 27.08.04, 20:59] itavsisen.no (2002): "15-�ring Hacket Skolen." Available: [3]www.itavsien.no/art/1300208.html [downloaded 27.07.04, 21:10] Mitnick, D. Kevin & William L., Simon (2002): The Art of Deception: Controlling the Human Element of Security. Wiley Publishing, Inc., Indianapolis, Indiana. Canada Raymond, Eric S. (n.d.): "The New Hacker's Dictionary" Available: [4]http://www.logophilia.com/jargon/jargon_toc.html [downloaded 06.08.04, 01:00] Stone, David M. (1999): "Computer Hacking." Available: [5]http://lrs.ed.uiuc.edu/wp/crime/hacking.htm [downloaded 28.07.04, 23:38] vg.no (2001): "Vil D�mme Hackere Som Terrorister." Available: [6]http://www.vg.no/pub/vgart.hbs?artid=226516 [downloaded 28.07.04, 23:55] vg.no A (2003): "Krever 90 dagers fengsel for DVD-Jon." Available: [7]http://www.vg.no/pub/vgart.hbs?artid=205206 [downloaded 26.08.04, 21:22] vg.no B (2003): "DVD-Jon vant igjen." Available: [8]http://www.vg.no/pub/vgart.hbs?artid=206915 [downloaded 26.08.04, 21:45] vg.no A (2004): "Hacket nettbank." Available: [9]http://www.vg.no/pub/vgart.hbs?artid=231632 [downloaded 06.08.04, 11:40] vg.no B (2004): "Hissig dataorm sprer seg." Available: [10]http://www.vg.no/pub/vgart.hbs?artid=211998 [downloaded 06.08.04, 12:05] vg.no C (2004): "MP3-kopier er lov!" Available: [11]http://www.vg.no/pub/vgart.hbs?artid=215998 [downloaded 26.08. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Information Systems and Communication section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Information Systems and Communication essays

  1. Marked by a teacher

    Database Coursework on a Vehicle Rental System: Analysis

    5 star(s)

    Age of staff calculated automatically Inputs: - Date of Birth, today's date. Data Collection: - Date of Birth is collected by the manager when a new person joins the staff. Today's date is obtained from the computer's internal clock.

  2. Peer reviewed

    Computer Crime

    5 star(s)

    data stored on the I-Phone and routed to a remote sever with ease and without the user noticing. To get his point across, Seriot created a spyware dubbed "SpyPhone". This shook the world of the Apple Company, as this one innocent looking applet, running in the background or even under

  1. Data Processing Task. Mr Peters, the man who runs this particular Samsung store ...

    page It does match the actual time Test 1 The customer table before the telephone number is entered Only the sequence of numbers in the input mask have been allowed Test 2 The customer table before the postcode is entered The customer table after the postcode is entered Test 3

  2. Health Book

    to develop further initiatives, such as secure messaging, medical directories, e-prescriptions, and more." (Anonymous1 2010) One technology currently being analysed by Telstra to be used in the construction of this suite is known as 'Cloud Computing'.

  1. BTEC ND IT Computer Systems M&A 2

    Virtual memory causes applications to use physical memory, for example RAM to make it more efficient than the programs without virtual memory. Users are able to alter the amount of virtual memory that's assigned to the applications adapting the performance of the programs running.

  2. HCI is known for Human Computer Interaction, and basically it interacts with user and ...

    This type of user doesn't need any help or support but it will be easy for him/her if the system has fast interfaces. 4) Expert - This name is given to a person that knows everything about the system. Expert user is capable of adding or removing any mistakes from the system.

  1. Cunha & Ribeiro Ltd: Stock Control & Invoice Database

    On top of this the paper-based system seems to consume plenty of Mr. Ribeiro's free time as he is the only person that handles the major paperwork. Restatement of Problem So to restate the problem, from the interviews and the data flow I have managed to identify the problems that were mentioned in the beginning by Mr.

  2. 1st year project

    They can record and process a lot more data in a much shorter space of time. By putting all the information on to an Excel program which everyone can access from their local network, it would be a lot less complicated way for everyone to do their jobs.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work