• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Computer Hacking is never acceptable. Discuss.

Extracts from this document...

Introduction

Computer Hacking is never acceptable. Discuss. Nowadays, the world-wide network, the Internet, is a very popular place for people. Regardless of which interests people might have, they can always find something interesting on the Internet. The Internet has become more and more well-known, and therefore the number of people using it increases all the time. It also gives possibilities for people who have another purpose than just surfing on the Internet. That is where computer hacking comes in to the subject. When people hear the word "hacking", the first thing they always think of is people breaking into others' computers and causing damage. This is correct, because "computer hacking always involves some degree of infringement on the privacy of others or damage to computer-based property such as files, web pages or software" (Stone, 1999). Furthermore, a computer hacker is a person who breaks into others' computers. A computer hacker is someone who lives and breathes computers, someone who knows all about computers, and who can get a computer to do anything. Equally important, though, is the hacker's attitude. "Not all hackers break into systems just for the fun of it. Some do it for profit - and some of these are even legitimate" (Cheswick et al., p. 132). ...read more.

Middle

the caller said, "This is Eduardo in the Billing Department. I've got a lady on hold, she's a secretary in the executive offices that works for one of the vice presidents, and she's asking for some information and I can't use my computer. I got an email from this girl in Human Resources that said `ILOVEYOU,' and when I opened the attachment, I couldn't use my machine any more. A virus. I got caught by a stupid virus. Anyways, could you look up some customer information for me?" "Sure," Janie answered. "It crashed your computer? That's terrible." "Yeah." "How can I help?" Janie asked. Here the attacker called on information from his advance research to make himself sound authentic. He had learned that the information he wanted was restored in something called the Customer Billing Information System, and he had found out how employees referred to the system. He asked, "Can you bring up an account on CBIS?" "Yes, what's the account number?" "I don't have the number; I need you to bring it up by name." "Okay, what's the name?" "It's Heather Marning." He spelled the name, and Janie typed it in. "Okay, I have it up." "Great. Is the account current?" "Uh huh, it's current." "What's the account number?" ...read more.

Conclusion

In my opinion, I think that as long as the break-in on a computer does not cause any problems or damage to the system itself or to the company and has positive intentions - for example to prevent other uncomfortable and harmful situations happening, then computer hacking should be seen as an acceptable and legal action. References Cheswick, William R. et al. (2003): Firewalls and Internet Security: Repelling the Wily Hacker. 2^nd Edition. Addison-Wesley. Canada digi.no (2004): "Hacker-konge holder sikkerhetskurs i Norge." Available: [1]http://www.digi.no/php/art.php?id=100610&f=katnav [downloaded 18.08.04, 01:44] interhack.net (2000): "What Is A Hacker?" Available: [2]http://www.interhack.net/hacker.html [downloaded 27.08.04, 20:59] itavsisen.no (2002): "15-�ring Hacket Skolen." Available: [3]www.itavsien.no/art/1300208.html [downloaded 27.07.04, 21:10] Mitnick, D. Kevin & William L., Simon (2002): The Art of Deception: Controlling the Human Element of Security. Wiley Publishing, Inc., Indianapolis, Indiana. Canada Raymond, Eric S. (n.d.): "The New Hacker's Dictionary" Available: [4]http://www.logophilia.com/jargon/jargon_toc.html [downloaded 06.08.04, 01:00] Stone, David M. (1999): "Computer Hacking." Available: [5]http://lrs.ed.uiuc.edu/wp/crime/hacking.htm [downloaded 28.07.04, 23:38] vg.no (2001): "Vil D�mme Hackere Som Terrorister." Available: [6]http://www.vg.no/pub/vgart.hbs?artid=226516 [downloaded 28.07.04, 23:55] vg.no A (2003): "Krever 90 dagers fengsel for DVD-Jon." Available: [7]http://www.vg.no/pub/vgart.hbs?artid=205206 [downloaded 26.08.04, 21:22] vg.no B (2003): "DVD-Jon vant igjen." Available: [8]http://www.vg.no/pub/vgart.hbs?artid=206915 [downloaded 26.08.04, 21:45] vg.no A (2004): "Hacket nettbank." Available: [9]http://www.vg.no/pub/vgart.hbs?artid=231632 [downloaded 06.08.04, 11:40] vg.no B (2004): "Hissig dataorm sprer seg." Available: [10]http://www.vg.no/pub/vgart.hbs?artid=211998 [downloaded 06.08.04, 12:05] vg.no C (2004): "MP3-kopier er lov!" Available: [11]http://www.vg.no/pub/vgart.hbs?artid=215998 [downloaded 26.08. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Information Systems and Communication section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Information Systems and Communication essays

  1. Peer reviewed

    Computer Crime

    5 star(s)

    data stored on the I-Phone and routed to a remote sever with ease and without the user noticing. To get his point across, Seriot created a spyware dubbed "SpyPhone". This shook the world of the Apple Company, as this one innocent looking applet, running in the background or even under

  2. Computer Hacking

    This was the "Golden Age" of the computer hacker. The machines were large, slow, cumbersome to use, and it took an extraordinary effort to make the do even the simplest computation. As computers spread to other parts of the country, so did the hacker culture.

  1. Data Processing Task. Mr Peters, the man who runs this particular Samsung store ...

    parts of the system as this is the output from the system, that the manager or owner will look at for sales figures and revenue intake, and the user of the system will use to obtain the answers to everyday queries which they may have, or a client may want to know.

  2. Health Book

    the ability to pull up these personalized settings, game saves and gamer profile regardless if they have moved computers or even countries. Information Privacy and Security Information privacy and security are both vital to the integrity of any organisation, no matter how big or small.

  1. BTEC ND IT Computer Systems M&A 2

    Virtual memory causes applications to use physical memory, for example RAM to make it more efficient than the programs without virtual memory. Users are able to alter the amount of virtual memory that's assigned to the applications adapting the performance of the programs running.

  2. HCI is known for Human Computer Interaction, and basically it interacts with user and ...

    The output is connecting and voice receiving and sending. 3) Interaction (Interface) This is the most important part of HCI components, because this helps user and system to communicate with each other, when data is inputted and outputted. Interaction is basically the source that is used to communicate with the system, by the user, for example, Mouse, keyboard, buttons etc.

  1. ict as level coursework

    The file I uploaded now appears in the box that I sized and allocated. The next image that I want to use will be imported in the exact same way as just indicated. Now I want to add a command button on to the user form which enables you to redirect to other user forms.

  2. Cunha & Ribeiro Ltd: Stock Control & Invoice Database

    for myself what the problem is if he isn't able to place his opinions in writing. Then in the future this will help me give my opinion on how to get around the problem and then also it will help me find the appropriate solution to the problem along with his input.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work