• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Computer Hacking is never acceptable. Discuss.

Extracts from this document...


Computer Hacking is never acceptable. Discuss. Nowadays, the world-wide network, the Internet, is a very popular place for people. Regardless of which interests people might have, they can always find something interesting on the Internet. The Internet has become more and more well-known, and therefore the number of people using it increases all the time. It also gives possibilities for people who have another purpose than just surfing on the Internet. That is where computer hacking comes in to the subject. When people hear the word "hacking", the first thing they always think of is people breaking into others' computers and causing damage. This is correct, because "computer hacking always involves some degree of infringement on the privacy of others or damage to computer-based property such as files, web pages or software" (Stone, 1999). Furthermore, a computer hacker is a person who breaks into others' computers. A computer hacker is someone who lives and breathes computers, someone who knows all about computers, and who can get a computer to do anything. Equally important, though, is the hacker's attitude. "Not all hackers break into systems just for the fun of it. Some do it for profit - and some of these are even legitimate" (Cheswick et al., p. 132). ...read more.


the caller said, "This is Eduardo in the Billing Department. I've got a lady on hold, she's a secretary in the executive offices that works for one of the vice presidents, and she's asking for some information and I can't use my computer. I got an email from this girl in Human Resources that said `ILOVEYOU,' and when I opened the attachment, I couldn't use my machine any more. A virus. I got caught by a stupid virus. Anyways, could you look up some customer information for me?" "Sure," Janie answered. "It crashed your computer? That's terrible." "Yeah." "How can I help?" Janie asked. Here the attacker called on information from his advance research to make himself sound authentic. He had learned that the information he wanted was restored in something called the Customer Billing Information System, and he had found out how employees referred to the system. He asked, "Can you bring up an account on CBIS?" "Yes, what's the account number?" "I don't have the number; I need you to bring it up by name." "Okay, what's the name?" "It's Heather Marning." He spelled the name, and Janie typed it in. "Okay, I have it up." "Great. Is the account current?" "Uh huh, it's current." "What's the account number?" ...read more.


In my opinion, I think that as long as the break-in on a computer does not cause any problems or damage to the system itself or to the company and has positive intentions - for example to prevent other uncomfortable and harmful situations happening, then computer hacking should be seen as an acceptable and legal action. References Cheswick, William R. et al. (2003): Firewalls and Internet Security: Repelling the Wily Hacker. 2^nd Edition. Addison-Wesley. Canada digi.no (2004): "Hacker-konge holder sikkerhetskurs i Norge." Available: [1]http://www.digi.no/php/art.php?id=100610&f=katnav [downloaded 18.08.04, 01:44] interhack.net (2000): "What Is A Hacker?" Available: [2]http://www.interhack.net/hacker.html [downloaded 27.08.04, 20:59] itavsisen.no (2002): "15-�ring Hacket Skolen." Available: [3]www.itavsien.no/art/1300208.html [downloaded 27.07.04, 21:10] Mitnick, D. Kevin & William L., Simon (2002): The Art of Deception: Controlling the Human Element of Security. Wiley Publishing, Inc., Indianapolis, Indiana. Canada Raymond, Eric S. (n.d.): "The New Hacker's Dictionary" Available: [4]http://www.logophilia.com/jargon/jargon_toc.html [downloaded 06.08.04, 01:00] Stone, David M. (1999): "Computer Hacking." Available: [5]http://lrs.ed.uiuc.edu/wp/crime/hacking.htm [downloaded 28.07.04, 23:38] vg.no (2001): "Vil D�mme Hackere Som Terrorister." Available: [6]http://www.vg.no/pub/vgart.hbs?artid=226516 [downloaded 28.07.04, 23:55] vg.no A (2003): "Krever 90 dagers fengsel for DVD-Jon." Available: [7]http://www.vg.no/pub/vgart.hbs?artid=205206 [downloaded 26.08.04, 21:22] vg.no B (2003): "DVD-Jon vant igjen." Available: [8]http://www.vg.no/pub/vgart.hbs?artid=206915 [downloaded 26.08.04, 21:45] vg.no A (2004): "Hacket nettbank." Available: [9]http://www.vg.no/pub/vgart.hbs?artid=231632 [downloaded 06.08.04, 11:40] vg.no B (2004): "Hissig dataorm sprer seg." Available: [10]http://www.vg.no/pub/vgart.hbs?artid=211998 [downloaded 06.08.04, 12:05] vg.no C (2004): "MP3-kopier er lov!" Available: [11]http://www.vg.no/pub/vgart.hbs?artid=215998 [downloaded 26.08. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Information Systems and Communication section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Information Systems and Communication essays

  1. Marked by a teacher

    Database Coursework on a Vehicle Rental System: Analysis

    5 star(s)

    Data collection: - The vehicle details will be collected from the vehicles manufacturer when a new vehicle is ordered. The vehicle controller will collect these details from a contact within the manufacturer over the phone or else the details will be sent to the business via mail or e-mail.

  2. Peer reviewed

    Computer Crime

    5 star(s)

    Personal Information * Twitter Personal Information * AOL Instant Messenger Personal Information * Saved Passwords for banking, shopping, ebay and so on In a conference scheduled at Black Hat DC security conference, Nicolas Seriot explained how an innocent looking applet on the I-Phone could be easily designed to harvest personal

  1. Peer reviewed

    Computer Science Info-Age & Ethics

    4 star(s)

    Break-in methods include altering input, theft of computer time, software theft, data theft/modification and output theft. Software theft is a large problem in the software industry. Not only does software theft contribute to loss of sales, but it also adds to the spread of computer viruses.

  2. The Impact of Mobile Phones on social Interaction

    This partly relates to limitations in their not being permanently connected and also often to their location within the home, which is perhaps typically not the main living area. Quite simply the PC in its current form looks like a device that may well see itself squeezed out.

  1. Computer Hacking

    Naturally curious and intelligent MIT students who had been exploring the phone switching network and the control systems of the Tech Model Railroad Club were drawn to the computers of the MIT Artificial Intelligence Lab (MIT AI Lab). This was the "Golden Age" of the computer hacker.

  2. Applications and Extensions - Computer Experience.

    The Millennium Bug Although it is called 'The Millennium Bug' it is not a virus, you can't catch it and it certainly doesn't creep around at the bottom of your garden. Quite simply it is the name given to what happens when computers and electronic systems can't recognise the year

  1. Health Book

    to develop further initiatives, such as secure messaging, medical directories, e-prescriptions, and more." (Anonymous1 2010) One technology currently being analysed by Telstra to be used in the construction of this suite is known as 'Cloud Computing'.

  2. 1st year project

    I have chose to display the company's required information in a user form, the reason being is that it will be the most effortless way for my end user to view stored information, it will look attractive and be a lot faster and easier to use.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work