• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Computer Crime - Hacking

Extracts from this document...

Introduction

Computer Crime – Hacking

Section 1:

A brief description of the issue I have chosen to study, in particular indicating how my area of interest has changed since the project proposal, either because the actual issue has evolved since the initial proposal, or as a result of tutor feedback, or as a result of your research.

Hacking involves using a computer to gain unauthorized access to another computer system. Although at first "hacker" was a positive term for a person with a mastery of computers who could push programs beyond what they were designed to do, it has by now become almost synonymous with illegal activities like breaking into protected computer systems, releasing viruses, stealing passwords or other sensitive data, denial of service so on.

In my project proposal, I was only interested in the event of hacking crime and how hacking perpetrates a crime. As a result of my research, I have changed my interested area to the motivation and mentality of hacking, why hacking perpetrates a computer crime and finding solution to overcome hacking.

Unnumbered hacking crimes happens everyday. And the number of hacking crimes is still increase everyday. So overcome the hacking crime must be imperative under this situation. If we want to overcome hacking crime, not only know the motivation and mentality of hacking and why hacking perpetrates a computer crime, but we also need to research the participants of hacking and the rank of importance of difference participants.

...read more.

Middle

Company white collar, uses computer every day and has sound internet skill. [secondary implied participant]

Section 4

Outline of key points, actions or decisions in the issue, and a justification or discussion about those key points, actions or decisions. You should try to use ethical and professional principles in your justification discussion.

The motivation of hacking

  • Economic motive

I read an article about the hackers in a magazine. A pressman asks a hacker:” why do you hack?” The hacker answers:” For money.” Most of hacker hack computer for heist money. They use their greater computing skill and knowledge to gain unauthorized access to another computer system easily. After they break in the system, they can heist money as they wish. There is a case about the economic motive of hacking: In late 1980s, First National Bank of Chicago is the victim of a $70-million computer heist.[www.sptimes.com/Hackers/story_level.html; Article Title: A history of hacking] According the case above, we can see in that event First National Bank lost 70 millions dollars. First National Bank is the direct victim of this event. And the customer is the indirect victim of this event. The hacking has damages the customer’s natural life and human rights. The hacking in this case has perpetrated a crime and not been ethical.

  • Occupationally related

Some employers don’t satisfy the employees. Therefore the employers hack the company’s computer system to retaliate the employer. The employers break in the company’s computer system to distribute computer virus, maliciously delete company’s important files, or make some changes of company’s account to obtain fraudulent credit. If the employers do like that, the employers have perpetrated a crime. Because the employers damage the company, and customer trust and privacy by hacking. Finally the employer will be punished by lawing.

  • Understanding systems

Some companies usually find some hackers to hack companies’ new system. Every company wants to build a security and safe computer system. But there is no one hundred percent security and safe system in the real-world. The company wants to find the bugs, flaws and any other problems with the help of hacking system. So the company finds some hackers using different great computing skill to hack the new system to detect the problems as soon as possible before the system is used. Hacking can advance the development of computing system. In that way, hacking will be professional ethical.

  • To find stimulate and challenge

Some people like to hack computer systems because they want to find stimulate challenge. Most of this kind of people is student. Student has enough time, computing skill or knowledge, and curiosity to hack computer systems. I heart a case that several years ago, two students hacked U.S. National Defense Department computer system. At last, the two students were caught. Because hacking a computer system without the permission of the host or the owner of the system is an illegal activity. Breaking into computer system with unauthorized access is also not ethical, because it damages the department security.  

All above show that, if the motivation of hacking is for self economic motive, heist money, retaliation or any other things, it will be seemed not ethical. If the motivation of hacking is for advancing the development of system or software, it will be seemed professional ethical. In another word to say if you hack a computer system with the permission of the host or the owner of the system, your action will be ethical and legal. If not, your action will be not ethical and illegal. And greater the crime you perpetrated, higher the gallows you will be punished.

Characteristic of hacking

  • Learning something special of a programming language or system

Hacking is a special skill in using programming language that cannot be learned from the lecture of university. Someone wants to learn the special things of programming or system from that.

  • Producing and practicing the programming is better than just theorizing about it

Hacking is more important in practicing programming. If you just theorizing programming and never producing/practicing programming, you will never hack system successfully.

  • Appreciating someone else's hacking

Hacking doesn’t only need great skill and knowledge, it also needs interesting. Some hacker doesn’t know what is hacking before becoming a hacker. He will know hacking from appreciating someone else’s hacking. He is interesting in hacking and start to learning harking.

  • Learning a new programming language fast

A good hacker must have the capable to learn a new programming language fast. In the real-world, the technology is changing and increasing fast. And the system is building more security and safe using different and new technology. So a good hacker should have the capable to learn a new programming language fast to fit the real world.

  • Hacking needs great computing skill and knowledge
...read more.

Conclusion

Finally, improve knowledge to development more powerful security software.

One way is we should increase skill to develop more powerful security software that can raise the alarm as soon as hacking happens. With the help of powerful security software, we can discover the direction and address hacking from. Then we can catch the hacker as soon as possible. Another way is improving the skilful of firewall to overcome hacking. With the skilful firewall, whatever the hackers use, hackers still cannot hack into the system.

Section 7

References and Bibliography

  • http://www.cs.utah.edu/~elb/folklore/C-bible.html
  • http://dante.creighton.edu:80/jargon
  • http://www.gnu.ai.mit.edu/copyleft
  • http://onlineethics.org/code/IEEEcode.html?text
  • “Do IT Professionals Need a Code of Ethics?” Beyond Computing Magazine Johnson, D (1999) http://www.beyondcomputingmag.com
  • “Workers Engaged in Unethical Activities” Mujica, A and Petry, E (1999) http://ehostvgw3.epnet.com/ehost.asp?
  • http://www.bbc.co.uk/education/ BBC News UK New force to tackle cybercrime.htm
  • How to become a hackerhttp://www.robson.org/gary/writing/becomeahacker.html
  • http://www.cgrg_ohio-state_edu-Astrolabe-noframes-topics-hacker-hacker_files/hacker.htm
  • http://netsecurity.about.com/gi/dynamic/offsite.htm?site=http://project.cyberpunk.ru/idb/hacker%5Fethics.html
  • http://www.uhigh.ilstu.edu/techethics/9-10/hacking.html

...read more.

This student written piece of work is one of many that can be found in our University Degree Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related University Degree Computer Science essays

  1. Information systems development literature review. Since the 1960s Methodologies, Frameworks, Approaches and CASE ...

    Another data flow present is Prescription, leading out of the process this identifies if a pet requires a prescribed treatment which is given to the external entity the client to give to the pet. * Process 1.4 labelled Process referral Details involves a number of happenings.

  2. The aim of this project is to develop a web-based control laboratory to serve ...

    To perform this task, the Altera DE2 Development and Education board (Figure 5) has been chosen as the control hardware. The Altera DE2 board comes with the Cyclone II EP2C35F672C6 FPGA (Field-programmable Gate Array) which is programmable to different hardware and software designs.

  1. Lifecycle Management Of Information Technology Project In Construction

    The collective ?um of all of thi? information can be thought of a? building information model or virtual building (whether or not an integrated ICT environment i? u?ed). During later pha?e?, thi? information drive? phy?ical deliverable? of con?truction work: creation of phy?ical component? them?elve?. Thi? view empha?ize? the continuum that flow? from virtual facility to phy?ical one.

  2. Voice Messaging - testing compression software. ...

    The technique used, is called GSM and is the same compression technique used by cell phones. A discussion of the said compression technique is given below. GSM "GSM" compression uses the algorithm GSM (Global System Mobile) which is employed by telephones.

  1. Introduction to Computer Forensics

    (included in the FRED System), Norton Ghost, DriveSpy, Image, PDWipe, PDBlock, PART (included in the FRED System), DriveSpy, PDWipe, PDBLock, AccessData - The Ultimate Toolkit: (FTK, PRTK, DNA, etc.) (Bill Nelson,2007) This method will allow as collect maximum amount of data against the suspect.

  2. The project explains various algorithms that are exercised to recognize the characters present on ...

    However, in one particular scenario of Case 2, the character B revealed as number eight on the TV screen. Both, character B and number 8 are identical in their shape and a slight variation on these characters result in the false recognition.

  1. Applying AI to Finance. The Symbolic and Sub-Symbolic approaches.

    This type of inherent fault tolerance contrasts strongly with expert systems, which usually fail to function even if one single processing part is non-operational. The major weakness of ANNs is their lack of explanation for the models that they create.

  2. Geometric Brownian Motion. The aim of this project is to gain an understanding ...

    > Geometric Brownian motion (Ito's lemma) will be implemented into the coding. The style of the coding will make the software accept user defined variables such as implementing error coding, then implementing output coding to show the GBM and V-a-R values of the chosen stock from the user.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work