• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Computer Crime - Hacking

Extracts from this document...

Introduction

Computer Crime – Hacking

Section 1:

A brief description of the issue I have chosen to study, in particular indicating how my area of interest has changed since the project proposal, either because the actual issue has evolved since the initial proposal, or as a result of tutor feedback, or as a result of your research.

Hacking involves using a computer to gain unauthorized access to another computer system. Although at first "hacker" was a positive term for a person with a mastery of computers who could push programs beyond what they were designed to do, it has by now become almost synonymous with illegal activities like breaking into protected computer systems, releasing viruses, stealing passwords or other sensitive data, denial of service so on.

In my project proposal, I was only interested in the event of hacking crime and how hacking perpetrates a crime. As a result of my research, I have changed my interested area to the motivation and mentality of hacking, why hacking perpetrates a computer crime and finding solution to overcome hacking.

Unnumbered hacking crimes happens everyday. And the number of hacking crimes is still increase everyday. So overcome the hacking crime must be imperative under this situation. If we want to overcome hacking crime, not only know the motivation and mentality of hacking and why hacking perpetrates a computer crime, but we also need to research the participants of hacking and the rank of importance of difference participants.

...read more.

Middle

Company white collar, uses computer every day and has sound internet skill. [secondary implied participant]

Section 4

Outline of key points, actions or decisions in the issue, and a justification or discussion about those key points, actions or decisions. You should try to use ethical and professional principles in your justification discussion.

The motivation of hacking

  • Economic motive

I read an article about the hackers in a magazine. A pressman asks a hacker:” why do you hack?” The hacker answers:” For money.” Most of hacker hack computer for heist money. They use their greater computing skill and knowledge to gain unauthorized access to another computer system easily. After they break in the system, they can heist money as they wish. There is a case about the economic motive of hacking: In late 1980s, First National Bank of Chicago is the victim of a $70-million computer heist.[www.sptimes.com/Hackers/story_level.html; Article Title: A history of hacking] According the case above, we can see in that event First National Bank lost 70 millions dollars. First National Bank is the direct victim of this event. And the customer is the indirect victim of this event. The hacking has damages the customer’s natural life and human rights. The hacking in this case has perpetrated a crime and not been ethical.

  • Occupationally related

Some employers don’t satisfy the employees. Therefore the employers hack the company’s computer system to retaliate the employer. The employers break in the company’s computer system to distribute computer virus, maliciously delete company’s important files, or make some changes of company’s account to obtain fraudulent credit. If the employers do like that, the employers have perpetrated a crime. Because the employers damage the company, and customer trust and privacy by hacking. Finally the employer will be punished by lawing.

  • Understanding systems

Some companies usually find some hackers to hack companies’ new system. Every company wants to build a security and safe computer system. But there is no one hundred percent security and safe system in the real-world. The company wants to find the bugs, flaws and any other problems with the help of hacking system. So the company finds some hackers using different great computing skill to hack the new system to detect the problems as soon as possible before the system is used. Hacking can advance the development of computing system. In that way, hacking will be professional ethical.

  • To find stimulate and challenge

Some people like to hack computer systems because they want to find stimulate challenge. Most of this kind of people is student. Student has enough time, computing skill or knowledge, and curiosity to hack computer systems. I heart a case that several years ago, two students hacked U.S. National Defense Department computer system. At last, the two students were caught. Because hacking a computer system without the permission of the host or the owner of the system is an illegal activity. Breaking into computer system with unauthorized access is also not ethical, because it damages the department security.  

All above show that, if the motivation of hacking is for self economic motive, heist money, retaliation or any other things, it will be seemed not ethical. If the motivation of hacking is for advancing the development of system or software, it will be seemed professional ethical. In another word to say if you hack a computer system with the permission of the host or the owner of the system, your action will be ethical and legal. If not, your action will be not ethical and illegal. And greater the crime you perpetrated, higher the gallows you will be punished.

Characteristic of hacking

  • Learning something special of a programming language or system

Hacking is a special skill in using programming language that cannot be learned from the lecture of university. Someone wants to learn the special things of programming or system from that.

  • Producing and practicing the programming is better than just theorizing about it

Hacking is more important in practicing programming. If you just theorizing programming and never producing/practicing programming, you will never hack system successfully.

  • Appreciating someone else's hacking

Hacking doesn’t only need great skill and knowledge, it also needs interesting. Some hacker doesn’t know what is hacking before becoming a hacker. He will know hacking from appreciating someone else’s hacking. He is interesting in hacking and start to learning harking.

  • Learning a new programming language fast

A good hacker must have the capable to learn a new programming language fast. In the real-world, the technology is changing and increasing fast. And the system is building more security and safe using different and new technology. So a good hacker should have the capable to learn a new programming language fast to fit the real world.

  • Hacking needs great computing skill and knowledge
...read more.

Conclusion

Finally, improve knowledge to development more powerful security software.

One way is we should increase skill to develop more powerful security software that can raise the alarm as soon as hacking happens. With the help of powerful security software, we can discover the direction and address hacking from. Then we can catch the hacker as soon as possible. Another way is improving the skilful of firewall to overcome hacking. With the skilful firewall, whatever the hackers use, hackers still cannot hack into the system.

Section 7

References and Bibliography

  • http://www.cs.utah.edu/~elb/folklore/C-bible.html
  • http://dante.creighton.edu:80/jargon
  • http://www.gnu.ai.mit.edu/copyleft
  • http://onlineethics.org/code/IEEEcode.html?text
  • “Do IT Professionals Need a Code of Ethics?” Beyond Computing Magazine Johnson, D (1999) http://www.beyondcomputingmag.com
  • “Workers Engaged in Unethical Activities” Mujica, A and Petry, E (1999) http://ehostvgw3.epnet.com/ehost.asp?
  • http://www.bbc.co.uk/education/ BBC News UK New force to tackle cybercrime.htm
  • How to become a hackerhttp://www.robson.org/gary/writing/becomeahacker.html
  • http://www.cgrg_ohio-state_edu-Astrolabe-noframes-topics-hacker-hacker_files/hacker.htm
  • http://netsecurity.about.com/gi/dynamic/offsite.htm?site=http://project.cyberpunk.ru/idb/hacker%5Fethics.html
  • http://www.uhigh.ilstu.edu/techethics/9-10/hacking.html

...read more.

This student written piece of work is one of many that can be found in our University Degree Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related University Degree Computer Science essays

  1. Introduction to Computer Forensics

    Most important step for investigator that he has to do is to document every step that they are making and provide proof that they collected all information from suspect's computer without loosening, changing or damaging it.( Marie-Helen Maras, 2012) Investigator can collect bunch of evidence, that can be useful, but

  2. The aim of this project is to develop a web-based control laboratory to serve ...

    hardware we will be using the Altera DE2 Development and Education board. Figure 2 below shows the block diagram of the proposed solution and the details of each component will be explained in the following subsections. Figure 2: Proposed design of the web-based control laboratory 4.1.

  1. The project explains various algorithms that are exercised to recognize the characters present on ...

    These options are available in the build option of the project tab menu. There are two optimization option which can be used to improve the performance viz., opt speed vs. size and opt level. Opt Speed vs Size option is used to let the compiler know whether the user is

  2. Applying AI to Finance. The Symbolic and Sub-Symbolic approaches.

    * Bankruptcy predictions. (From the study of Dorsey et al., University of Missouri Business School, 1995, as cited in Siegel and Shim, 2003.)A neural network was used to predict which companies would become bankrupt during the year 1995, based on publicly available information (from America Online's Financial Reports database)

  1. Information systems development literature review. Since the 1960s Methodologies, Frameworks, Approaches and CASE ...

    pp. 100-101 [Online]. Available from: http://portal.acm.org/citation.cfm?id=129860&coll=&dl=ACM&CFID=15151515&CFTOKEN=6184618 [Accessed 14th April 2009]. Yeates, D. & Wakefield, T. (2004). Systems Analysis and Design. Essex: Pearson Education Limited. 10.0 Bibliography Avison, D. & Fitzgerald, G. (2006). Information Systems Development methodologies, techniques & tools. Maidenhead:McGram-Hill Education. Fitzgerald, B., Russo, N.L. & Stolterman, E. (2002).

  2. Geometric Brownian Motion. The aim of this project is to gain an understanding ...

    The 'Clear fields' command button should remove all contents from the textboxes and unselect the highlighted company chosen. Yes 7 To check to see if the 'Next' command in user form 2 (CompSelect) button displays a new user form. The 'Next' command button should hide user form 2 called 'CompSelect' and display user form 3 called 'SelectFigures'.

  1. Ethics and professionalism in computing - examples from Facebook and Google

    In a world of asynchronous threats, it is too dangerous for there not to be some way to identify you. We need a [verified] name service for people. Governments will demand it." Google also put this anonymity problem into their Privacy Policy.

  2. Precise analysis about The legal or illegal utilization of Internet cookies

    In recent years it also has raised concerns in internet users about their privacy (Palmer 2005, p. 271). As stated by Lin and Loui (1998, p. 47), some uses of cookies are morally allowed and cannot be a serious

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work