Computer Hacking is never acceptable. Discuss.

Authors Avatar

Computer Hacking is never acceptable. Discuss.

Nowadays, the world-wide network, the Internet, is a very popular place for people. Regardless of which interests people might have, they can always find something interesting on the Internet. The Internet has become more and more well-known, and therefore the number of people using it increases all the time. It also gives possibilities for people who have another purpose than just surfing on the Internet. That is where computer hacking comes in to the subject. When people hear the word “hacking”, the first thing they always think of is people breaking into others’ computers and causing damage. This is correct, because “computer hacking always involves some degree of infringement on the privacy of others or damage to computer-based property such as files, web pages or software” (Stone, 1999). Furthermore, a computer hacker is a person who breaks into others’ computers. A computer hacker is someone who lives and breathes computers, someone who knows all about computers, and who can get a computer to do anything. Equally important, though, is the hacker’s attitude. “Not all hackers break into systems just for the fun of it. Some do it for profit – and some of these are even legitimate” (Cheswick et al., p. 132). In other words, computer programming must be a hobby, something done for fun, not just of duty or for the money. According to The New Hacker’s Dictionary on the Internet, a hacker can be defined as:

  1. A person who enjoys exploring the details of programmable systems and how to stretch their capabilities, as opposed to most users, who prefer to learn only the minimum necessary.
  2. One who programs enthusiastically (even obsessively) or who enjoys programming rather than just theorizing about programming.
  3. A person capable of appreciating hack value.
  4. A person who is good at programming quickly.
  5. An expert or enthusiast of any kind. One might be an astronomy hacker, for example.
  6. One who enjoys the intellectual challenge of creatively overcoming or circumventing limitations. (Raymond, n.d.)

Before we go on, it is important to distinguish two concepts; hacking and cracking. In the daily round, people use them synonymously. The American guru of hacking, Eric S. Raymond, defined in his book about hacking that “hackers build things, crackers break them” (Interhack, 2000). Hackers test computer systems to decide how secure they are. Crackers, on the other hand, break into secure systems just to see if they can do it. There is a clear distinction between these two motivations. One is honorable, valuable and legal. The other one is not.

In this essay, I am going to debate whether computer hacking is always negative or not. Are there any situations where hacking is acceptable? The answer may vary from person to person and from situation to situation.

Why is hacking so wrong and unacceptable? First of all, hacking breaks the right to private property and personal life. Everyone’s computer contains sensitive and personal data, and of course the owners do not wish to let anyone hacks into their computers and gets entrance to all of these personal data. According to the Norwegian newspaper on the Internet, VG, there was a 20 year old boy who hacked into the Internet bank which belongs to a bank in Denmark, Nordea. He installed a remote control software on the customer’s computer, then steered into this computer and tricked the customer out of 25.000 Norwegian Kroners (NOK) by the remote control. The police have charged this hacker with computer crime ( A, 2004).

Join now!

Secondly, hacking can cause both enormous and serious damage. For example, a computer system that has been hacked might not only get important data destroyed, but also loss of economic resources. It can even damage the world economy. According to VG, a new computer virus was found in January 2004. This computer virus was called ‘Mydoom’, also known as ‘Novarg’. This virus has spread rapidly via the Internet all around the world’s computers, disguised as a normal email with an error message which tells you that a message from one of your contacts does not show as usual ( ...

This is a preview of the whole essay