We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy

Computer Crime – Hacking Paper

Words: 1849, Paragraphs: 52, Pages: 7

Paper type: Essay, Subject: Hacking & Cracking

Section 1:

A brief description of the issue I have chosen to study, in particular indicating how my area of interest has changed since the project proposal, either because the actual issue has evolved since the initial proposal, or as a result of tutor feedback, or as a result of your research.

Hacking involves using a computer to gain unauthorized access to another computer system. Although at first “hacker” was a positive term for a person with a mastery of computers who could push programs beyond what they were designed to do, it has by now become almost synonymous with illegal activities like breaking into protected computer systems, releasing viruses, stealing passwords or other sensitive data, denial of service so on.

In my project proposal, I was only interested in the event of hacking crime and how hacking perpetrates a crime. As a result of my research, I have changed my interested area to the motivation and mentality of hacking, why hacking perpetrates a computer crime and finding solution to overcome hacking.

We will write a custom essay sample on Computer Crime – Hacking specifically for you
for only $16.38 $13.9/page

Order now

Unnumbered hacking crimes happens everyday. And the number of hacking crimes is still increase everyday. So overcome the hacking crime must be imperative under this situation. If we want to overcome hacking crime, not only know the motivation and mentality of hacking and why hacking perpetrates a computer crime, but we also need to research the participants of hacking and the rank of importance of difference participants. From analysis hacking, I should find out some appropriate solutions of hacking crime.

Although hacking has already become synonymous with illegal activities or computer crime, hacking also refers as great skill and knowledge of computing. If hacking can performance following the ethical standard, hacking is also a kind of power that can advance technology and society development.

Section 2:

A description of the ethical choices involved in my issue. Where possible I should indicate both sides of the dilemma.

My issue is concerned with control in use of computers and the development of computer systems. I think there is a line between “right” side and “wrong” side of my issue – hacking. The line should be the computing ethics.

First, I will talk about the “right” side of the hacking in my opinion. Hacking involves using a computer to gain unauthorized access to another computer system. It acts requiring great skill and knowledge of computer systems. No system or software is one hundred percent secure and safe. With the help of hacking we can detect system or software security problems. And we can detect new flaws and bugs all the time. Therefore we need to build newer and better versions of software to overcome the found flaws and bugs. If there is no hacking in the world, the technology won’t have advanced to today’s standard and we won’t have the improvement in software and system that we have today. So the hacking can advance the development of computer system.

Hackers only need all information should be free. If all information were free there would be no computer crime happens. It would save money, time, and resource to do the protection of the system or software. So hacking advance the freedom of information.

Hackers are doing no harm and changing nothing. The hacking cannot cause assault and battery to anybody. Hacking merely learns how systems operate. Hacking doesn’t disturb human natural life.

But in my opinion the hacking has another “wrong” side. Although hacking doesn’t cause assault and battery to anybody directly, it usually performances activities like breaking into protected computer systems, releasing viruses, stealing passwords or other sensitive data, denial of service so on. And public announcements of hacking may affect customer trust and privacy. So hacking is damaging computer ethics, people’s privacy, and human rights.

Hacking has already perpetrated a crime. So we need to detect and overcome hacking. But overcoming and detecting hacking usually spends high cost of time, resource, and money. So hacking is the reason to run to waste.

In conclusion, if it performances following the ethical standard, hacking will seemed to be right and should be developed. If it perpetrates a crime and does harm to human and society, hacking will seemed to be wrong and be overcome.

Section 3

An identification of the primary, secondary and implied participants in the issue.

Primary participants

* Hacker has extraordinary programming skill, cleverness in the face of difficulty, an ability to suspend all other activities while producing a solution to a problem, an appreciation for a clever solution to a seemingly insignificant problem and uses a computer to gain unauthorized access to another computer system.

* Company, be hacked, computer system be broke in or password is stolen, the casualty in hacking crime.

Secondary participants

* Programmer, has sound programming skill, responsible for developing system and maintaining system

* System analyst, responsible for doing researching and analyzing system, making decisions in the development of the system, and testing the system.

* The customer, who is the customer of the company that is hacked, who is the user of the software or system that is hacked

Implied participants

* Students, be clever, have enough time to commit a crime, love computer, and have extraordinary programming skill. [primary implied participant]

* Programmer, who built software to detect system or software security problems and the software, is misused by hacker. [primary implied participant]

* Company white collar, uses computer every day and has sound internet skill. [secondary implied participant]

Section 4

Outline of key points, actions or decisions in the issue, and a justification or discussion about those key points, actions or decisions. You should try to use ethical and professional principles in your justification discussion.

The motivation of hacking

* Economic motive

I read an article about the hackers in a magazine. A pressman asks a hacker:” why do you hack?” The hacker answers:” For money.” Most of hacker hack computer for heist money. They use their greater computing skill and knowledge to gain unauthorized access to another computer system easily. After they break in the system, they can heist money as they wish. There is a case about the economic motive of hacking: In late 1980s, First National Bank of Chicago is the victim of a $70-million computer heist.[www.sptimes.com/Hackers/story_level.html; Article Title: A history of hacking] According the case above, we can see in that event First National Bank lost 70 millions dollars. First National Bank is the direct victim of this event. And the customer is the indirect victim of this event. The hacking has damages the customer’s natural life and human rights. The hacking in this case has perpetrated a crime and not been ethical.

* Occupationally related

Some employers don’t satisfy the employees. Therefore the employers hack the company’s computer system to retaliate the employer. The employers break in the company’s computer system to distribute computer virus, maliciously delete company’s important files, or make some changes of company’s account to obtain fraudulent credit. If the employers do like that, the employers have perpetrated a crime. Because the employers damage the company, and customer trust and privacy by hacking. Finally the employer will be punished by lawing.

* Understanding systems

Some companies usually find some hackers to hack companies’ new system. Every company wants to build a security and safe computer system. But there is no one hundred percent security and safe system in the real-world. The company wants to find the bugs, flaws and any other problems with the help of hacking system. So the company finds some hackers using different great computing skill to hack the new system to detect the problems as soon as possible before the system is used. Hacking can advance the development of computing system. In that way, hacking will be professional ethical.

* To find stimulate and challenge

Some people like to hack computer systems because they want to find stimulate challenge. Most of this kind of people is student. Student has enough time, computing skill or knowledge, and curiosity to hack computer systems. I heart a case that several years ago, two students hacked U.S. National Defense Department computer system. At last, the two students were caught. Because hacking a computer system without the permission of the host or the owner of the system is an illegal activity. Breaking into computer system with unauthorized access is also not ethical, because it damages the department security.

All above show that, if the motivation of hacking is for self economic motive, heist money, retaliation or any other things, it will be seemed not ethical. If the motivation of hacking is for advancing the development of system or software, it will be seemed professional ethical. In another word to say if you hack a computer system with the permission of the host or the owner of the system, your action will be ethical and legal. If not, your action will be not ethical and illegal. And greater the crime you perpetrated, higher the gallows you will be punished.

Characteristic of hacking

* Learning something special of a programming language or system

Hacking is a special skill in using programming language that cannot be learned from the lecture of university. Someone wants to learn the special things of programming or system from that.

* Producing and practicing the programming is better than just theorizing about it

Hacking is more important in practicing programming. If you just theorizing programming and never producing/practicing programming, you will never hack system successfully.

* Appreciating someone else’s hacking

Hacking doesn’t only need great skill and knowledge, it also needs interesting. Some hacker doesn’t know what is hacking before becoming a hacker. He will know hacking from appreciating someone else’s hacking. He is interesting in hacking and start to learning harking.

* Learning a new programming language fast

A good hacker must have the capable to learn a new programming language fast. In the real-world, the technology is changing and increasing fast. And the system is building more security and safe using different and new technology. So a good hacker should have the capable to learn a new programming language fast to fit the real world.

* Hacking needs great computing skill and knowledge

Hacking a system means breaking in a system. It doesn’t only need to know how to build a system, but also needs to know how to find a bug or flaws in the system to break in the system. So hacking need great computing skill and knowledge.

From the characteristics of hacking you can know hacking is a very professional speciality. It needs a person have great programming skill and knowledge, cleverness in the face of difficulty, an ability to suspend all other activities while producing a solution to a problem, an appreciation for a clever solution to a seemingly insignificant problem. If the hacking doesn’t follow the computing ethical standard that damaging computer ethics, people’s privacy, human rights and our natural life, it must be overcome as soon as be detected. If the hacking follows the computing ethical standard that advance the development of system and IT industry, it will be gone on developing.

How to cite this page

Choose cite format:

Computer Crime – Hacking. (2017, Nov 26). Retrieved from https://paperap.com/paper-on-computer-crime-hacking/

We will write a custom paper sample onComputer Crime – Hackingspecifically for you

for only $16.38 $13.9/page
Order now

Our customer support team is available Monday-Friday 9am-5pm EST. If you contact us after hours, we'll get back to you in 24 hours or less.

By clicking "Send Message", you agree to our terms of service and privacy policy. We'll occasionally send you account related and promo emails.
No results found for “ image
Try Our service

Hi, I am Colleen from Paperap.

Hi there, would you like to get such a paper? How about receiving a customized one? Click to learn more https://goo.gl/CYf83b