Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
Dangers on the internet
Dangers on the internet
Dangers of the internet
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: Dangers on the internet
Introduction
Nowadays the attacks through the Internet have increased. Those attacks are under the name of malwares. Malwares are malicious software, such as a virus, Trojans, which is specifically designed to disrupt or damage a computer system. Since malwares contains most of the Internet attacks. One of the malwares attacks called the script kiddies. They are known by their ignorance and lack of knowledge about the information system, Internet and computers attacks. Those script kiddies have some motivations and accomplishment to prove to the society that they can control important website so they could control the users accounts and effect other people from society.
Importance of Securing Our System From Hackers
With our world today, technology has become a huge part of our lives. We use it from the simple tasks we do to the most complex and important ones. For this reason, we should take measures into making sure that our files and information are safe. To do this, we could simply start with creating complex and different passwords for each website we use. Next, we could back up our data in case of an attack from a hacker or a virus. Lastly, we need to remind ourselves to update the software we use and most especially our antivirus. These simple steps are what are needed for a better protection in the world of our growing technology.
Different Types of Hackers
Initially, there are only two types of hackers, which are the white hat hacker, and the black hat hacker. As the name suggests, the white hat hacker is the “good” or “ethical” hacker that works for a legal organization, security companies, and government. Their main purpose is to protect the information and data of the organization they are working for. However, th...
... middle of paper ...
... America: Cengage Learning.
Deutsch, W. (n.d.). A Definition of the Security Term White Hat Hacker. About. Retrieved from http://bizsecurity.about.com/od/glossary/g/A-Definition-Of-The-Security-Term-Em-White-Hat-Hacker-Em.htm
Leonard, C. (n.d.). The cybercrime ‘five’: are all hackers the same [PDF document]. Retrieved from http://www.websense.com/assets/guides/guide-hacker-types-en.pdf?cmpid=pr
Script-kiddies. (n.d.). Retrieved from http://www.iss.net/security_center/advice/Underground/Hacking/Script-Kiddies/default.htm
What is a script kiddie. (2010). Retrieved from http://www.pctools.com/security-news/script-kiddie/
What is a script kiddie. (n.d.). Retrieved from http://www.secpoint.com/what-is-a-script-kiddie.html
Goodwin, B.(n.d.). Firewalls, script kiddies and honeypots. Retrieved from http://www.computerweekly.com/feature/Firewalls-script-kiddies-and-honeypots
In reality, most hackers are ordinary people with a great deal of curiosity, above-average skills with a computer, a good understanding of human nature, and plenty of time to kill. Hackers have no distinguishing characteristics. Your next-door neighbor could be a hacker, as could your niece or nephew, one of your co-workers, or even the kid who serves you coffee in the morning. Not all hackers are dangerous and out to destroy business or damage lives. The view of the general public toward hackers is mixed. A recent CNN-poll shows 33% of respondents labeling hackers as "useful," 17% seeing them "as a menace," and the majority (45%) seeing hackers as "both" useful and a menace (CNN, 1999).
Our generation is the first to travel within cyberspace, a virtual world that exists with all the computers that form the global network. For most people today, cyberspace is still a bewildering and alien place. How computers work and how they affect our lives is still a mystery to all but the experts, but expertise doesn't necessarily guarantee morality. Originally the word hacker meant computer enthusiasts but now that the internet has revealed its potential for destruction and profit the hacker has become the outlaw of cyberspace. Not only do hackers commit crimes that cost millions of dollars, they also publicize their illegal techniques on the net where innocent minds can find them and be seduced by the allure of power and money.
Multi-platform computer worms are a tool that computer hackers use to infect computers to gain control access. Computer worms are a dangerous virus because they are self-replicating, meaning that they multiply themselves and spread onto other computer networks seeking a lapse in internet security. Computer worms do not need to attach themselves onto an existing computer program to gain access to the victim computer files. The computer worm was created on accident by a Cornell student named Robert Morris; he was seeking a way of managing the internet in 1988. “Morris had no malicious intent, but a bug in his program caused many of the computers the worm landed on to crash. … but worms had come of age and have since evolved into an effective way of attacking systems connected to the internet” (Barwise). Today, hackers use the Morris worm to infect computers. “Five men believed to be responsible for spreading a notorious computer worm on Facebook and other social networks — and pocketing several million dollars from online schemes — are hiding in plain sight in St. Petersburg, Russia …” (Richmond). Since the good intended creation of the worm it has only been used maliciously as a computer virus by money seeking computer hackers such as the Koobface gang in Russia.
The documentary Rise of the Hackers, focuses on the rising criminal use of hacking and how it is effecting multiple areas of technology. The documentary describes simple and complicated situations concerning hacking, but there still questions that must be answered when it comes to hacking and crime. The main question is in trying to determine why a person would choose to commit computer hacking. There are various theories already present within the criminal justice system that may explain at a micro-level and macro-level. These theories would explain why offenders would commit the crimes, but it may not answer the full scope of the question. The Routine Activities Theory would help to explain why offenders offend, why victims are victimized,
The use of hacking to identify weaknesses in computer security has become an increasingly controversial issue in recent years. Awareness of this issue is important, because our ever increasing reliance on technology means that breaches in computer security have the potential to have wide-ranging and devastating consequences to society, worldwide. This essay will begin by clearly defining the term ‘hacking’ and will examine the type of people who hack and for what reasons. There will then follow a discussion of the moral argument on hacking before examining a few brief examples. The essay will then conclude by arguing against the use of hacking as a means of identifying weaknesses in computer security.
The Ted Talk presented by Catherine Bracy took the word hacking to another level. A new way of looking at a hacker. A hacker meaning much more than a teen behind a computer trying to steal information. The points she brought out is that reaching out to the people can get things done and strengthen relationships between people and an organization and through that relationship both parties are more stable and content. Bracy expressed her experiences with hackers in a government and citizen view, but this can also be applied to personal and
In today’s society technology is used for everything. With the invention of computers and the internet this open doors to the cyber world. Today you can do almost anything without having to leave your home. The internet gives us the opportunity of shopping online, ordering food online, working from home and video chatting with friends and family across the world. Everyone has a computer and internet access in their homes. While the internet is really convenient it also opens doors for cybercrimes, loss of privacy and the need for computer security.
The term “hacker” has been in use since the early 1980’s due to mass media usage to describe computer criminals. The use of this term is vastly used by the general population and most are not aware that there are different meanings to the word. People within the computing community especially within the programming subculture emphasize the use of the term “crackers” for computer security intruders (cyber criminals). Early hackers rarely used their skills for financial gain as a motivation for their criminal behavior in that time cybercrime was infantile and largely seen as a practical joke or game by those who committed it. Bob Thomas created the first credited computer worm n...
Harvey, Brian. A. Computer Hacking and Ethics. Ed. Paul Goodman, P.G., a.k.a. Electrical Engineering and Computer Science.
Black hat hackers majorly damage computer users and large organizations by exploiting sensitive data, shutdown of servers and modifying data in websites and network.
The World Wide Web and Internet is great place to study, work, and even play. Unfortunately, there is also a very ugly side of the cyber world and the way people are treated online. There is a very large number of people that are being cyberstalked and harassed especially women. Cyberstalking is a form of electronic crime by way of the internet to harass or stalk their individuals. These acts can target an individual, groups, and even organizations. Cyberstalking can be carried out by a number of different electronic and digital threats. Most commonly cyberstalking is known for its malicious intent to attack a victim through email, online chat forums, and social media. A cyber stalker could be an online stranger or someone whom
The Art of exploring various security breaches is termed as Hacking.Computer Hackers have been around for so many years. Since the Internet became widely used in the World, We have started to hear more and more about hacking. Only a few Hackers, such as Kevin Mitnick, are well known.In a world of Black and White, it’s easy to describe the typical Hacker. A general outline of a typical Hacker is an Antisocial, Pimple-faced Teenage boy. But the Digital world has many types of Hackers.Hackers are human like the rest of us and are, therefore, unique individuals, so an exact profile is hard to outline.The best broad description of Hackers is that all Hackers aren’t equal. Each Hacker has Motives, Methods and Skills. But some general characteristics can help you understand them. Not all Hackers are Antisocial, PimplefacedTeenagers. Regardless, Hackers are curious about Knowing new things, Brave to take steps and they areoften very Sharp Minded..
As the internet has evolved it is now a part of many people’s daily lives and with that, many could not function or conduct their daily business or lives without it. It is impressive that we can now communicate and even see someone all the way across the country with just a few clicks of a mouse. But as technology changes and progresses seemingly for the good, many will always find ways to exploit technology and use it with the intent of committing crime, turning a positive tool into a negative one. As such the negative side of the World Wide Web, cybercrime has evolved as just one of the major disadvantages of the internet. Cybercrime itself is a broad term and can and does include any crime that is committed via the internet or computer network including seemingly minor acts as downloading music, to denial of service attacks, to even acts of cyber-terrorism. With the newly formed threat of cybercrime has also come new ways for law enforcement to attack and prevent it as well but with limited resources not much can be changed but to continue to prevent new methods from approaching the cybercrime world. This is not only just in our own neighborhoods but is at an international scale. This paper generates the insight about the overall rise of cybercrime among our societies. The main focus of this paper is to describe the types of computer crimes and its effects on individuals and businesses.
To be able to understand cybercrimes we need to know where it started. It all started with the birth of the internet. In the late 1960s, one of the authors (HMD) was a graduate student at MIT. His research at MIT’s project MAC (now the Laboratory for computer – the home of the World Wide Web Consortium) was funded by APRA – the Advanced Research Projects Agency of the Department of Defense. Later on APRA proceeded to implement the APRANET, which even...
Cybercrime is a global issue plaguing the world. The dictionary defines cybercrime as “crime conducted via the Internet or some other computer network”(Merriam-Webster). The definition remains very broad because the word “cyber” is defined as “relating to the culture of computers, information technology, and virtual reality.” Due to the growing number of people gaining access to the internet, rapid development of technology, and the globalization of the world, more of the world population is becoming susceptible to involvement in cybercrime – whether it be as a victim or a criminal. Cybercrime involves different levels of the world on both the victim and criminal side, from an individual citizen, to small groups, businesses, and the government, to the countries of the world.