Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
Ethical issue in computer crime
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: Ethical issue in computer crime
Hacking Activity Hackers are insidious beings who can wreak havoc on unsuspecting computer users and under protected systems. Predominantly, hackers attempt to corrupt systems in an effort to gain access to information that can be used for financial gain. However, hackers may also attempt to steal political information on political issues in order to gain information or knowledge that will benefit one political party over another. The daunting task of realizing what is considered a threat is the responsibility of information technologies (IT) executives (Rosenthal, 2002). Regardless that personal reason to hack a system, it is illegal and dishonest; therefore, stiff penalties and fines are handed out to those caught intruding another system without permission. Hacking for Profit An astounding event of boundless hacking happened in the mid 2000’s by Albert Gonzalez; incredibly, he orchestrated one of the identity theft schemes in American history (The Fraud Files, 2009). The moral implications of Cuban born Gonzalez’s actions caused undue stress and inconvenience for millions of affected Americans and the businesses he hacked; consequently, his actions landed him I …show more content…
The ethical implications for his actions drive fear in consumer confidence that adequate security measures are in place to protect the identity and financial information of electronic data. The ambiguous character traits that Albert Gonzalez displayed baffle the majority; therefore, Americans with knowledge of this and other similar acts of crime find it difficult to trust legitimate organizations. Every organization is the sum of many individual; therefore, a corporation with the best of intentions such as the secret service is not immune to deviant
When it comes to personal information in America, the genie is out of the bottle. As such, information security will continue to be a pressing concern especially to most of our top three-letter-agencies such as the CIA (Central Intelligence Agency), NSA (National Security Agency), DOD (Department of Defense), and HS (Homeland Security) as most of them are staffed with employees with top secret security clearances (also known as TS).When someone is given this clearance, not only are they slated to uphold an allegiance to core values but they are also entrusted with our nations’ sensitive secrets and are held to the highest standards. Many of these professionals are honest and loyal to their country, but all humans are susceptible to preservation, desires, and needs that the famous psychologist Maslow showed in his famous hierarchy of needs pyramid. As such, without undue temptation and trickery most handle their jobs well and uphold their commitments to quietly (sometimes loudly) dedicate their lives to patriotism.
The use of hacking to identify weaknesses in computer security has become an increasingly controversial issue in recent years. Awareness of this issue is important, because our ever increasing reliance on technology means that breaches in computer security have the potential to have wide-ranging and devastating consequences to society, worldwide. This essay will begin by clearly defining the term ‘hacking’ and will examine the type of people who hack and for what reasons. There will then follow a discussion of the moral argument on hacking before examining a few brief examples. The essay will then conclude by arguing against the use of hacking as a means of identifying weaknesses in computer security.
Issa utilizes statistics to suggest ideas. He says, “The Office of Personnel Management’s security breach resulted in the theft of 22 million Americans’ information, including fingerprints, Social Security numbers, addresses, employment history, and financial records” (Issa). Issa also adds that, “The Internal Revenue Service’s hack left as many as 334,000 taxpayers accounts compromised‑though just this week, the IRS revised that number to o...
In conclusion Hackers started off as experts in programming and curious intellectuals advancing the limits of technology, but have evolved into a diverse world view. Additionally the shift from hardware onto software to the internet have boosted the increase in number of malicious hackers. With the emergence of new technologies so is the renewed efforts to combat the loopholes and help protect the public.
About 15 million United States residents have their identities and information used fraudulently each year. Along the use of their identities, they also had a combined financial loss totaling up to almost $50 billion. Major companies such as Apple, Verizon, Target, Sony, and many more have been victims of consumer information hacking. In each of the cases, millions of consumers’ personal information has been breached. In the article “Home Depot 's 56 Million Card Breach Bigger Than Target 's” on September 18, 2014, 56 million cards were breached due to cyber attackers. Before the Home Depot attack, Target had 40 million cards breached. Company’s information is constantly being breached and the consumers’ are the ones who end up having to pay the price. If a company cannot protect the information it takes, then it should not collect the information.
One of today’s most valuable possessions is information. Whether it is personal information, bank routing numbers, private shopping preferences or trade secrets, information is the item everyone is trying to gain or protect. The current ability to access free information on such a multitude of topics is part of what makes the choice to commit cyber-crime so “cost” effective. A search on Google.com for “how to hack” turns up 289,000,000 results in .26 seconds! A quick internet search is all it takes for someone who previously would have had to work up the courage to “bump” into someone and the skill to silently pinch their wallet on a crowded street. A few clicks and they can effortlessly pinch private information out of someone’s computer, usually without their knowledge of the theft or the pain of having to meet your victim. “In terms of the root causes of crime, the Internet has provided extraordinary opportunities for financial crimes, mischief, and the destruction of infrastructure”...
Network hackers are forever inventing ways to break into the computer systems of organizations. Their aim is to take adventure of the susceptibilities of the system. Hackers remain only limited by the created activity of their minds. Hackers have the time, capability, and experience to infra trace any system. The organization has the responsibility to prevent hackers from infra tracing their system. Organizations remain required to plan for the assaults of hackers. Organization can only be better prepared to defend against hackers, if the organization has taken the necessary action to hinder the hackers’ assaults. There remain various ways in which an organization can prepare to do battle with hackers. The first step to battling hackers is for the organization to have an excellent understanding of its abilities and capabilities. Security analysis systems remain invented to aid organizations in the process of un...
Computer hackers in today's world are becoming more intelligent. They are realizing that people are constantly developing more hack-proof systems. This presents the hackers with a bigger challenge and a bigger thrill. The government is realizing this and is working on making harsher laws to, hopefully, scare the potential hackers. With the increase in hacking and hacker intelligence, governmental regulation of cyberspace hasn't abolished the fact that it's nearly impossible to bring a hacker to justice.
As mentioned before, the focus of this paper is to compare and contrast human error and hacking. Hacking can be defined as exploitations to weaken a computer systems. Thus, creating a breach in information security and is done for many reasons mainly for financial gains and to exposed hiding agenda whereas human error occurs as a result of one of the following reasons: loss of administrative credentials, employee negligence, and third party access just to name a few.
On the other hand, some may argue that hackers are considered as “Cyber Heroes”. According to CTU Doctoral Chair of Computer Service, Bruce Harmon, “Breaking into computer networks is illegal even if for less self-serving purposes.” To become an ethical hacker, they, likewise, have to acquire methods on how to complete tasks, unauthorized, which would be illegal (Harmon). Not only does computer h...
Hacking has become such a problem in today’s computer dependent society that stronger measures must be implemented to stop hackers, and if hackers are still successful, they should be severely punished. Hackers are a problem because with the amount of businesses and corporations we depend on ...
Outside of the computing community, a hacker can be defined as someone engaged in the circumvention of computer security. Hacking in this sense has been a largely common feature in popular media for decades now, and, despite the practice repeatedly being portrayed by mass media in a negative light, we seem to have a long-held fascination. I’m going to be examining two separate representations and looking at the wider impact they may have.
Taylor, Paul. "A Sociology of Hackers." The University of East London, United Kingdom. February 16, 2000. http://www.job.am/inet98/2d/2d_1.htm
Another ethical problem with computers is hacking. Hacking is the computer equivalent of breaking and entering. A computer hacker uses his or her skills to gain unauthorized access t...
The advancement of computer technology makes the world easier place to live by facilitating the fields of science, medicine, and education. Although computers benefit us from many aspects, they also have negative implications. Many criminals use the computer to take or alter data, and to gain unlawful access of computers, by using computer worms, viruses, and Trojans. Which has posed new challenges for the government and the society. Due to the versatility of the computer, drawing lines between criminal and non-criminal behavior regarding its use can be difficult. About fifty years ago, hacking was the art of figuring out unique solutions. The hackers broke into computers and networks because they were curious and those tools were inaccessible. In today’s world hacking is a means for getting dollars, not a hunt for information and knowledge. Presently criminals are struggling hard to find new ways to hack the personal information and financial data from user’s computers. Therefore, hacking has become a serious problem in today’s computer dependent society, people should implement stronger measures to stop