Computer Hacking is Ethical Essay Example
Computer Hacking is Ethical Essay Example

Computer Hacking is Ethical Essay Example

Available Only on StudyHippo
  • Pages: 10 (2626 words)
  • Published: January 23, 2018
  • Type: Essay
View Entire Sample
Text preview

In our society, the term "ethical computer hacking" is commonly associated with cyber-crimes, website defacement, or disabling websites. However, this perception, shaped by media, does not accurately depict genuine hackers. It is important to recognize that computer hacking is just one type of hacking prevalent in today's world.

The art of racking a telephone network, known as hacking, originated from appearing ("A Brief History of Computer Hacking"). While hacking is often viewed as unethical or wrong, it can also have benefits. There are various types of computer hackers, such as "Hastiest" hackers who intend to express a political opinion, "Hobbyist" hackers who find enjoyment in hacking, and "Research hackers" who hack to learn about security and fix vulnerabilities ("License to hack? Ethical hacking"). Initially, hackers were not motivated by financial gain. In 1878, a group of teenagers responsible for main

...

taining the New York switchboard were fired because they were curious about the phone system's workings and how calls were distributed to specific locations. Their actions were essentially similar to early computer hackers.

According to "Timeline: A 40-Year History of Hacking," these boys tried to infiltrate the telephone system in order to comprehend and observe how the switchboard functioned. Computers were not as user-friendly with graphical interfaces back then as they are today. Mainframe computers were widely preferred during that era, and many universities and companies designated dedicated spaces for these heavy mainframes, which were essentially big metallic blocks housed in controlled environments. Due to their expensive price tag and limited availability, users had to face challenges when seeking access to these sluggish machines.

Due to the high cost and resource requirements of mainframe computers

View entire sample
Join StudyHippo to see entire essay

computer programmers took risks to find ways to expedite processes and enhance hardware performance. This involved investing time, knowledge, electricity, and money. The objective was to enable the machines to accomplish tasks and operations more swiftly. Hiring a hacker to modify one's computer could significantly improve business functionality.

During the sass, the term "Hacker" gained its current definition in the world today. Users realized that they could utilize their understanding of computer mechanisms for personal benefits. It was during this time that viruses, mallard, and various detrimental cyber infections were developed by hackers for monetary gains ("Timeline: A 40-Year History of Hacking"). In the early sass, John Draper discovered that he could replicate the sound produced by a telephone using a whistle he obtained from a cereal box.

Using a whistle, Draper was able to replicate the 2600-hertz audio tone and obtain free long-distance calls, earning him the nickname "Captain Crunch." In the 1970s, a computer club in California invented "Blue Boxes," devices that could modify a telephone tone to match that of a telephone, making tampering easier. These boxes were created by Steve Jobs and Steve Wozniak, founders of Apple Inc. This decade also saw the emergence of computer and telephone hacking magazines, providing techniques for aspiring hackers and access to those who had already engaged in illegal activities. The increased attention towards hackers resulted in the passage of a new law called The Comprehensive.

The Secret Service gained jurisdiction over credit card and computer fraud cases through the Crime Control Act ("INCURS Abstract"). In 1987, a seventeen-year-old was arrested for hacking into AT's computer network. He was caught after boasting about it on

an online bulletin board. According to federal authority, the hacking took place in his bedroom and he was dangerously close to breaching AT&T's switching system, which controlled much of the nation's communication access ("Timeline: A 40-Year History of Hacking").

In 1988, Robert Morris, a recent graduate from Cornell University, developed the initial self-replicating virus named the Morris-worm. Its purpose was to exploit a security flaw in UNIX-based systems and eventually infected approximately 10% of internet-connected machines. Consequently, Morris had to deal with legal repercussions such as three years of probation, 400 hours of community service, and a $10,000 fine ("Zen and the Art of the Internet").

During the mid to late ass, there were no significant hacks. However, within this time frame, two hackers named Data Stream targeted institutions like NASA and the Korean Atomic Research Institute by infiltrating their computers and systems. One of these hackers, who was only sixteen years old at that time, got caught by detectives from Scotland Yard ("The Case Study: Rome Laboratory, Griffins Air Force Base, and NY Intrusion"). In the subsequent year, Vladimir Levin supposedly utilized his laptop to transfer funds from Citibank's computer network to multiple accounts worldwide. Eventually, Levin was extradited to the US where he received a three-year prison term and was instructed to compensate Citibank $240,000.

The exact amount of money stolen remains unknown, but it is estimated to be between $3-$10 million. Some of the stolen funds have yet to be recovered ("How To Hack A Bank"). In Raleigh, North Carolina, Kevin Nitpick, a well-known computer hacker, was arrested in the same year. He faced multiple charges for breaching security protocols by copying

software and illegally accessing various networks to obtain sensitive information. Approximately 20,000 credit cards were among the data that was stolen. Nitpick served a four-year prison term without trial before being released in early 2000. These crimes occurred during the mid-sass ("Timeline: A 40-year history of hacking").

After the year 2000, a significant number of cyber-attacks or hacks have been the result of unsuspecting mallard users downloading them onto their PC. The majority of recently created enamelware can evade anti-virus scans, leaving no one completely secure on the internet. The following graph presents the different types of virus or mallard threats encountered on different computers in the United States ("Microsoft Security Intelligence Report"). Every computer hacker operates with one or multiple motives, often driven by self-interest, such as financial gain or recognition.

Malicious programmers create harmful programs that perform various malicious activities. These programs can record all user keystrokes, steal sensitive information like passwords for personal and banking websites, or even enlist the user's computer in a network of infected machines used to launch DDoS attacks ("Ethics in Computing"). A DDoS attack happens when a large amount of data packets are sent to a server, causing it to become overwhelmed and crash, resulting in the targeted website becoming inaccessible. Recently, the group Anonymous admitted to orchestrating significant DDoS attacks on major banking websites ("Bank of America Hit By Anonymous DDoS Attack").

There are various forms of Dodos attacks, with the most common being a JODI Flood. This attack involves sending a JODI packet to random ports on a server. When a packet is sent to a port where no application is listening, the server responds

with a Destination Unreachable packet. Consequently, the server must reply to every JODI Packet with an Unreachable packet. The server crashes when the Unreachable Packet is sent, resulting in an "UDP Flood Attack". Hackers often sell their bootee, which refers to a network of compromised computers.

When a hacker sells or rents their booter, they transfer the infected PCs to the buyer, typically for further illegal Dodos attacks. Selling hacked information, such as compromised accounts for popular websites like Youth or sites with monthly subscriptions, is a highly lucrative business. The majority of these transactions occur online and are almost impossible to trace. Finding a skilled hacker on the internet is as difficult as finding AY Quad in Iraq.

Hackers are knowledgeable about hiding, the places to hide, and how to ensure their safety ("Hackers Selling Cheap BOOTEES and DODOS on Forums"). However, this doesn't guarantee that hackers won't be caught. Jon Paul Soon, a hacker, illegally breached his former employer's network with malicious intent. The network in question was a medical network that held health records, personal information, and served seventeen clinics in San Diego. Soon was sentenced to five years in prison and fined over four hundred thousand dollars, in addition to being banned from computer usage ("Hackers: Crimes and punishments").

Teenagers who engage in hacking activities often face lesser consequences compared to adults. Their punishments may include time in a Juvenile center, prohibition from using computers, community service, or occasionally even light prison sentences, which vary depending on their age. A notable example is Max Butler, an FBI informant and hacker who was arrested in 2001 for possessing stolen passwords, computer

intrusion, and numerous other charges. Butler put himself at risk of a forty-year prison sentence when he chose to cease assisting the FBI in catching other hackers. These cases exemplify the risks hackers are willing to take for the excitement or personal gain they derive from hacking ("5 Of the World's Most Famous Hackers ; What Happened to Them").

Despite the severe consequences, individuals may be curious as to why one would choose to become a computer hacker. These hackers gain their knowledge of manipulating the system and evading the law to do as they please ("The Hacker Work Ethic"). They exploit their superior understanding of computers and the internet to inflict harm on innocent users. While many hackers have malicious intentions, there are also those who hack with a more noble goal in mind (Roberts).

Identifying the type of hacker one is encountering can be done effortlessly by examining the end result and posing a few inquiries. Is the intention of this hacker to pilfer information? Is the hacker attempting to contaminate systems? In such cases, this hacker can be regarded as malicious. However, there are other hackers who engage in hacking for educational purposes. They aspire to gain knowledge about computers and observe how systems transform when adjusting specifications. Hacker Sarah Flannels recounts her experience while developing her encryption algorithm, stating, "I experienced an immense sense of excitement... I dedicated entire days to this endeavor, and it was quite exhilarating."

There were times when I never wanted to stop. " Pursuing knowledge has been the fuel for many computer users since the first computers were created in the sass. These people live

by the idea that the best way to learn is to take a hands on approach ("Types of computer hackers"). In contrast to black hat hackers, there is a type of hacker known as the white hat hacker. White hat hackers are the individuals who assist infected users on the web. Many black hat hackers, such as Kevin Nitpick, Kevin Paulsen, and Mark Been, have transitioned to white hat after serving time in prison or on probation ("12 "White Hat" hackers you should know').

Both white hat hackers and penetration testers aim to counteract the actions of black hat hackers by hacking websites. Businesses often employ penetration testers, also known as white hat hackers, to test the security of their servers and databases. These testers, commonly referred to as Pen Testers, identify any vulnerabilities they find during the hacking process and then fix them, thereby ensuring a safer internet environment.

Companies recognize that if a white hat hacker is capable of breaching their security, then a malicious black hat hacker can do the same ("tithe hat' hackers in demand"). One well-known white hat hacker is computer analyst and specialist Touts Shimmer. In 1995, the police employed Shimmer's skills to trace and catch Kevin Nitpick, who had managed to elude the FBI for an extended period. Nitpick had caused significant harm to systems owned by Motorola, Monika, Sun Microsystems, and NECK, amounting to over $100,000 ("The trials of Kevin Mitotic;).

This is merely an instance of a hacker being apprehended by another hacker. Law enforcement computer security analysts and hackers collaborate to decode cyber evidence pertaining to ongoing criminal investigations, utilizing cyber-forensics to analyze and resolve

crimes efficiently ("The Kevin Nitpick/ Touts Shimmer affair"). Hollywood has also attempted to depict computer hacking in films like Hackers (1995) and War Games (1983).

The movie "Hackers" centers around two computer hackers, Crash Override and Acid Burn. They engage in what appears to be a playful battle using unconventional fonts and poorly designed homepage graphics. As the plot unfolds, the US Secret Service becomes involved when another member of Crash Override's group illegally hacks into a school's central computer system and downloads a useless file. To everyone's surprise, this seemingly harmless file harbors a dangerous virus that can lead to the company's oil tanker fleet capsizing. In the end, after several other acquaintances are apprehended, all charges against the main characters are dismissed, resulting in a happy ending.

The truth is, all these hackers would have been imprisoned and their charges not dropped. Moreover, a company had the computer virus code that could control their entire oil tanker fleet, which was kept in a vulnerable mainframe ("Hackers"). Consequently, genuine hackers vandalized the website of the movie Hacker's to express their discontent with the unrealistic portrayal in the film ("Hacked Movie Site"). The result was relatively minor, only including changes to some text and defacement of a few images by overlaying satirical artwork.

The website has a mirrored version of their hacked website, which is still accessible online. The defaced website contains statements about Hollywood's lack of understanding of technology and their inability to comprehend the complexity and effort required for hacking. It emphasizes that hacking cannot be done simply by tapping a few keys on a keyboard to infiltrate a company's mainframe, website, or

database.

The movie "Hackers" featured a scene where a person successfully accessed a supercomputer using only the password "GOD" and replaced the UNIX operating system with a three-dimensional interface that does not reflect reality. Similarly, in the movie "Live Free or Die Hard," computer hacking is depicted unrealistically as the hackers have the ability to control entire cities, including manipulating traffic lights with statements like "Okay, I want you to hack into that traffic light and make it red."

Practically all the extraordinary achievements showcased in Hollywood movies are either impossible or would require extensive research to be accomplished. Many hackers believe that Hollywood never accurately represents genuine hackers ("Hollywood Hacking - Television Tropes & Idioms"). Computer enthusiasts are intrigued by the enigma surrounding computers. Mr. Hake, the Computer Applications teacher at Erwin High, was asked about his fascination with computers when he first gained access to them. He responded, "They were new and exciting; no one really knew the possibilities they held, but everyone seemed eager to utilize them." Mr. Hake's response captures the allure of computers during their early stages.

According to Hake, the allure of computers and their intriguing possibilities has led people to pursue their study. The transition from being an enthusiast to becoming a hacker can occur rapidly, especially when one witnesses how easy it is to earn or steal money online. Alternatively, the excitement of bypassing security measures may drive intermediate to advanced computer users towards engaging in malicious hacking activities. However, these malicious hackers will face challenges as long as there are white hat hackers in the field, making their job or hobby more arduous ("Meaning of Hacking

and the Different Kinds of Hackers").

In conclusion, there are ethical individuals who possess knowledge of computer systems. Despite the presence of intelligent and malicious hackers online, the internet remains a secure place. The portrayal of hackers and their philosophy in current media and low-budget Hollywood films is inaccurate. Media websites influence public perception of cyber criminals, leading most people to view hackers as individuals with nefarious intentions. The internet's white knights, who contribute to our safety, are often not acknowledged for their efforts.

White hat hackers have resolved numerous vulnerabilities caused by malicious hackers. Governments may imprison hackers, but they cannot imprison a mindset. Hackers will always persist; their goal being to benefit from their actions. Society must acknowledge that hackers also hack to mitigate unintended consequences or to apprehend the most dangerous hackers. Good and bad hackers exist, similar to good and bad individuals - not all hackers are immoral.

Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New