Wednesday, May 6, 2020

Is Ethical Hacking Truly Ethical Essay - 2691 Words

From the macro/micro perspective, the world of the electron, despite its extraordinarily minuscule size, is the foundation of society. Computers have not only brought us electronic shopping, email, and online banking, but now control our cars, how we board a plane, our MP3 players, and almost every other aspect of our lives. With any great advancement in civilization, there are always those souls who seek to capitalize on the misfortune of others by finding some way to exploit a weakness in the newest technology available; the computer industry is no exception. With the thousands of Gigabytes of data stored on our home computers, from tax information to social security numbers and banking information, it was only a matter of time before†¦show more content†¦Etymologically speaking, hacking began in the 1960’s with MIT’s Tech Model Railroad Club. Due to the exceptionally slow speeds of mainframe computers at that time, (personal computers were not invented yet), software programmers came up with ‘hacks’ to improve the processing time of their programs. These hackers became the core of the MIT Artificial Intelligence Lab (AI Lab). Their talents pushed a program beyond its intended capabilities, at the same time expanding their personal programming talents and the professional reputation of the AI Lab. These individuals believed the educational bureaucracy at MIT should not come into direct conflict with being able to accomplish any productive task. The hackers picked door locks, climbed ducts, or came up through the floorboards all in an effort to have access to computers to test their software code. â€Å"Even now, there is a big wrench at the AI Lab titled, â€Å"the seventh-floor master key† to be used in case anyone dares to lock up one of the more fancy terminals† (Schell, â€Å"The Hacking of America: Who’s Doing It, Why, and How† 44). One of the ways in which hackers are ensuring the freedom t o information across the Internet is through the Open Source movement. Open Source means that whenever a software programmer writes a piece of code, they release it to the public as free information. The code is available, free of charge, incorporated into other software programs (applications and/or operatingShow MoreRelated Ethics of Computer Hacking Essay examples850 Words   |  4 PagesHackers: Control and Property The ethical issues surrounding hacking, stem from several sources mainly dealing with order and control, and information ownership. What is difficult to decipher from all the media hoopla surrounding the terms, hacker and hacking is both the simultaneous sensationalism and the condemnation of said activities. Of course just recently, even a movie was made and was appropriately called Hackers. The term and all that it implies has truly entered our popular consciousnessRead MoreWar Is A Driving Factor2157 Words   |  9 Pages This raises the question, what is moral in war? Is something which can be used for destruction ethical? Nuclear energy can be used for mass destruction, or energy creation. Is it moral? Hacking is similar: it can be used for recreation, and for attack. Is it ethical? Just as a weapon can be considered ethical or unethical, so can technology. Throughout the history of technology, the debate of hacking has consistently been a hot topic. Suddenly something as simple as opening up a computer’s innerRead MoreTaking a Look at Computer Hacking599 Words   |  2 Pages There are millions of ruthless criminals around the world. They break into homes, shoplift from stores, and rob banks. The most cunning criminals, perhaps, are the one’s that are not easily seen. Computer hacking is a serious crime and criminals with enough experience can hide themselves among cyberspace.  ­Crackers, or criminal hackers, convert computers into â€Å"zombies† by using programs to exploit the vulnerability of a computers operating system (Strickland 2). â€Å"The user [of a computer] generallyRead MoreEssay on Hacking and Cracking3027 Words   |  13 PagesIntroduction 1.1 What is Hacking ? Hacking is often portrayed to be many things it is not. Thanks to popular portrayal of hacker as young immoral computer expert associated withnearly and possible illegal and immoral activity that can be conducted through a computer, We see hacker outlaws of cyber space, out to steal passwords, or get access to your bank account and steal money. They are portrayed as the equivalent to thieves who break into houses and rob banks or in the mildest case; peeping tomsRead MoreOnline Advertising Methods For Advertising1719 Words   |  7 Pagesin direct online advertising. Besides, customers choose the advertisement they want to view by clicking on them unlike on the television where they have to watch the advert whether they like it or not. Online advertising methods widely adopt an ethical approach based on the suggested benefit offered for both consumers and marketers against possible disadvantages. It could pose to the minimal number of people who may find the method of advertising invasive. Online advertising methods faced a ratherRead MoreEssay on Ethical Issues with Social Media1505 Words   |  7 PagesCurrent Ethical Issues with Social Media People are increasingly sharing their lives online through social networking sites with little concern for who may be viewing their information. This has become an issue in current times and is up for debate based on the ethical issues associated with Social Media. People don’t realize joining a social network is like joining a community. As any community in real life, your business has a place in the community but should not invade one’s privacy. SocialRead MoreThe Issue Of Cyber Crime1118 Words   |  5 Pagesattractive, policymakers must look at how we can deter criminal activity in general on the web. One of the main issues I see stemming from ‘hacktivist’ groups and other criminal entities on the Internet is the extent of the rule of law. Although hacking is a crime in itself under state penal law, it’s not outlined in the U.S. Penal Code. However, there are numerous acts I find associated with the actions of Anonymous that’s punishable under the U.S. Code Title 18, such as:  § 241 – conspiracy againstRead MorePlanning For My Academic Success1260 Words   |  6 Pagesgoal after small goal, the larger goals previously established will be met and a sense of accomplishment will be enjoyed. Throughout this course a primary focus has been familiarizing myself with individual learning styles. After completing the Ethical Lens Inventory I discovered my preferred style was the Results Lens. Specifically this means that to obtain desired results I tend to depend on experience and can sometimes be too eager to get a conclusion. (EthicsGame, LLC, 2014) This provided greatRead MoreE-Commerce and Cybercrime 1515 Words   |  7 Pagesproblems? Give several examples. Students’ answers will vary. However, with the increased business use of the Internet, intranets and extranets there is no doubt that the number of potential security problems will also increase. Issues such as hacking, data alteration unauthorized data access, denial of service and so on will become prime security problems. As companies forge ahead in e-commerce and e-business activities, the stakes get progressively higher, and the potential threat to the vulnerabilityRead MorePublic Engagement, Democratizing Science Or Nightmare?1245 Words   |  5 Pagesis a social movement rooted in the idea of citizen science. Usually called biohacking, emphasizing the relationship with hacker culture, this form of public engagement in science has been the subject of controversy since its inception. The word hacking, usually associated with information technology, is a term used for the development of creative solutions for a problem by someone in a non-professional environment. With the introduction of personal computers and the internet, anyone could create

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.