Get help now
  • Pages 3
  • Words 656
  • Views 534
  • Download

    Cite

    Rosalyn
    Verified writer
    Rating
    • rating star
    • rating star
    • rating star
    • rating star
    • rating star
    • 4.7/5
    Delivery result 4 hours
    Customers reviews 547
    Hire Writer
    +123 relevant experts are online

    Essay About Hacking Computer (656 words)

    Academic anxiety?

    Get original paper in 3 hours and nail the task

    Get help now

    124 experts online

    o Hacking in it self is not a crime. It is otherwise known as unauthorised access. o There are clubs devoted to hacking. In Germany, Holland etc, discuss techniques etc. o Much of hacking is treated as intellectual training.

    Costs us a lot of expenses to protect our computers. Companies spend millions of pounds protecting themselves. o A lot of hacking done by past employees seeing as they have passwords etc. insiders knowledge.

    o At one level the motive for the doing is the challenge. o Software comes with default user names and passwords which make it easy for the hacker to access. o FRAUD. Large companies employ hackers to access enemys hackers and to test companies system. o Electronic crime is low risk high yield.

    The banks are not keen on publishing they have been fucked. o Credit cards stolen then used for hackers own use. (Fraudulent purchase) o Theft of data. Industrial espionage.

    Breaking into factory and seeing how things are made. Plans for future products, contact lists etc. IDENTITY THEFT, a criminal can take over someone elses identity. This can cause a lot of damage. Someone has passed themselves off as David Blunkett, blind MP. o data can be stolen by illegally hacking into a computer and downloading data and or by stealing an actual computer (laptop) dont access someones password from their computer, take out the hardisk and plug it into your computer.

    The files on the CIAs computers are encrypted. o When accessing the net, you download files that you know nothing about, paedophilia etc. o FRAUD ON THE INTERNET, one of the weaknesses of the net is the lack of control; it is not controlled by any one person. o Goods can be offered for sale but never delivered, fraud. o Offers downloads, pays for it and never gets the goods.

    o There are certain schemes which provide some assurance. o Sites that you hand out your credit card number should have SSL Secure Socket Layer. This encrypts data at my end and at the other so that no nosey hackers can access it. The URL also starts with http, and a closed padlock at the bottom of the screen, which shows the site is secure. o In the UK, reputable web-sites may have the Which (consumer service) logo on the site. o VIRUS, now can spread much faster than in previous years.

    The biggest distributor of viruses is email not floppy anymore. ORIGINATION programmer creates programme to cause mischief and or distress. TRANSMISSION often the virus is attached to a normal program. It then copies itself to other software on the hard disk.

    You can in theory track down the origin of the virus, IP address etc. INFECTION there are virus that are bollocks and others that completely mess up your computer. BIOS chip can be erased, therefore causing you to buy a new motherboard. The worst ones cause subtle destruction. Over a period of months the virus messs up your work and can cause of bankruptcy. This can also affect hospitals and anywhere that uses a computer system.

    o LOGIC BOMBS similar to a virus, may be delivered by a virus. o Can be written to destroy, or even subtly alter the contents of a computer system. o May require a further signal for activation o May require a further signal to prevent activation, as in case of extortion o Sometime may cause companies to hand over money. o Many organisations would not want to have the shitty security exposed. For example banks etc, however secret service etc doesnt give a monkeys and will expose the hacker. o DIGITAL CRIMES computer misuse act of 1990: o 1.

    unauthorised access to computer programs or data o 2. unauthorised access with a further criminal intent o Software copyrights. Covered by copyright designs and patents act of 1988 o It is illegal to run pirated software. It is illegal to create a copy blalbalbalbala.

    o

    This essay was written by a fellow student. You may use it as a guide or sample for writing your own paper, but remember to cite it correctly. Don’t submit it as your own as it will be considered plagiarism.

    Need custom essay sample written special for your assignment?

    Choose skilled expert on your subject and get original paper with free plagiarism report

    Order custom paper Without paying upfront

    Essay About Hacking Computer (656 words). (2019, Jan 28). Retrieved from https://artscolumbia.org/hacking-essay-76002/

    We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy

    Hi, my name is Amy 👋

    In case you can't find a relevant example, our professional writers are ready to help you write a unique paper. Just talk to our smart assistant Amy and she'll connect you with the best match.

    Get help with your paper