Hacking

Read Complete Research Material

HACKING

Hacking



Hacking

Introduction

Internet has become an essential part of our lives these days, and our life has been dependent on the internet. Cyber world has opened numerous opportunities for us, for example, reference material, electronic commerce, email, collaborative computing, information distribution and advertisements etc. Cyber attacks are defined as breaking into some computer which results in undermining of the integrity, availability and confidentiality of the computer or the data saved within it (Carrforeword and Shepherd, 2009).

The most common form of cyber attack is hacking. Hacking can be defined as creative innovation as well as a form of unlawful behaviour. This is a form of activity that has occupied two extreme positions. Hacking is defined as cut chop, something that is used to improve the performance of the battle boredom by the mainframe operators. There are different types of hacking including, software hacking and information hacking etc (Randall, 2000).

Difference between Hackers and Crackers

According to their own definition, hackers are primarily "networks of fans." They want to understand the operation of computer systems and test both the capabilities of the tools and knowledge. Most hackers break into systems maintains a passion for computers and not with the aim to destroy or steal data. While cracker is a form of hacker and is a criminal pleat's computer whose primary purpose is to destroy or steal data, turn off computer systems or kidnap a computer system to ransom. Companies that are usually the victims of this breed of pirates prefer not to disclose information, for the sake of preserving the image of their companies, making the pirate business statistics are far below the actual values (Thomas, 2000).

Literature Review

What Motivates Hackers?

Some say computer systems deal with just for fun, for the challenge. Some just want to make themselves reknowned or even find a job this way! Contrary to popular belief, hackers who attack servers to make money or access to financial data are not in a large number. Thus, this form of piracy requires a high level of skills; whereas, it does not require specialized skills to install Trojans downloaded from the Net (Randall, 2000).

In developing countries like Turkey, the laws against hackings are not very effective although some authorities believe that the necessary action is taken. As relevant measures are not implemented by the Turkish Government, the problem is getting worse day by day. For example, child porn is a very serious problem, which cannot be stopped without meaningful action. During the preceding months, several child porn cases were reported by the TV channels in Turkey. Another example is of internet fraud, which is very common in Turkey. Turkish people are not willing to use internet banking because they are afraid of fraud. As Turkish laws are not effective enough, these problems are not resolved. Instead of dealing with these serious issues Turkish authorities put a ban on websites like YouTube (McClure, 2003).

In order to avoid hacking relevant legal measures should be taken through international cooperation. It is also important to build a control mechanism ...
Related Ads
  • From Online Hacking To Cy...
    www.researchomatic.com...

    From Online Hacking to Cyber Terrorism Introd ...

  • Computer Hacking
    www.researchomatic.com...

    Computer Hacking , Computer Hacking Res ...

  • Ethical Hacking
    www.researchomatic.com...

    The word "ethical" is defined as "rel ...

  • Hacking
    www.researchomatic.com...

    Hacking , Hacking Essay writing help so ...

  • Ethical Hacking
    www.researchomatic.com...

    Ethical Hacking , Ethical Hacking Resea ...