Hacker/Hacker Techniques the Hackers in Term Paper

Download this Term Paper in word format (.doc)

Note: Sample below may appear distorted but all corresponding word document files contain proper formatting

Excerpt from Term Paper:

Such people may not generally take shelter under the canopy of hackers but as a result of the more serious attributes of their motivation. (Hacker Motivation) Most of the people are anxious about the probability of being an objective for exploitation by a hacker. It is quite normal that if a computer has been installed for home use and only connected to the Internet for two hours once a week, then it is not vulnerable to be a victim of a hacker. Application of such judgment makes it possible to indicate the vulnerability of being hacked, basing on the level of Internet exposure, as high-risk and low risk and the Internet Security firms are most common victims for the hackers.

The High profile media-friendly victims are inclusive of the large corporation's sites, political party sites; celebrity sites, etc. which are vulnerable to the assaults. Any body having their own website, whether used for e-commerce causes or not, has more chances to be prone to become the victim of hacking in comparison to those who don't. Moreover, as a result of the broadband ensuring always online, the vulnerability of being hacked is more. Irrespective of the factor of inclination, intrusions have grave expenses. At the minimum an illegitimate site must square up the security hole. It is apparent that even a non-harmful trespass upsets the victim's online services while the breach is fixed. The impact on e-commerce of the frauds exerted by hackers is very apparent with the adverse publicity made declining consumer confidence in specific company securities. Sometimes such attacks may be initiated out as pranks, but unluckily they can result in the actual harm through companies in terms of loosing loyal customers, that endangers their future prospects and that of their employee retention. Without actually knowing whether the violation is harmful or not the companies generally utilize resources for investigation of the matter quite often engaging private investigators so that they do not suffer from loss of reputation. (Wible, 2003)

As a reaction to the emerging flavor against the struggle on hackers, the most common safeguards of hacking can be represented on a variety that spreads from appeasement or adjustment of corporate interests to sketch blueprints for cultural revolution: a) Hacking entails a benevolent industrial service of unwrapping security deficits and designing lapses; b) Hacking, as an tentative, free from research activity, has been liable for most of the emerging improvements in software generation; c) Hacking, when is seen not to be purely amusement, is considered to be an elite educational experience that represents the modes in that the development of high technology has outpaced conventional forms of institutional education, d) Hacking is a significant type of watchdog counter-response to the application of the surveillance technology and data-accumulation by the state, and to the enhanced monolithic communications power of giant corporations, e) Hacking, as guerilla know-how, is vital to the job of preserving fronts of cultural confrontation and reservoir of counter awareness as a circumvent against a techno fascist future.

Irrespective of the possible prevalence of reasons for us to become aware of their eccentric spirit, hackers also continue to hammer us of our technological susceptibility and ignorance. This has been fostered by way of the difficulties felt by the law implementing officials and legislators in the confrontation with the computer at the background and is probably only small scale examples of some of the extensive difficulties that the society confronts while it tries to integrate new information technologies into the existing social organizations. 1. The initial cases of the cyber crime were originated as an extraordinary fact that law was not so equipped to manage. The scholars and policy makers have since proposed a number of preventive strategies, from criminal sanctions to integrate the law and the architecture of the Web itself; however, no such modes were seen to be effective at elimination of the criminal hacking. Congress banned unwanted interferences in the Computer fraud and Abuse Act of 1984 - CFAA. (Wible, 2003)

Among other difficulties, prosecutorial difficulties have minimal prohibitive impact of CFAA. Soon after being booked as criminals, the small number of prosecutions prompted some to recommend that anti-hacking laws were mostly symbolic. The implementation of the laws continues to be problematic especially taking into account the near impossibility of prosecuting attempts under 18 U.S.C. [section] 1030(b), and the necessity for a large investment of time, resources and skill - even assuming that local law enforcement agents have the prescribed training. The digital anonymity, encryption technologies, and the roundabout procedure of electronic tracing entails the cyber-criminals a benefit over the law implementation. Along with the uncertainties of jurisdiction looming large in cases those are costly to investigate and that necessitate sophisticated tracking capabilities, state prosecution is almost not possible. The founders of tort responsibility for cyber crime advocate that in comparison to the criminal law, civil actions provide target regulation over the litigation. The probability of attaining damages provides targets, otherwise not desirous of voluntarily disclosing the electronic susceptibility to consumers, an incentive to report.

It is worthwhile to think of the private actors, along with government, preventing such activities. At least two basic strategies have been devised. Firstly, some scholars have anticipated original ways of strengthening the criminal law with other types of constraints on behavior. Secondly, others have recommended that the least dangerous types of hacking should be decriminalized in the methods that de-marginalize the hacking group and apparently enhance the Internet Security. Those in the former type has spread on the Beckerian structure, continuously dominant in taking into account the deterrence that confines the policy makers to manipulate tow elements in deterring crime -- the probability of detection and severity of sentence. Scholars surpassing such structure and desirous of viewing an advanced one have included social principles, structure and monetary expenses as supplemental impediments on crime. To illustrate, Neal Katyal advocates that monetary costs are required to supplement criminal grants since they hinders all sectors, while legal sanction is only probable. The insight is well received. (Wible, 2003)

Criminal impediments alone will not successfully eliminate cyber crime. The law is required to assist second and third parties --victims of cyber crime and Internet users - prevent crime themselves. The most contemporary scholarship at the vanguard of deterrence theory even draws nearer to the elimination from a cost perspective. The coming out of such convention, it has been advocated by Note that just like the law that struggles to divert crime into the vents that are more expensive, it is required to foster mechanisms that channel criminal activity into legal vents. The second category of scholars advocate to watch hacking, where hackers only access systems without actually harming them and probably indicate that they have violated security, is harmless and are required to be decriminalized.

They advocate that decriminalization would give rise to a number of social advantages along with the enhancement in Internet security as hackers identify latent susceptibilities, an improved allocation of law implementation resources and the formation of creative people having technological proficiencies. The advocators do not convince the critics of decriminalization, but who stress that decriminalization does not succeed in clearly symbolizing hacking to be a banned activity. (Wible, 2003) Moreover, since the assault against U.S. computers can stem from everywhere, and since there rarely are any international agreements to safeguard such kinds of incidents, there is a clear necessity for a remedy. An efficacious initiation to a remedy is an international arrangement among friendly countries to deal with the hackers. A new international organization could assist coordinate national laws, fostering effective expatriation agreements, entailing early admonition of hacker assault and generating a mode for intelligence sharing. (Bryen, 2000)

To conclude, it is recommended to take up a level-headed strategy by all the Internet users to safeguard their confidentiality and security online, and to ensure that they make themselves aware and informed about the more grave liabilities associated in maintaining any sort of Internet presence. The convention of hacking is a continuous phenomenon and eventually is taken to mean truly to be to access and aware not to entail harm or corrupt. When this norm us understood, probably one day people will again be capable of announcing themselves to be hackers without the fear of losing their jobs or confronting prosecution.


Bryen, Stephen. D. (27 March, 2000) "International Agreement Needed to Stop Hackers" Insight on the News. pp: 12-15

Envani, Mark. (November, 2002) "Where Hackers hit Pay Dirt: Web Applications Provide an Easy Tool for Hackers Mining for SensitiveData" Computer Technology Review. Vol: 14; No: 1;…[continue]

Cite This Term Paper:

"Hacker Hacker Techniques The Hackers In" (2005, May 06) Retrieved October 25, 2016, from http://www.paperdue.com/essay/hacker-techniques-the-hackers-in-64517

"Hacker Hacker Techniques The Hackers In" 06 May 2005. Web.25 October. 2016. <http://www.paperdue.com/essay/hacker-techniques-the-hackers-in-64517>

"Hacker Hacker Techniques The Hackers In", 06 May 2005, Accessed.25 October. 2016, http://www.paperdue.com/essay/hacker-techniques-the-hackers-in-64517

Other Documents Pertaining To This Topic

  • Hacktivism One Expression of the

    Anonymous is one of the groups that can be seen as participating in this form of hacktivism, as is Wikileaks. Wikileaks is probably the best know hactivist site to the general public because of the sheer volume of political information that it has made public and because of the unapologetic nature of the owner of the site. This is unfortunate in many ways because it has given individuals a false

  • Hacking Year Old Bloomington Man Was

    They would sometimes be using the school curriculum as an excuse to hack pertinent information that are government or privately owned. At some point, these students would be challenging themselves if they will be able to create and send unnecessary information (such as computer viruses) to other computer systems. This will provide extreme joy and satisfaction for these students. However, the issue here lies on how can this be

  • Fraud Techniques

    Fraud Techniques In the modern society, many organizations across various industries are increasingly vulnerable to electronic fraud. The threat of electronic fraud across these industries is particularly worsened with the emergence of computer fraud. Actually, computer fraud and crime has continued to be a major concern in the recent past since computer processing can evade the conventional security and control measures. However, computer fraud doesn't necessarily involve the use of micro-computers

  • Computer Hacker Culture and Subcultures

    Peer recognition too plays into many hackers motivation as they work towards being accepted and gaining status within the culture. and, lastly, some hackers are motivated by the thought that their efforts serve a public service (O'Neill, 2006). "Hackers built the Internet, they made the Unix operating system what it is, and they make the World Wide Web work" (Castelluccio, 2003). Forecast 4: Forecast 4 states, "Some computer hacker groups, notably those

  • Breaking Hackers Codes

    Steganography or "the process of embedding secret information into an innocent-looking carrier" has recently attracted new media attention because of a number of recent hacking attempts. However, the process is an old one which predates computers. "It should not be surprising that the first written report of the use of steganography is attributed to the Greek historian Herodotus. The reported method involved camouflaging a secret message within a hare

  • Comcast Hackers the Internet Has

    " This seems to be a case of some mischievous young men getting in way over their heads and not realizing how serious the consequences of their actions would be. Early on in the investigation, they were apparently laughing about the incident and enjoying their stint in the media spotlight (Poulsen, 2008). Now that they have been sentenced to serious jail time and are forced to pay major restitution, the seriousness

  • Cyber Crime Is a Serious

    These "stepping stone" computers can be located anywhere in the physical world because real-space is irrelevant to activity in cyberspace (Brenner, 379)." The use of stepping stones can make it difficult for law enforcement to find where an attack actually originated. As was previously mentioned in this discussion, Hackers are often used by companies to develop stronger security. Hackers often perfect their techniques at conventions that also feature hacking competitions.

Read Full Term Paper
Copyright 2016 . All Rights Reserved