StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Computer Hacking as a New Social Crime - Essay Example

Cite this document
Summary
The author of this particular paper "Computer Hacking as a New Social Crime " focuses on ways to combat computer hacking. The term hacking has become common after the advent of computer error. Initially, the term referred to incompetent people. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.3% of users find it useful

Extract of sample "Computer Hacking as a New Social Crime"

Computer hacking Introduction The term hacking has became common after the advent of the computer error. Initially, the term referred to incompetent people. Now the term has a different meaning in computing field. Computer hacking is the act of modifying hardware and the software of a computer to attain a particular goal that is contrary to that of the owner’s purpose. In most cases, people treat this act of hacking to be a malicious act; however, hacking does not mean that is a bad practice. It is taken to be a bad act when the intention of the actor is malicious (Yar, M. 2006).On the other hand, it can be of help when trying to find hidden information that might help to safeguard a particular situation. People who involve in the hacking act are referred to as hackers, to be a hacker does need that you have a deep knowledge in computer field. Even innocent children can involve in this act unknowingly. Most hackers are computer experts who enjoy and have a passion to know more how computers work and they consider hacking to be an art. The practice of computer hacking is most common in teenagers who are always anxious and aggressive to know more about the environment that surrounds them (Yar, M. 2006). For computer experts, they take computer hacking as a real life problem solving skill. They take it as an opportunity to demonstrate their abilities but not to cause harm to other people. Some hackers are compelled to involve in this act to accomplish their own selfish motives without minding the consequences this will have to others. In regards to Yar, M. (2006). Malicious hacking has become a common crime in the recent years; many computer crime related cases have piled up in courts waiting for hearing. Therefore, hacking is one of the cybercrime acts that are threatening the current social world. Hacking is a new way criminals have discovered to harass people, defraud the firms, steal certain information or even destabilize the economies of targeted country This paper focuses on ways to combat computer hacking. How to combat computer hacking In recent years, there has been an upsurge of computer hacking in companies, governmental offices and other private enterprises. Reports reveal that in the year 2001, about 85% of the companies in the United States reported security threat through hacking in their computer systems. About 94% of these companies reported viruses in the computer system. As that was not enough, the defense department of US has been hacked many times, in 1995 alone; this department was hit about 250,000 by hackers Westby, J. R. (2004). These astonishing reports are clear indications to show that indeed computer hacking is on. This new security threat has become one of the major world security threats. Computer experts have devised several ways to combat this problem by the users of the computers. First, computer users are advised to invest in good firewalls. Devises installed this security in a computer that prevents any foreign items from entering the computer programs. Firewalls protect and safeguard the information in the computer software and hardware to be accessed or affected by any foreign item. Firewalls allow the user to set policies on the system that will have to block the unwanted data or hidden message attachment from his system (Albrecht, 2005). A firewall is a barrier that keeps the hackers and viruses out of computer networks; they assist in intercepting the network traffic allowing the authorized data only to pass through (Brookins, 2010). Therefore, installing appropriate firewall would reduce the risk of a computer being attacked by hackers. Firms and computer users are highly advised to install firewalls in their computers as early as possible to safeguard the documents. The second way to combat hacking is through using secretive passwords. The computer users should try as much as possible to conceal their passwords from other people as possible (Albrecht, 2005). They should in fact complicate their passwords by mixing the letters and the numbers, the passwords should have at least eight characters so that the foreigner cannot easily case it. Passwords acts as security gate pass that gives permission the user to access certain information stored in a computer. More on passwords, the users are advised to upgrade their systems to prevent problems with their system when entering sophisticated passwords. The firms should establish a corporate security policy that aims to secure the network. The passwords used by employees should be changed after every three month to limit the hackers’ ability to master functioning passwords (Brookins, 2010). In case someone leaves the company, the management should immediately delete his user name and password because the same person can still use these to hacker the company’s computer. In the corporate policies, the management should outline the consequences for any person found tempering with the firm’s network with unauthorized entry. Thirdly, computer users are advised to installed computer anti-viruses that neutralize any virus exposed to the system (Albrecht, 2005). Once an antivirus is installed in a computer, the user will be scanning his documents regularly to ensure that the documents are safe from being destroyed by the viruses. The maintenance department should ensure that every computer in the firm should run the most recent version of the anti-virus. Configuration should be done to the server computer to enable to push the virus updates out periodically to other client computers (Brookins, 2010). Moreover, the workers should learn facts concerning viruses and advised not to be opening some e-mail attachments or some emails from foreign senders. Therefore, any hacker who tries to hack a certain computer by using viruses does not realize the results. Anti-viruses are like the watchdog of computers, they reduce the chances of the files being destroyed viruses. In addition, companies need to reevaluate their security system and respond to them accordingly. They have to analyze and identify security loopholes, which hackers can use to harm their systems (Westby, J. R. 2004).Regular evaluation of security policies and infrastructure of the computer systems would help greatly in keeping watch if the hackers are trying to attack their system. In addition, the operating system should be kept up to date. The operating system should be upgraded regularly; the latest patches and versions should installed. The Microsoft windows should be checked regularly to find when there are any new latest patches. Another way to prevent computer hacking is that computer users should shun from running unnecessary network services in their computers (Brookins, 2010). When the system is being installed, any non-essential features should be disabled. The logic here is that when a feature is installed and it is not regularly or actively utilized, it means it is not regularly updated; this result to a big security threat to the computer. Also in handling the computers, only authorized persons or software specialists’ employees are supposed to do it but not every person in the company. When this is ensured, one can easily trace the root cause of the problem in case in will arise and prevent the foreigners to access the firm’s computer system. Another effective way to minimize the cases of computer hacking is through conducting vulnerability tests (Brookins, 2010). This is a cost-effective way of evaluating the security program; when such a test is conducted, it highlights the limitations and flaws in the program. The specialists use the results to suggest ways to improve in weaker sections. One of the best ways of contacting this is through approaching a computer-consulting firms and allowing them to access to the company’s computer system for about two days (Janith, 2009: 1). This gives an ample time for appraising the company’s network and follow-up discussion on how to improve in several areas, this will aid future planning and decision making. Once such a test has been conducted, new techniques are adopted precautions would be noted and this generally will help in preventing hacking opportunities. Corporations are also advised to employ computer hackers as part of their technical support staff. These hackers use their knowledge and skills to detect flaws in the company’s security system (Janith, 2009: 1). This can help the corporations to repair quickly any system in case there was an attempt of hacking from outsiders. This method of employing computer hackers will also help to prevent identity theft and other common computer related crimes within the company. A hacker is somebody believed to have an innovative knowledge who often strive come up with a new concept different from the existing ones. Therefore, employing such a person would be a good resource person in aiding in problem solving skills. The computer users should be kept informed about the network security. Nowadays we have numerous magazines, books, and other resources from the internet, which has more information on computer security (Janith, 2009: 1). These variety resources gives some tips on how to go about with computer security, they have current information, which can be more useful to avoid loss of information. Moreover, some contain ways to retrieve the loosed information in case the computer has been hacked. Therefore, computer users should not just sit and relax, but they should involve themselves in research work by reading these resources to prevent the obvious future problems. Another way to avoid hacking problem is that the computer user should always remember to clear cookies in case he/she has used the public computers for example in the cyber cafes (Janith, 2009: 1). Computer user is strongly advised not to forget to close the cookies and the cache after using the computers and before leaving the room. This reduce the hacking chances, but when one is used to leaving the cookies and caches with put deleting them, a another user may make a follow-up using the information on the cache. Therefore, computer users should always be vigilant on every aspect that can lead to the hacking. Finally, ensure to secure the computer ports. A port is a gateway to access data outside the server; the port is also used to transfer data in both ways from the server and out of the server (Janith, 2009: 1). Somebody can conduct this activity secretly and take place automatically; only trained people can do it. However, ports are regularly opened and closed for easier access. Therefore, hackers can take this to be an opportunity to access the server. Therefore, the unwanted ports should be properly closed to limit the chances of hackers accessing sensitive files of the organization. Conclusion In conclusion, computer hacking is a new social crime that has emerged in recent years and has caused more concern in both governmental agency and private sectors. Hacking has become a big threat to the security of most organizations. This act has both advantages and disadvantages depending on the intention of the actor. Several reasons push people to get involved with this act of hacking. The act itself can be accomplished in several ways this depends much on the technical skills the hacker has. In preventing this act of hacking, computer experts have proposed some ways to minimize the chances of these crimes. Bibliography Albrecht, Trenton. (2005). Combating computer crime. Amazon Publishers New York City . Brookins, Nick. (2010). Seven ways to prevent computer hacking. Accessed on web. 11 Aug 2012. Retrieved from http://www.detroitchamber.com/index.php?option=com_content&menuid=206&id=2799 Harvey, Brian. (2006). Computer hacking and ethics. Accessed on web. 7th Aug 2012. Retrieved from http://www.cs.berkeley.edu/~bh/hackers.html. University of California. Berkeley. US. Janith. (2009). 10 tips to prevent hackers. Accessed on web. 11 Aug 2012. Retrieved from http://www.blogussion.com/blogging-tips/ten-tips-to-prevent-hackers/ Smith, T. (2001). Hack jailed for revenge sewage attacks. Accessed on web. 7th Aug 2012. Retrieved from http://www.theregister.co.uk/2001/10/31/hacker_jailed_for_revenge_sewage/> Westby, J. R. (2004). International guide to cyber security. Chicago, Ill.: American Bar Association privacy & computer crime committee, Section of Science & Technology Law Yar, M. (2006). Cybercrime and society: crime and punishment in the information age. London: SAGE Publications. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Computer Hacking as a New Social Crime That Has Caused More Concern in Essay, n.d.)
Computer Hacking as a New Social Crime That Has Caused More Concern in Essay. https://studentshare.org/information-technology/2047994-computer-hacking-as-a-new-social-crime-that-has-caused-more-concern-in-both-governmental-agency-and-private-sectors
(Computer Hacking As a New Social Crime That Has Caused More Concern in Essay)
Computer Hacking As a New Social Crime That Has Caused More Concern in Essay. https://studentshare.org/information-technology/2047994-computer-hacking-as-a-new-social-crime-that-has-caused-more-concern-in-both-governmental-agency-and-private-sectors.
“Computer Hacking As a New Social Crime That Has Caused More Concern in Essay”. https://studentshare.org/information-technology/2047994-computer-hacking-as-a-new-social-crime-that-has-caused-more-concern-in-both-governmental-agency-and-private-sectors.
  • Cited: 0 times

CHECK THESE SAMPLES OF Computer Hacking as a New Social Crime

Computer Fraud Issues

7 Pages (1750 words) Assignment

Computer-Based Crimes: Identity Theft, Phishing and Pharming Scams

computer hacking attacks are now more supported and financed by big-time syndicates.... In the theft of personal information, victims may not even be aware of the crime perpetration until a very considerable damage on their assets, credit card, and societal status have already been inflicted.... Criminals may use programs that would remove any evidence of the committed crime.... Today, the biggest crime created through computer use is the electronic financial account transfer....
8 Pages (2000 words) Essay

Computer Crimes

Computer crime that Target Networks or other Computers These types of computer crimes are most important because they are directly related to the invention of computer itself.... Some of these crimes are virus dissemination, worms, denial of service attacks, hacking, Salami attack, credit card theft, electronic funds transfer fraud and spoofing.... This review ''computer Crimes'' classifies computer crimes into two very broad categories: crimes that are aimed towards networks or computer devices and crimes that are facilitated by the use of computers but where the target is someone or something else and not the network or other devices....
6 Pages (1500 words) Literature review

Computer-Based Crimes

With a successful phishing, the criminal may use the data from the user to commit crime or for financial gain such as purchasing items online.... Computer crime refers to any criminal activity where criminals target a computer, or use computers to violate the law.... In recent years, criminals have used computers to commit crime such as stealing credit cards from unsuspecting users.... This essay describes many issues, that could affect the computer industry with computer-based crime and ethical issues being the chief....
4 Pages (1000 words) Research Paper

Computer Crimes in the USA

hellip; The author states that with e-commerce and virtual networking being a new trend, many countries have yet not come out with appropriate deterrent mechanisms to curb cyber crimes.... Phishing, cyberstalking, identity thefts, hacking, computer viruses, and child pornography are some of the most rampant versions of cyber crimes.... In the paper “computer Crimes in the USA” the author analyzes cyber crimes, which have assumed frightening proportions throughout the world....
8 Pages (2000 words) Article

Information Technology Security

This is one of the biggest causes for the increase of electronic crime.... E crime is treated very seriously and is every country has its own laws relating to the Internet usage.... A Computer Related crime hence is a crime where the computers are used as an instrument for the crime.... Here the computers contain all the evidences of the crime.... However, every new development has some merits and demerits....
15 Pages (3750 words) Essay

The World of Information Technology and Communication

The concept of computer-related crime is usually most difficult to understand.... It is mostly understood in the light of legislation and jurisprudence where any digital technology used as an offence against any other technology, computer or person is considered a crime (Moore, 2005).... With the advent of Internet, this concept has become more complex and is sometimes synced with cyber-crime.... To make it clear, computer-related crime and cyber-crime are both different terminologies with different meanings....
14 Pages (3500 words) Essay

Computer Crimes and Digital Investigations

nbsp;… The following unlawful activities are conducted using the computer, for example, cyber defamation, e-mail spoofing, pornography, forgery, financial crimes, intellectual property crime, a sale of illegal articles, online gambling, and cyberstalking.... The concept of crime is not much different than cybercrime except the distinction between the use of a digital computer as an object and subject of conduct amounting to a crime.... yber-crime demote to all the activities done with criminal purpose on the internet or in cyber-space....
12 Pages (3000 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us