Home > Free Essays > Tech & Engineering > Computer Science > Ethical and Illegal Computer Hacking

Ethical and Illegal Computer Hacking Argumentative Essay

Exclusively available on IvyPanda Available only on IvyPanda
Updated: Mar 17th, 2022

Computer hacking refers to the art of identifying and exploiting the weaknesses that exist in computer systems. Hacking can be done on a malicious basis or on good grounds. Hackers use their knowledge and skills to exploit the flaws that exist in certain systems in consideration to their specialization. Hacking exists in two forms, which are ethical and illegal hacking.

For the ethical hackers, they pursue hacking in order to identify the unexploited areas or determine weaknesses in systems in order to fix them. On the contrary, illegal hackers’ interests are for personal gains such as money and prestige.

Through hacking, they gain access into confidential information and manipulate it for their own gain or cause losses to the system owners (Caldwell, 2003). Repeatedly, it is realized that ethical hackers are the real hackers because of their expertise in computer systems while illegal hackers are known as crackers.

In the process of hacking, hackers gain different information depending on their core objective for hacking. There exist white hat, grey hat and black hat hackers.

White hat hackers perceive the challenges that are manifested in computer systems and seek ways in which they can develop measures to counter any eventualities in addition to development of up-to-date security systems. The grey hat hackers are individuals who break into other individuals’ or organizations’ systems in order to establish the deficiencies or illegal acts they conduct.

Black hat hackers use the profit motive, protest or individual challenges from the knowledge they have to break into systems (Gunkel, 2001). The whole act of hacking demands creative, focused, and endowed individuals with problem-solving skills. Generally, hackers have an in-depth passion to explore into computer systems for various reasons.

In the exercise of hacking, it is realized that most hackers are senior individuals in the society. This norm is enhanced by the fact that they have autonomous access to various organizations’ security systems and have the necessary input required for hacking such as monetary resources and hacking experience. In their act of hacking, they explore the daily challenges they encounter in their field of work, and explore new ideas.

This culture propagates a competitive notion, which could either have negative or positive results. Meanwhile, the outcome of the identified continuous challenge for effectiveness or inefficiencies in security systems make the hackers contented (Parks, 2008). Furthermore, hacking becomes beneficial if pursued on a positive mindset in the innovation of appropriate security systems.

Over the decades, it has been realized that the young adults have the greatest passion for hacking. This norm is because of their magnificent energy and eagerness to explore the unique areas unidentified by their predecessors.

The presumption that hackers have negative and positive impacts to the society attracts them to explore the challenges attributed to hacking in the process of learning about computer hardware and software. As seen from the destructive nature that can be imparted on systems software and hardware by hackers, it is necessary to conduct a continuous search for efficient systems that can ensure protection of organization resources.

To counter the acts of illegal hackers, it is mandatory to adopt measures such as firewalls and other appropriate security systems that prevent intruders or phreakers from accessing confidential information. On this note, organizations are protected from harm despite the hackers skills that are either beneficial or destructive to the society as a whole.

References

Caldwell, W. (2003). Computer security sourcebook. Detroit, MI: Omnigraphics.

Gunkel, D. J. (2001). Hacking cyberspace. Boulder, Colo.: Westview Press.

Parks, P. J. (2008). Computer hacking. Farmington Hills, MI: Lucent Books.

This argumentative essay on Ethical and Illegal Computer Hacking was written and submitted by your fellow student. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly.
Removal Request
If you are the copyright owner of this paper and no longer wish to have your work published on IvyPanda.
Request the removal

Need a custom Argumentative Essay sample written from scratch by
professional specifically for you?

Writer online avatar
Writer online avatar
Writer online avatar
Writer online avatar
Writer online avatar
Writer online avatar
Writer online avatar
Writer online avatar
Writer online avatar
Writer online avatar
Writer online avatar
Writer online avatar

certified writers online

Cite This paper
Select a referencing style:

Reference

IvyPanda. (2022, March 17). Ethical and Illegal Computer Hacking. https://ivypanda.com/essays/computer-hacking/

Reference

IvyPanda. (2022, March 17). Ethical and Illegal Computer Hacking. Retrieved from https://ivypanda.com/essays/computer-hacking/

Work Cited

"Ethical and Illegal Computer Hacking." IvyPanda, 17 Mar. 2022, ivypanda.com/essays/computer-hacking/.

1. IvyPanda. "Ethical and Illegal Computer Hacking." March 17, 2022. https://ivypanda.com/essays/computer-hacking/.


Bibliography


IvyPanda. "Ethical and Illegal Computer Hacking." March 17, 2022. https://ivypanda.com/essays/computer-hacking/.

References

IvyPanda. 2022. "Ethical and Illegal Computer Hacking." March 17, 2022. https://ivypanda.com/essays/computer-hacking/.

References

IvyPanda. (2022) 'Ethical and Illegal Computer Hacking'. 17 March.

Powered by CiteTotal, easy referencing maker
More related papers