Warning: Use of undefined constant referer - assumed 'referer' (this will throw an Error in a future version of PHP) in /usr/home/essaywo/public_html/essays on line 102

Warning: Use of undefined constant host - assumed 'host' (this will throw an Error in a future version of PHP) in /usr/home/essaywo/public_html/essays on line 105

Warning: Cannot modify header information - headers already sent by (output started at /usr/home/essaywo/public_html/essays:102) in /usr/home/essaywo/public_html/essays on line 106

Warning: Cannot modify header information - headers already sent by (output started at /usr/home/essaywo/public_html/essays:102) in /usr/home/essaywo/public_html/essays on line 109
Computer Hacker - School Essays

Computer Hacker

Michael Brooks
BUS 225
Ms. Woods
4/25/2013

Honor Among Thieves and The Hacker Ethic

The rights of a person have been well defined by law and sanctions such as the United Nations; however how are they able to protect the rights of these people when they are on a un moderated medium such as the internet? A question like this brings up many grey areas of the law that have allowed the proliferation of what seems to be the most feared type of person on the internet - often referred to as Hackers. To be hacked into means that your security measures have been compromised and that they have access to your information system. With the increasing dependence of computers to store ...

Want to read the rest of this paper?
Join Essayworld today to view this entire essay
and over 50,000 other term papers

one that has eluded many of their victims. To say that they are rude and arrogant would be far from the truth. A well-known hacker by the name of Kevin Mitnick bared these ethics out to the court in what appears to be a quite truthful testimony.

He aired his previous hacking experience was mostly of social engineering (using pretenses of other people to intimidate low level employee's to do what they will) and that security systems were much easier to bypass by using this method. All of the time he had spent hacking also, he said in his testimony as not to make a single dime at all. This is far in contrast to something such as a bank robbery where the intent is to do whatever is possible to take possession of something that is not theirs, even if a human life is at stake.

A hacker seemingly has knowledge of many things beyond the realm of computers and is aware of the risks and consequences of the actions they take. Some of these hackers have a lot more power than is ...

Get instant access to over 50,000 essays.
Write better papers. Get better grades.


Already a member? Login


CITE THIS PAGE:

Computer Hacker. (2013, April 26). Retrieved November 30, 2024, from http://www.essayworld.com/essays/Computer-Hacker/102594
"Computer Hacker." Essayworld.com. Essayworld.com, 26 Apr. 2013. Web. 30 Nov. 2024. <http://www.essayworld.com/essays/Computer-Hacker/102594>
"Computer Hacker." Essayworld.com. April 26, 2013. Accessed November 30, 2024. http://www.essayworld.com/essays/Computer-Hacker/102594.
"Computer Hacker." Essayworld.com. April 26, 2013. Accessed November 30, 2024. http://www.essayworld.com/essays/Computer-Hacker/102594.
JOIN NOW
Join today and get instant access to this and 50,000+ other essays


PAPER DETAILS
Added: 4/26/2013 12:37:24 PM
Submitted By: mbrooks1012
Category: Computers
Type: Premium Paper
Words: 1111
Pages: 5

Save | Report

SHARE THIS PAPER

SAVED ESSAYS
Save and find your favorite essays easier

SIMILAR ESSAYS
The Computer Underground
The Computer Underground.
Computer Crime In The 90's
Computer Crime
Computer Crimes
Computer Crime
Computer Crime 2
Computer Crimes: Laws Must Be P...
Computer Crime
Laws Must Be Passed To Address ...
Copyright | Cancel | Contact Us

Copyright © 2024 Essayworld. All rights reserved