My Research Based Blog is about computer hacking. Although many people automatically assume computer hacking is a derogatory term, it may actually be used for good or bad. Morals and ethics often come into play regarding this topic. The original term "computer hacking" is someone who is a computer enthusiast that enjoys computer programming, problem-solving with computers, trying to expand a computer's capabilities, learning all the details of a particular software, etc. However, this term can be applied to someone who gains unauthorized access to computer systems, with some malicious intent (1). Unfortunately, this is often the case, and is something that puts innocent people around the world at risk.
The concept of computer hacking, though, when not used to harm others, is a very interesting concept. Computer hacking is both an art and science. It is an art because it involves creativity which is equivalent to the painting of a beautiful landscape, and science because of its technical aspects. Some people who indulge in computer hacking develop an interest in computer hacking out of simple intellectual curiosity. This can be a very educational and interesting experience. A common trait among all hackers is that they possess technological savvy, are willing to take the risks and are passionate about various programming languages. "In reality, most hackers are ordinary people with a great deal of curiosity, above-average skills with a computer, a good understanding of human nature, and plenty of time to kill." (5). A white hat hacker is the term for one who breaks security for non-malicious purposes. These purposes may range from testing the security system, to finding the major loopholes in the network. Such people normally follow the legitimate ways and work within the precincts of cyber laws. These individuals use their skills to find flaws in the company’s security system, and to prevent them from getting discovered by unethical hackers. In most cases, ethical hacking helps to prevent identity theft and other serious computer-related crimes.(2) I feel that white hat hackers are doing nothing wrong. What they do can be used for immoral things, however they are just using their knowledge to learn and sometimes help others.
On the other hand, computer hackers can often be harmful and unethical. Black hat hackers are those who generally subvert computer security without authorization, with the help of viruses and various other hacking tools. These hackers use technology for vandalism, credit card fraud, or identity theft. (2) People practicing unethical hacking, generally tend to steal personal information, change a corporation’s financial data, break security codes to gain unauthorized network access, or conduct other destructive activities. According to the Georgia Computer Systems Protection Act HB 822 (4) "any person who uses a computer or computer network with the intention of examining any employment, medical, salary, credit, or any other financial or personal data relating to any other person with knowledge that such examination is without authority shall be guilty of the crime of computer invasion of privacy." (3) Black hat hackers are immoral and doing illegal things to harm others. This is a disadvantage to people being very educated about computer programming.
Computer hacking, while considered an art and science, can be beneficial as well as harmful. Those who are ethical will use computer hacking for personal interest, exploration, and expansion of knowledge. Anyone who uses their skills to steal identities, break into personal information, or cause harm are being unethical.
(1) "Computer Hacking." Buzzle Web Portal: Intelligent Life on the Web. 2000. Web. 14 Mar. 2010. .
(2) Srivastava, Swapnil. "What Is Computer Hacking." Buzzle Web Portal: Intelligent Life on the Web. Web. 14 Mar. 2010. .
(3) "Legal and Ethical Aspects of Computer Hacking." Internetwork Security Georgia Institute of Technology. Ed. Kiran Tajani. Georgia Tech. Web. 14 Mar. 2010. .
(4) Georgia Institute of Technology - Georgia Tech Information Security. Web. 14 Mar. 2010. .
(5) "Why Hackers Do The Things They Do? -- Causal Argument." ECheat. 3 July 2005. Web. 15 Mar. 2010. .