Provided an overview of some of the key concepts to do with hacking. We
have considered the beginnings of hacking and how it was influenced by the literary
tradition of Cyberpunk. It is interesting to note that what was once depicted in science-
fiction as an imagined activity in a dystopian society has become real and has gone on to
pose a significant threat to computer security and a central concern of information
technology experts.
Here we can see the true beginnings of hacking and how what was once a fictional
theoretical concept has become a reality with a significant impact on the digital culture.
Next we looked at the different types of hackers and noted the distinction between ethical
hackers, who perform hacking legally and in order to improve computer security
(otherwise known as white hat hackers) and unethical hackers, who use their skills
illegally in order to wreak havoc, disrupt services, and steal information and data
(otherwise known as black hat hackers.)
With this it is interesting to note how technical skill can be used differently depending on
motivation, and how the hacking community is not united by a clear and consistent
ideology. Subsequently we looked at computer security in order to better understand the
conditions within which hacking takes place. By learning about computer security it is
possible to understand the challenges faced by hackers who come up against security
measures, as well as the challenges faced by those seeking to maintain the security of their
computer systems.
Any introduction to hacking would not be complete without this examination of computer
security because the value of maintaining computer security is what motivates ethical
hackers, and what unethical hackers are fighting against. Finally we looked at the
numerous different hacking techniques that can be utilized, including both automated
software that finds and exploits vulnerabilities in computer systems, as well as manual
methods for breaking through security measures such as discovering a password through
trial and error.
In this chapter we also considered the vast area of hacking that is social engineering, by
which a hacker is able to access a secure network by illegally obtaining the information
needed. In today’s digital culture we are becoming increasingly reliant on technology for
everything that we do.
As technology has improved our lives have become easier in many ways, but with this
blossoming industry new types of criminals have also been created. A criminal does now
not even need to leave the house in order to steal money, but can do so simply by hacking
into their victim’s computer and accessing confidential data.
Hacking is not always illegal though, and this has also looked at the ways in which
there is an increasing demand for computer experts to become ethical hackers in order to
further promote and protect computer security. This introduction to the world of hacking
has revealed that hacking is not a simple activity but a huge spectrum of different
behaviors that involve a wide range of techniques and motivations.
Moreover, hacking is shown to be an activity that has a strong sense of cult affiliation, in
the sense that hackers strongly feel part of the hacking community. As digital culture
continues to grow, it seems that both ethical and unethical hacking will become more and
more skilled and its impact evermore significant.
have considered the beginnings of hacking and how it was influenced by the literary
tradition of Cyberpunk. It is interesting to note that what was once depicted in science-
fiction as an imagined activity in a dystopian society has become real and has gone on to
pose a significant threat to computer security and a central concern of information
technology experts.
Here we can see the true beginnings of hacking and how what was once a fictional
theoretical concept has become a reality with a significant impact on the digital culture.
Next we looked at the different types of hackers and noted the distinction between ethical
hackers, who perform hacking legally and in order to improve computer security
(otherwise known as white hat hackers) and unethical hackers, who use their skills
illegally in order to wreak havoc, disrupt services, and steal information and data
(otherwise known as black hat hackers.)
With this it is interesting to note how technical skill can be used differently depending on
motivation, and how the hacking community is not united by a clear and consistent
ideology. Subsequently we looked at computer security in order to better understand the
conditions within which hacking takes place. By learning about computer security it is
possible to understand the challenges faced by hackers who come up against security
measures, as well as the challenges faced by those seeking to maintain the security of their
computer systems.
Any introduction to hacking would not be complete without this examination of computer
security because the value of maintaining computer security is what motivates ethical
hackers, and what unethical hackers are fighting against. Finally we looked at the
numerous different hacking techniques that can be utilized, including both automated
software that finds and exploits vulnerabilities in computer systems, as well as manual
methods for breaking through security measures such as discovering a password through
trial and error.
In this chapter we also considered the vast area of hacking that is social engineering, by
which a hacker is able to access a secure network by illegally obtaining the information
needed. In today’s digital culture we are becoming increasingly reliant on technology for
everything that we do.
As technology has improved our lives have become easier in many ways, but with this
blossoming industry new types of criminals have also been created. A criminal does now
not even need to leave the house in order to steal money, but can do so simply by hacking
into their victim’s computer and accessing confidential data.
Hacking is not always illegal though, and this has also looked at the ways in which
there is an increasing demand for computer experts to become ethical hackers in order to
further promote and protect computer security. This introduction to the world of hacking
has revealed that hacking is not a simple activity but a huge spectrum of different
behaviors that involve a wide range of techniques and motivations.
Moreover, hacking is shown to be an activity that has a strong sense of cult affiliation, in
the sense that hackers strongly feel part of the hacking community. As digital culture
continues to grow, it seems that both ethical and unethical hacking will become more and
more skilled and its impact evermore significant.
I am really very happy to find this particular site. I just wanted to say thank you for this huge read!! I absolutely enjoying every petite bit of it and I have you bookmarked to test out new substance you post.
ReplyDelete