Wednesday, May 6, 2020
Essay on Counter culture / Hackers - 1346 Words
Why Hackers Do The Things They Do? Hackers. You know them as gangly kids with radiation tans caused by too many late nights in front of a computer screen. Evil beings who have the power to wipe out your credit rating, cancel your cable TV, raise your insurance premiums, and raid your social security pension. Individuals who always avert their eyes and mumble under their breath about black helicopters and CIA transmissions. Paranoid, social deviants who could start World War III from the privacy of their bedrooms. Or so the mainstream media would have you believe. In reality, most hackers are ordinary people with a great deal of curiosity, above-average skills with a computer, a good understanding of human nature, and plenty of time toâ⬠¦show more contentâ⬠¦They do, however, use it within their group to stratify themselves. Hackers with the most information gain the highest prestige within the community. They also gain a great deal of power from that information. Most people cannot cancel the phone service of those who upset them. To a truly proficient hacker, this is not a very difficult problem. Hacking involves the accumulation of knowledge, which is accompanied by the greater status and power. To almost all computer professionals the actions of hackers are despicable and justify all sorts of nasty punishments. I fully agree that hacking is a criminal offense and should be prosecuted. The only thing that bothers me from a moral standpoint is that these criminals are essentially the cyberspace equivalent of teenage vandals. They do not know the implications of what they are doing. These people are displaying situational morality, and their actions are random, yet predictable. Many professionals argue that the cause why hackers hack is about the same as any other criminal. It mostly has to do with their families, and friends and the environment they grew up in. I agree with professionals at this point and I believe that the issue goes back to how they are raised. I am not saying that these people have bad parents. I think that while parents go around telling their children not to do drugs, to study hard in school, etc., they do not tell their children that it is bad toShow MoreRelatedHacking And The Social Learning Theory1365 Words à |à 6 Pagesapproves of definitions favorable to deviance, the more likely they will participate in that behavior (Morris Higgins, 2010). Hacking and the Social Learning Theory The social learning theory views hackers as individuals who are socialized into breaking rules through peer-association. A majority of hackers are young and learn from their friends in a type of communal environment. Studies show that this behavior takes place in a distinctive socio-cultural context and ââ¬Å"communalâ⬠structure. Just likeRead MoreCyber Security and Technology Essay1097 Words à |à 5 Pagescouple of weeks depending on the time period or it may not have been possible to obtain that book. But now people can access a vast amount of information in a matter of minutes. Example, in modern times if someone wanted to know about a different culture they could simple look up the information on a computer or any device that had access to internet. People can also store sensitive information in cyberspace data such as finances, personal or informative. Cyberspace is capable of holding a whole historyRead MoreSocial Darwinism in Cyberpunk Literature Essay1305 Words à |à 6 PagesSocial Darwinism of the nineteenth century contains several facets such as political, corporate, and individual forms of the theory. Although all these facets are found in Cyberpunk literature the genre mainly depicts the lower class of Americas culture fighting for survival. Many may argue this drive to survive, this Social Darwinism, can be found in genres other than Cyberpunk. In some ways that idea is true about Social Darwinism. For instance, the movie The Godfather had the Mafia familiesRead More Cybercrimes Reflected through Television Programs Essay1092 Words à |à 5 PagesCybercrimes are a culture which has facilitated technological criminal efforts to undermine government and private organizations in order to create disruption and panic on a large scale. Todayââ¬â¢s television programming takes a series of intelligence type action roles, which prove the impact of post 9/11 computer crimes which has increased nationwide fears. The television series 24 is an action drama featuring a make belief personality known as Jack Bauer. Bauer is a counter-terrorist agent who worksRead MoreThe Culture Of Shut Up By Jon Lovett Essay1431 Words à |à 6 Pagesconcept of unlimited compatibility and get around the drawbacks. Within the internet and all the ideas and saying that are flooded into the streams of computer-human interactions there will always be room for backlash and critique. In the article ââ¬Å"The Culture of Shut Upâ⬠Jon Lovett produces his ideas on how society needs to get a grip on the endless amount of connectedness that spawns from the internet and how people must deal with the fact of how unreserved it is. When someone says something, a personRead MoreReactions to the Boston Marathon Bombing Essay1184 Words à |à 5 Pagesknown for being a loose association of unidentified individuals who use internet technology to carry out hacks on the web in the name of protest. According to Gabriella Coleman (2012), ââ¬Å"Anonymousâ⬠began on the internet forum 4chan, and grew from the culture on that site (paragraph 1). 4chan (n.d.) describes itself as ââ¬Å"...[A] simple image-based bulletin board where anyone can post comments and share images.â⬠(What is 4chan? section, para. 1) The site notes that the name ââ¬Å"Anonymousâ⬠came from the monikerRead MoreFice Of Personnel Management Essay1715 Words à |à 7 Pagesto the fundamental principles of security practice: the Confidentiality, Integrity and Availability (CIA triad), combined with risk management policies we have learn in the previous weeks, as well as incorporating the importance of organizational culture that could lead to a path of preventative cybersecurity. Later in the paper we will examine further on the fundamentals of security practice that would create strong cyber defense posture. EFFECTIVE CYBERSECURITY AND RISK MANAGEMENTRead MoreCyber Crimes Reflected Through Television Programs800 Words à |à 4 PagesCyber Crimes Reflected Through Television Programs Cybercrimes are a culture which has facilitated technological criminal efforts to undermine government and private organizations in order to create disruption and panic on a large scale. Todayââ¬â¢s television programming takes a series of intelligence type action roles, which prove the impact of post 9/11. Computer crimes have increased nationwide fears. The television series 24 is an action drama featuring a make believe personality known as JackRead MoreEssay on The Hacker Community 2575 Words à |à 11 PagesHackers are typically defined as individuals that gain unauthorized access to another personââ¬â¢s computer. Although that definition is rather specific it can be broadened to include other illegal activities such as ââ¬Å"phishingâ⬠, which can be done on its own and may be separate from hacking. The hacker community is what is contended to be an ââ¬Å"imagined communityâ⬠meaning they occupy no singular geographic location, like members of a community l ike Rosedale, nor have they have any set guidelines for becomingRead MoreA Complete Risk Mitigation Strategy997 Words à |à 4 Pagesproject. Background Planning, Asset Analysis, Threat Analysis, vulnerability Analysis, Risk Identification, Risk Analysis, Risk Treatment, Monitoring Risk. Select an accrediting body to ensure IA is not only a process but a part of organizational culture going forward While in most cases certification and accreditation is often received from a governmental body some are also received from international sources as well. During this section I will identify the different bodyââ¬â¢s and provide the differences
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.