SlideShare a Scribd company logo
1 of 7
Download to read offline
Perrin 1


Luke Perrin

Mrs. Lester

Advance Composition

11 October 2011

                                         Hacking Plague

       More than 30 percent of computers are infected by hacker-made viruses (“China Issues”).

Hackers are an international threat that breach computers to gain information, to harm others,

to make a profit, or to cripple a system. Hackers steal anything that might give them what they

specifically want. This threat has increased to the severity that hacking threatens corporations

and governments. Unfortunately, the hacking epidemic is rapidly spreading, but in order to

counter hacking, one must examine and pinpoint the problems, while analyzing the solutions and

outlook.

               In order to counter hacking, one must have an understanding of what hacking is.

As discussed by Dr. Mizrach, “Hackers are just like people, and hold their own beliefs and

ethics.” Many people think of hackers under the stereotype of the overweight, hygienically

challenged, antisocial being. However, hackers have evolved into the polar opposite appearance

and blend in with normal people. Hackers have rules, regulations, and laws that they follow.

Each set is similar to many organizations. Unlike past efforts, hackers do not have to be at their

target to hack it; rather, they can be anywhere in the world, as long as they have their computers

(“Cyber Tension”). Hackers are not stationary anymore, but work from laptops and other mobile

computers. Modern technology has allowed many hackers the ability to work from a laptop in

nearly any location. The world communication has created the downfall of secure, computerized

information through the use of the Internet, networks, satellites, and other modern innovations.
Perrin 2


Hackers do not need a direct hook to the source of information to steal it. They can break into the

systems through nearly any means (phone lines, Internet, etc). The technological advances of the

modern era have created the developing downfall of mass communication. Similarly Dr. Mizrach

stated, “Don't leave a trail or trace of [hacker’s] presence; don't call attention to [hacker] or

[hacking] exploits.” For instance, Hackers use tricks, viruses, and other techniques to break

through security systems. These tricks often disguise themselves as “working” programs, but

slowly steal information from the victim. Hackers cover their “tracks” through the use of viruses

which often cause havoc on the victim’s computer. Often the viruses create more back doors for

the hacker to return through later. Although the overall definition of hacking is diverse, the

specific problems with hacking are a more dominant matter.

               The hacking epidemic can be linked through several key problems caused by

hackers. Unfortunately, hackers, independent or military, are capable of attacking strong

government servers if given time to test the system (Yam). Hackers can and have crippled entire

government -run installations. A prime example is the series of attacks on the Pentagon and

Lockheed Martin which resulted in stolen military data (“Report: Stolen”). Hackers are not

reckless, and they probe entire systems for weaknesses. These probes take weeks, or even years,

to successfully accomplish. Many of these weaknesses are not realized by the installations and

can cause severe damage to the facility. Another issue is that hackers create viruses, as stated by

Dr. Mizrach: “These are people who write code which attempts to a) reproduce itself on other

systems without authorization and b) often has a side effect, whether that be to display a

message, play a prank, or trash a hard drive.” These viruses create havoc, which allows the

hackers to easily breach security. Some examples are Trojan (which leaves back doors open),

Botnet (which allows for hacker control), and false programs or advertisements (Mizrach).
Perrin 3


Viruses also weaken the computers, and, if handled poorly, cripple entire networks. Hackers

craft viruses to make their breaches easier, while allowing for a clean escape. Another problem

comes from organized groups of hackers, like Anonymous or LolzSec (Saporito). Hackers, as

individuals, are a dangerous threat to any computer; however, an organized group of hackers is a

potentially fatal threat to entire networks. These groups are usually professional hackers and

know exactly where to find weaknesses in firewalls or security in computers. These attacks have

crippled military, government, civilian infrastructure, and even home entertainment. These

hackers are capable of breaching all levels of security, and only a few experts can accurately

counter these attacks. Hackers are a threat to all levels of technological use, unfortunately there

is no permanent solution.

                Although there are not any permanent solutions, there are several methods of

preventions to hacking. Unknown to most, the tools created by hackers to break into systems can

also be used in a reverse method. The tools can be used to find security holes, back doors, and

other areas of weakness (Lemos). The very tools used by hackers can provide an antidote to

hacking. These tools allow companies or governments to improve their own defenses. However,

this temporary solution requires companies to work hand in hand with those that would cause

harm to their systems. Yet, not all hackers conduct illegal activities. Many work as Information

Technology specialists, or white caps, and help prevent hackers from breaking into the systems.

Currently, the focus is not just on traditional warfare, but on a larger cyber war. Hackers across

the world are involved in the attacks on different countries. Primarily, the United States and

China appear to be the forefront of the war (Yam). The United States and China can and do hack

each other. Their attacks steal everything from blueprints to meaningless emails. On the

contrary, the real issue here is the lack of funding governments put into IT, and the results of this
Perrin 4


deficit being a lack of ability to counter hacks. Governments are steadily increasing in their

activities revolving around the cyber war. Many governments have hired hackers as soldiers to

counter and attack other governments. Through this method, hackers are controlled by the

government and are focused on national enemies instead of civilians. Although a hacker has

been removed from a system, the operating system can still be infected. Computers need to be

reformatted, and the operating system reinstalled to prevent the hacker from reentering the

system (“Crucial Paradigm”). The computer can never return to a safe status once it has been

hacked. By reinstalling the system, the computer is given a clean slate against hackers. Hackers

can return to the computer like a common cold if actions are not made to prevent the attacks

again. Users have to re-secure the computer after an attack, and then reformat the computer to

make it stronger against hackers. Hackers are an incurable disease, and the future of hacking is

morbidly ill.

                The outlook of preventing the hacking epidemic is not encouraging and without

any traces of a simple end. For example, the Conficker virus is a rapidly spreading virus that has

already infected nearly 30 percent of the computers internationally (“China Issues”). This virus

spreads across the Internet, and it is capable of hiding itself in multiple places across a computer.

It is just one example of how many computers can be affected by one hacker-made virus. The

Conficker virus is not a simple Trojan, but a combination of the strongest malware in the

Internet. It uses this combination to move quickly into thousands of computers every day and

across 200 countries total. As reported by Robert Lemos, “...but [hacker’s tools] can also be used

to secure them.” Hackers will always be around, so long as technology advances. Although

hackers can not be defeated, their tools can be reverse engineered to provide methods to counter

hackers. Yet, hackers are able to counter every attempt made to stop them through their own
Perrin 5


programming abilities. This programming war is impossible to win, since there is no end to the

increasing number of hackers. As stated earlier, hackers across the world are involved in the

attacks on different countries. Hackers are a fast rising threat to governments, yet few take the

initiative to combat it. Governments can barely counter attacks, and they have decreasing

budgets to improve these defenses. The rise in cyber warfare is shifting the way spying,1 or

espionage, is conducted. Now hackers are capable of stealing from facilities in all branches of

the government, and they face little repercussions for it. The government’s focus is on physical

warfare when the real threat comes from a cyber-based enemy. The outlook for hacking is a

tragedy in the making, and without any signs of a permanent end.

       In spite of hacking, future generations need to go into computer programming because

the world demands people with the ability to program. Although hackers will never go away, this

issue should not deter any individual from this field. Computers are used in nearly every field

of work, and in order to get an edge on other workers, people need to have the ability to work

fluently with a computer. The future of many jobs will be in computer technology, and the job

fields will only increase from this change. Society changes with the flow of technology, which is

constantly evolving into more sophisticated ideas. Programmers will be at the forefront of these

changes and will provide the backbone of future ideas. Yet, Programmers will also be the wall

standing between hackers and the rest of the world. Programmers are the antibody to the hacking

disease, and the only applicable means of stopping hackers. Technology will always advance so

long as there are new ideas or inventions. Programmers provide the blood of these innovations,

and the ability to code will be essential. Programming is just like many fields, and shares the

same risk as any other job; however, the rewards from programming are sufficiently better.
Perrin 6




                                          Works Cited

“China Issues Legal Interpretation to Tighten Grip on Hacking.” Xinhua. N.p., 29 Aug. 2011.

       Web. 10 Sept. 2011. <http://news.xinhuanet.com/​english2010/​china/​2011-08/​29/​

       c_131082389.htm>.

“Hacking Attacks - Prevention.” Crucial Paradigm. N.p., n.d. Web. 28 Sept. 2011. <http://

       www.crucialp.com/​resources/​tutorials/​website-web-page-site-optimization/​hacking-

       attacks-prevention.php>.

Lemos, Robert. “Shades of gray at security conference.” CNET News. N.p., 2 May 2002. Web.

       11 Sept. 2011. <http://news.cnet.com/​2100-1001-897596.html?tag=txt>.

Mick, Jason. “Cyber Tension Flare Amoungst U.S., Chinese Military.” Daily

       Tech. N.p., 12 Mar. 2008. Web. 8 Sept. 2011. <http://www.dailytech.com/​

       Cyber+Tensions+Flare+Amongst+US+Chinese+Military/​article11045.htm>.

Mick, Jason.“Reports: Hackers Use Stolen RSA Information to Hack Lockheed Martin.”

       Daily Tech. N.p., 30 May 2011. Web. 6 Sept. 2011. <http://www.dailytech.com/​

       Reports+Hackers+Use+Stolen+RSA+Information+to+Hack+Lockheed+Martin/​

       article21757.htm>.

Mizrach, Steven. “Is there a Hacker Ethic for 90s Hackers?” Old and New Hacker Ethics. N.p.,

       n.d. Web. 11 Sept. 2011. <http://www2.fiu.edu/​~mizrachs/​hackethic.html>.

Saporito, Bill. “Hack Attack.” Time 4 July 2011: n. pag. Academic Search Complete. Web. 9

       Sept. 2011. <http://proxygsu-sche.galileo.usg.edu/​login?url=http://search.ebscohost.com/​

       login.aspx?direct=true&db=a9h&AN=61963642&site=ehost-live>.

Yam, Marcus. “Chinese Military Suspected of Hack on Pentagon.” Daily Tech.
Perrin 7


N.p., 4 Sept. 2007. Web. 9 Sept. 2011. <http://www.dailytech.com/​

Chinese+Military+Suspected+of+Hack+on+Pentagon/​article8717.htm>.

More Related Content

What's hot

What's hot (20)

Computer Hacking - An Introduction
Computer Hacking - An IntroductionComputer Hacking - An Introduction
Computer Hacking - An Introduction
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)
 
hacking
hackinghacking
hacking
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
 
TYPES OF HACKING
TYPES OF HACKINGTYPES OF HACKING
TYPES OF HACKING
 
Cybercrime (Computer Hacking)
Cybercrime (Computer Hacking)Cybercrime (Computer Hacking)
Cybercrime (Computer Hacking)
 
basic knowhow hacking
basic knowhow hackingbasic knowhow hacking
basic knowhow hacking
 
185
185185
185
 
Hacking presentation
Hacking presentationHacking presentation
Hacking presentation
 
Ethical Hacking and Network Security
Ethical Hacking and Network SecurityEthical Hacking and Network Security
Ethical Hacking and Network Security
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Hacking and Hackers
Hacking and HackersHacking and Hackers
Hacking and Hackers
 
ethical hacking in the modern times
ethical hacking in the modern timesethical hacking in the modern times
ethical hacking in the modern times
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
How to hack or what is ethical hacking
How to hack or what is ethical hackingHow to hack or what is ethical hacking
How to hack or what is ethical hacking
 
What is Hacking? AND Types of Hackers
What is Hacking? AND Types of HackersWhat is Hacking? AND Types of Hackers
What is Hacking? AND Types of Hackers
 
Hacking Tutorial in Telugu
Hacking Tutorial in TeluguHacking Tutorial in Telugu
Hacking Tutorial in Telugu
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 

Viewers also liked

ENSP703 Thesis Statement
ENSP703 Thesis StatementENSP703 Thesis Statement
ENSP703 Thesis Statementfeueacmrq
 
Research Paper - Facebook
Research Paper - FacebookResearch Paper - Facebook
Research Paper - FacebookGuiM _
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical HackingNeel Kamal
 
Cybercrime Research Paper
Cybercrime Research PaperCybercrime Research Paper
Cybercrime Research PaperWhitney Bolton
 
Is Hacking Art
Is Hacking ArtIs Hacking Art
Is Hacking ArtZotronix
 
Research Paper on the Benefits of Publicity
Research Paper on the Benefits of PublicityResearch Paper on the Benefits of Publicity
Research Paper on the Benefits of PublicityEverythingPR
 
Music Education Research Paper
Music Education Research PaperMusic Education Research Paper
Music Education Research PaperBrandonjferrell
 
UW Microbiology Research Paper on Biofilm Formation in P. aeruginosa
UW Microbiology Research Paper on Biofilm Formation in P. aeruginosaUW Microbiology Research Paper on Biofilm Formation in P. aeruginosa
UW Microbiology Research Paper on Biofilm Formation in P. aeruginosaHuy Pham
 
Summary Presentation based on healthcare white paper by grail research
Summary Presentation based on healthcare white paper by grail researchSummary Presentation based on healthcare white paper by grail research
Summary Presentation based on healthcare white paper by grail researchjiitian2013
 
Inclusion in the Classroom
Inclusion in the ClassroomInclusion in the Classroom
Inclusion in the Classroomjessieholbert
 
Research and writing skills success in 20 minutes a day
Research and writing skills success in 20 minutes a dayResearch and writing skills success in 20 minutes a day
Research and writing skills success in 20 minutes a dayhlksd
 
Hannah S. Senior Project Research Paper
Hannah S. Senior Project Research PaperHannah S. Senior Project Research Paper
Hannah S. Senior Project Research Paperhannahis
 
Corporate compliance plan
Corporate compliance planCorporate compliance plan
Corporate compliance planHarrisFred
 
Play Therapy research paper
Play Therapy research paperPlay Therapy research paper
Play Therapy research paperJenice Crutcher
 
Alternative energy research paper
Alternative energy  research paperAlternative energy  research paper
Alternative energy research paperjlosh032196
 
Research on Jane Austen
Research on Jane AustenResearch on Jane Austen
Research on Jane Austenguestdaf645
 

Viewers also liked (20)

ENSP703 Thesis Statement
ENSP703 Thesis StatementENSP703 Thesis Statement
ENSP703 Thesis Statement
 
Research Paper - Facebook
Research Paper - FacebookResearch Paper - Facebook
Research Paper - Facebook
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Cybercrime Research Paper
Cybercrime Research PaperCybercrime Research Paper
Cybercrime Research Paper
 
Is Hacking Art
Is Hacking ArtIs Hacking Art
Is Hacking Art
 
Reaction 1
Reaction 1Reaction 1
Reaction 1
 
Research Paper on the Benefits of Publicity
Research Paper on the Benefits of PublicityResearch Paper on the Benefits of Publicity
Research Paper on the Benefits of Publicity
 
Music Education Research Paper
Music Education Research PaperMusic Education Research Paper
Music Education Research Paper
 
UW Microbiology Research Paper on Biofilm Formation in P. aeruginosa
UW Microbiology Research Paper on Biofilm Formation in P. aeruginosaUW Microbiology Research Paper on Biofilm Formation in P. aeruginosa
UW Microbiology Research Paper on Biofilm Formation in P. aeruginosa
 
Summary Presentation based on healthcare white paper by grail research
Summary Presentation based on healthcare white paper by grail researchSummary Presentation based on healthcare white paper by grail research
Summary Presentation based on healthcare white paper by grail research
 
Group 3 final term paper in social psychology
Group 3 final term paper in social psychologyGroup 3 final term paper in social psychology
Group 3 final term paper in social psychology
 
Inclusion in the Classroom
Inclusion in the ClassroomInclusion in the Classroom
Inclusion in the Classroom
 
Research and writing skills success in 20 minutes a day
Research and writing skills success in 20 minutes a dayResearch and writing skills success in 20 minutes a day
Research and writing skills success in 20 minutes a day
 
Hannah S. Senior Project Research Paper
Hannah S. Senior Project Research PaperHannah S. Senior Project Research Paper
Hannah S. Senior Project Research Paper
 
Corporate compliance plan
Corporate compliance planCorporate compliance plan
Corporate compliance plan
 
Play Therapy research paper
Play Therapy research paperPlay Therapy research paper
Play Therapy research paper
 
Alternative energy research paper
Alternative energy  research paperAlternative energy  research paper
Alternative energy research paper
 
Research on Jane Austen
Research on Jane AustenResearch on Jane Austen
Research on Jane Austen
 

Similar to Research Paper - Hacker Plague

TC160_PowerPoint_presentation_gbraga
TC160_PowerPoint_presentation_gbragaTC160_PowerPoint_presentation_gbraga
TC160_PowerPoint_presentation_gbragaGeorge Braga
 
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...PavanKumarSurala
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securityMuhammad Hamza
 
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docxalinainglis
 
module 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptxmodule 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptxGautam708801
 
How spam change the world
How spam change the world How spam change the world
How spam change the world Farhaan Bukhsh
 
Chapter 3 Computer Crimes
Chapter 3 Computer  CrimesChapter 3 Computer  Crimes
Chapter 3 Computer CrimesMar Soriano
 
a documentation of final year SRS for AI drons.ppt
a documentation of final year SRS for AI drons.ppta documentation of final year SRS for AI drons.ppt
a documentation of final year SRS for AI drons.pptNebiyuTeferaShite
 
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN                   .docxRunning head CYBERSECURITY IN FINANCIAL DOMAIN                   .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docxhealdkathaleen
 
document on cyber terrorism
document on cyber terrorismdocument on cyber terrorism
document on cyber terrorismKirti Temani
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar ReportArindam Sarkar
 

Similar to Research Paper - Hacker Plague (20)

TC160_PowerPoint_presentation_gbraga
TC160_PowerPoint_presentation_gbragaTC160_PowerPoint_presentation_gbraga
TC160_PowerPoint_presentation_gbraga
 
Malwares
MalwaresMalwares
Malwares
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
 
Malware
MalwareMalware
Malware
 
module 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptxmodule 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptx
 
How spam change the world
How spam change the world How spam change the world
How spam change the world
 
THESIS-2(2)
THESIS-2(2)THESIS-2(2)
THESIS-2(2)
 
Evolution of Hacking- Ronit Chakraborty .pptx
Evolution of Hacking- Ronit Chakraborty .pptxEvolution of Hacking- Ronit Chakraborty .pptx
Evolution of Hacking- Ronit Chakraborty .pptx
 
Chapter 3 Computer Crimes
Chapter 3 Computer  CrimesChapter 3 Computer  Crimes
Chapter 3 Computer Crimes
 
a documentation of final year SRS for AI drons.ppt
a documentation of final year SRS for AI drons.ppta documentation of final year SRS for AI drons.ppt
a documentation of final year SRS for AI drons.ppt
 
Cyber Terrorism Essay
Cyber Terrorism EssayCyber Terrorism Essay
Cyber Terrorism Essay
 
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN                   .docxRunning head CYBERSECURITY IN FINANCIAL DOMAIN                   .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docx
 
document on cyber terrorism
document on cyber terrorismdocument on cyber terrorism
document on cyber terrorism
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Terrorist Cyber Attacks
Terrorist Cyber AttacksTerrorist Cyber Attacks
Terrorist Cyber Attacks
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
 

Recently uploaded

Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
TEACHER REFLECTION FORM (NEW SET........).docx
TEACHER REFLECTION FORM (NEW SET........).docxTEACHER REFLECTION FORM (NEW SET........).docx
TEACHER REFLECTION FORM (NEW SET........).docxruthvilladarez
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operationalssuser3e220a
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmStan Meyer
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Projectjordimapav
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
Presentation Activity 2. Unit 3 transv.pptx
Presentation Activity 2. Unit 3 transv.pptxPresentation Activity 2. Unit 3 transv.pptx
Presentation Activity 2. Unit 3 transv.pptxRosabel UA
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptshraddhaparab530
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 

Recently uploaded (20)

Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
TEACHER REFLECTION FORM (NEW SET........).docx
TEACHER REFLECTION FORM (NEW SET........).docxTEACHER REFLECTION FORM (NEW SET........).docx
TEACHER REFLECTION FORM (NEW SET........).docx
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operational
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and Film
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Project
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
Presentation Activity 2. Unit 3 transv.pptx
Presentation Activity 2. Unit 3 transv.pptxPresentation Activity 2. Unit 3 transv.pptx
Presentation Activity 2. Unit 3 transv.pptx
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
Paradigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTAParadigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTA
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.ppt
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 

Research Paper - Hacker Plague

  • 1. Perrin 1 Luke Perrin Mrs. Lester Advance Composition 11 October 2011 Hacking Plague More than 30 percent of computers are infected by hacker-made viruses (“China Issues”). Hackers are an international threat that breach computers to gain information, to harm others, to make a profit, or to cripple a system. Hackers steal anything that might give them what they specifically want. This threat has increased to the severity that hacking threatens corporations and governments. Unfortunately, the hacking epidemic is rapidly spreading, but in order to counter hacking, one must examine and pinpoint the problems, while analyzing the solutions and outlook. In order to counter hacking, one must have an understanding of what hacking is. As discussed by Dr. Mizrach, “Hackers are just like people, and hold their own beliefs and ethics.” Many people think of hackers under the stereotype of the overweight, hygienically challenged, antisocial being. However, hackers have evolved into the polar opposite appearance and blend in with normal people. Hackers have rules, regulations, and laws that they follow. Each set is similar to many organizations. Unlike past efforts, hackers do not have to be at their target to hack it; rather, they can be anywhere in the world, as long as they have their computers (“Cyber Tension”). Hackers are not stationary anymore, but work from laptops and other mobile computers. Modern technology has allowed many hackers the ability to work from a laptop in nearly any location. The world communication has created the downfall of secure, computerized information through the use of the Internet, networks, satellites, and other modern innovations.
  • 2. Perrin 2 Hackers do not need a direct hook to the source of information to steal it. They can break into the systems through nearly any means (phone lines, Internet, etc). The technological advances of the modern era have created the developing downfall of mass communication. Similarly Dr. Mizrach stated, “Don't leave a trail or trace of [hacker’s] presence; don't call attention to [hacker] or [hacking] exploits.” For instance, Hackers use tricks, viruses, and other techniques to break through security systems. These tricks often disguise themselves as “working” programs, but slowly steal information from the victim. Hackers cover their “tracks” through the use of viruses which often cause havoc on the victim’s computer. Often the viruses create more back doors for the hacker to return through later. Although the overall definition of hacking is diverse, the specific problems with hacking are a more dominant matter. The hacking epidemic can be linked through several key problems caused by hackers. Unfortunately, hackers, independent or military, are capable of attacking strong government servers if given time to test the system (Yam). Hackers can and have crippled entire government -run installations. A prime example is the series of attacks on the Pentagon and Lockheed Martin which resulted in stolen military data (“Report: Stolen”). Hackers are not reckless, and they probe entire systems for weaknesses. These probes take weeks, or even years, to successfully accomplish. Many of these weaknesses are not realized by the installations and can cause severe damage to the facility. Another issue is that hackers create viruses, as stated by Dr. Mizrach: “These are people who write code which attempts to a) reproduce itself on other systems without authorization and b) often has a side effect, whether that be to display a message, play a prank, or trash a hard drive.” These viruses create havoc, which allows the hackers to easily breach security. Some examples are Trojan (which leaves back doors open), Botnet (which allows for hacker control), and false programs or advertisements (Mizrach).
  • 3. Perrin 3 Viruses also weaken the computers, and, if handled poorly, cripple entire networks. Hackers craft viruses to make their breaches easier, while allowing for a clean escape. Another problem comes from organized groups of hackers, like Anonymous or LolzSec (Saporito). Hackers, as individuals, are a dangerous threat to any computer; however, an organized group of hackers is a potentially fatal threat to entire networks. These groups are usually professional hackers and know exactly where to find weaknesses in firewalls or security in computers. These attacks have crippled military, government, civilian infrastructure, and even home entertainment. These hackers are capable of breaching all levels of security, and only a few experts can accurately counter these attacks. Hackers are a threat to all levels of technological use, unfortunately there is no permanent solution. Although there are not any permanent solutions, there are several methods of preventions to hacking. Unknown to most, the tools created by hackers to break into systems can also be used in a reverse method. The tools can be used to find security holes, back doors, and other areas of weakness (Lemos). The very tools used by hackers can provide an antidote to hacking. These tools allow companies or governments to improve their own defenses. However, this temporary solution requires companies to work hand in hand with those that would cause harm to their systems. Yet, not all hackers conduct illegal activities. Many work as Information Technology specialists, or white caps, and help prevent hackers from breaking into the systems. Currently, the focus is not just on traditional warfare, but on a larger cyber war. Hackers across the world are involved in the attacks on different countries. Primarily, the United States and China appear to be the forefront of the war (Yam). The United States and China can and do hack each other. Their attacks steal everything from blueprints to meaningless emails. On the contrary, the real issue here is the lack of funding governments put into IT, and the results of this
  • 4. Perrin 4 deficit being a lack of ability to counter hacks. Governments are steadily increasing in their activities revolving around the cyber war. Many governments have hired hackers as soldiers to counter and attack other governments. Through this method, hackers are controlled by the government and are focused on national enemies instead of civilians. Although a hacker has been removed from a system, the operating system can still be infected. Computers need to be reformatted, and the operating system reinstalled to prevent the hacker from reentering the system (“Crucial Paradigm”). The computer can never return to a safe status once it has been hacked. By reinstalling the system, the computer is given a clean slate against hackers. Hackers can return to the computer like a common cold if actions are not made to prevent the attacks again. Users have to re-secure the computer after an attack, and then reformat the computer to make it stronger against hackers. Hackers are an incurable disease, and the future of hacking is morbidly ill. The outlook of preventing the hacking epidemic is not encouraging and without any traces of a simple end. For example, the Conficker virus is a rapidly spreading virus that has already infected nearly 30 percent of the computers internationally (“China Issues”). This virus spreads across the Internet, and it is capable of hiding itself in multiple places across a computer. It is just one example of how many computers can be affected by one hacker-made virus. The Conficker virus is not a simple Trojan, but a combination of the strongest malware in the Internet. It uses this combination to move quickly into thousands of computers every day and across 200 countries total. As reported by Robert Lemos, “...but [hacker’s tools] can also be used to secure them.” Hackers will always be around, so long as technology advances. Although hackers can not be defeated, their tools can be reverse engineered to provide methods to counter hackers. Yet, hackers are able to counter every attempt made to stop them through their own
  • 5. Perrin 5 programming abilities. This programming war is impossible to win, since there is no end to the increasing number of hackers. As stated earlier, hackers across the world are involved in the attacks on different countries. Hackers are a fast rising threat to governments, yet few take the initiative to combat it. Governments can barely counter attacks, and they have decreasing budgets to improve these defenses. The rise in cyber warfare is shifting the way spying,1 or espionage, is conducted. Now hackers are capable of stealing from facilities in all branches of the government, and they face little repercussions for it. The government’s focus is on physical warfare when the real threat comes from a cyber-based enemy. The outlook for hacking is a tragedy in the making, and without any signs of a permanent end. In spite of hacking, future generations need to go into computer programming because the world demands people with the ability to program. Although hackers will never go away, this issue should not deter any individual from this field. Computers are used in nearly every field of work, and in order to get an edge on other workers, people need to have the ability to work fluently with a computer. The future of many jobs will be in computer technology, and the job fields will only increase from this change. Society changes with the flow of technology, which is constantly evolving into more sophisticated ideas. Programmers will be at the forefront of these changes and will provide the backbone of future ideas. Yet, Programmers will also be the wall standing between hackers and the rest of the world. Programmers are the antibody to the hacking disease, and the only applicable means of stopping hackers. Technology will always advance so long as there are new ideas or inventions. Programmers provide the blood of these innovations, and the ability to code will be essential. Programming is just like many fields, and shares the same risk as any other job; however, the rewards from programming are sufficiently better.
  • 6. Perrin 6 Works Cited “China Issues Legal Interpretation to Tighten Grip on Hacking.” Xinhua. N.p., 29 Aug. 2011. Web. 10 Sept. 2011. <http://news.xinhuanet.com/​english2010/​china/​2011-08/​29/​ c_131082389.htm>. “Hacking Attacks - Prevention.” Crucial Paradigm. N.p., n.d. Web. 28 Sept. 2011. <http:// www.crucialp.com/​resources/​tutorials/​website-web-page-site-optimization/​hacking- attacks-prevention.php>. Lemos, Robert. “Shades of gray at security conference.” CNET News. N.p., 2 May 2002. Web. 11 Sept. 2011. <http://news.cnet.com/​2100-1001-897596.html?tag=txt>. Mick, Jason. “Cyber Tension Flare Amoungst U.S., Chinese Military.” Daily Tech. N.p., 12 Mar. 2008. Web. 8 Sept. 2011. <http://www.dailytech.com/​ Cyber+Tensions+Flare+Amongst+US+Chinese+Military/​article11045.htm>. Mick, Jason.“Reports: Hackers Use Stolen RSA Information to Hack Lockheed Martin.” Daily Tech. N.p., 30 May 2011. Web. 6 Sept. 2011. <http://www.dailytech.com/​ Reports+Hackers+Use+Stolen+RSA+Information+to+Hack+Lockheed+Martin/​ article21757.htm>. Mizrach, Steven. “Is there a Hacker Ethic for 90s Hackers?” Old and New Hacker Ethics. N.p., n.d. Web. 11 Sept. 2011. <http://www2.fiu.edu/​~mizrachs/​hackethic.html>. Saporito, Bill. “Hack Attack.” Time 4 July 2011: n. pag. Academic Search Complete. Web. 9 Sept. 2011. <http://proxygsu-sche.galileo.usg.edu/​login?url=http://search.ebscohost.com/​ login.aspx?direct=true&db=a9h&AN=61963642&site=ehost-live>. Yam, Marcus. “Chinese Military Suspected of Hack on Pentagon.” Daily Tech.
  • 7. Perrin 7 N.p., 4 Sept. 2007. Web. 9 Sept. 2011. <http://www.dailytech.com/​ Chinese+Military+Suspected+of+Hack+on+Pentagon/​article8717.htm>.