Customer center

We are a boutique essay service, not a mass production custom writing factory. Let us create a perfect paper for you today!

Example research essay topic: Mcgraw Hill London Routledge - 2,057 words

NOTE: Free essay sample provided on this page should be used for references or sample purposes only. The sample essay is available to anyone, so any direct quoting without mentioning the source will be considered plagiarism by schools, colleges and universities that use plagiarism detection software. To get a completely brand-new, plagiarism-free essay, please use our essay writing service.
One click instant price quote

... like the benefit of information for their own use. ICT development was so fast and provided different facilities and services in a short span of time, but at the same time ICT helped in building hacking environments because the speed of ICT development and improvement was not matched with the speed of information security technologies development, so it allowed hackers to feel free in doing what they want Taylor (1999). It was ICT failure to provide high quality security technology that encouraged people who turned to be hackers to access information in unauthorized way without the fear of being caught. Furnell (2002: 190) stated that hackers have established their own communities on the internet.

Thats because internet provides cheap access to everyone enabling the occurrence of illegal activities. According to Chakrabarti and Manimaran (2002) ICT should have provided security features to protect their findings and inventions then think about how to develop them. This means that ICT major problem that it was so fascinated by the fast development and ignored or totally forgot to protect and save the earlier inventions, this helped hackers to break into systems gaining benefit from security gaps and weaknesses. Thomas and Loader (2000) believe that the development of ICT played a big role in building a hacking community, not only because ICT development is faster than security development, but also because ICT provided new chances and opportunities of hacking by including different and huge information data bases that are appealing to any person, this encouraged hackers to begin their illegal actions helped by the lack of capable security infrastructure. Effects on Society Hacking effects can be categorized into three types; effects on individuals, organizations, economy and effects on countries.

The most important issue to recognize is that victims are the only ones who feel the threat and effects of hacking attacks, and our duty is to inform other people about the danger of hacking to be cautious and alert which helps in preventing hacking attacks from happening Furnell (2002). The effects are as following: 1. Effects on individuals: according to Banks (1997) there are cases where individual information is sold and used for bad purposes like using their accounts. While Seo (2001) focuses on the psychology of individuals after being hacked and that they will always have the fear of being monitored when accessing internet and information, added to that the privacy of users can be easily penetrated. According to Thomas and Loader (2000) credit card details and passwords can be stolen causing financial damage to individuals added to that computer systems can be hacked causing the machine to stop working as usual or stealing your data. These effects will cause frustration and fear to individuals when using ICT. 2.

Effects on organizations and economy: hacking is said to have cost the global economy an estimated $ 1. 2 Billion Niccolai (2000). Hacking caused and still causing till the moment bankruptcy to plenty of companies, thats because companies are being hacked plenty of times which leads to the loss of customer confidence or belief in the security capabilities of the company Furnell (2002). Banks (1997) believes that companies are a main target for hackers who break into their systems to steal trade information or customers payment details. Pipkin (1997) focuses on denial of service and the effects on companies.

The company server will be broken due to huge traffic causing customer frustration and hurt the company reputation. Same for software theft that causes bankruptcy to companies which spend millions to develop and create software that sadly later on is stolen and copied for cheap prices. The main problem is that some companies hire or use hackers to break into other competitor systems to steal precious information Randall et al. (2000). Thomas and Loader (2000) discuss the effect of hacking on E-commerce.

Web sites for online selling are being hacked for the sake of getting customer and company information which then used for nefarious purposes. 3. Effects on countries: since we are living in information society where all our daily activities are controlled by technology, there will be a great damage if a vital system was broken by hacking attacks. Breaking main system might result in collapse of countries Banks (1997). Ninemsn (2004) shows that north Korea is training 600 hackers to begin cyber attacks against United States, Japan and south Korea to gather military intelligence.

This kind of attacks to computer systems aim to steal vital information of countries decisions regarding foreign policies and strategies, this results in causing countries to reconsider their policies that were taken after long analysis, it might also cause disturbance due to the attack of precious and top secret information. CNET (2001) states that FBI agents downloaded data from two Russian-based computers. The hacking was done to help their investigation and track information on internet crimes and breaking bank networks. This approach caused a lot of controversy and opened the door for other countries to hack different systems and retrieve any source of data using the excuse of tracking criminals which might lead to destroying the principle of information owning and security and then turn the world into a mess and open the door to a new cold war. Society response (solutions) The war against hacking is a continuous battle that has a starting point with no end at all. The world is using a variety of methods either to halt attacks or minimize their effects on different perspectives.

McClure et al. (2003) found that the best way to minimize the effect of attacks or even avoid them is by building a well educated computer user who can gain benefit from different security techniques in the war against hacking. While Randall et al. (2000) believe that the first step to allocate hacking activities should be by applying information security policies, and thats what Pipkin (1997) stated and confirmed that nowadays policies are running in a large number of organizations, these policies imply that all employees should sign a workplace behavior sheet specially the ones dealing with sensitive data and information that must be kept secret. According to those policies any employee who is caught guilty and participating in information theft or hacking will be questioned and further sanctions are applied. Furnell (2002) has a negative opinion and blames policies and restrictions for the limitation of what we can do online. Randall et al. (2000) suggest that companies are making a big mistake by waiting for the attack to happen then when its too late they reconsider their security techniques. Furnell (2002) suggests that companies are making a big mistake by hiding the attacks on their system and should inform authorities about any incident to help in tracking hackers and intruders.

Regarding security software, different opinions agree that there is no total security and the more sophisticated security tools are invented the more technical hacking attacks are applied, thats because as what Banks (1997) stated that hacking is a big field with no limitations, and hackers are inventing new techniques in a rate faster than security utilities. Server pipeline (2004) states that even with the availability of security tools, its hard to fill all holes. Furnell (2002) also blames computer users for the inefficiency of security tools, he stated that having a security software is not a solution by itself, users should realize that they need those tools and should learn how and when to use them. Furnell (2002) suggests that hacking will never fade away but it can be managed if precautions are taken, and Randall et al. (2000: 499) said that there will never be total security. And till this moment we are suffering from hacking attacks almost on daily basis and the only thing we can do is to minimize their effects and rarely prevent them from happening.

Conclusion Hackers are responsible of the huge development in computer and internet technology, but these days we consider them as thieves and intruders who penetrated our own privacy and used the achievements they were behind for their own benefit. Hackers have different opinions and motivations. However, they all share the spirit of challenge and always trying to prove their capabilities of doing what all believe is impossible maybe because they were mistreated, or doubts surrounded their abilities and past achievements. Hackers believe that information should be shared and they fight against information owning. Effects that hacking caused and still causing to the society cant be ignored.

Hacking nowadays is taking new phases and the danger is increasing because we are now living in a society that runs by ICT, and any attack to the ICT especially in advanced countries will cause vital consequences. ICT still lacks a powerful security tools that are capable of tracking, catching hackers, and protecting computer systems from their attacks. My own view is that the best way to protect ICT from hackers is to study their psychology and try to understand their way of thinking, because hackers are human beings, who have two sides; evil and good, and they used to show their good side but suddenly they turned to be evil. The reasons which caused the transformation from good to evil individuals should be studied and given the highest priority in the war against hackers because since we put our hands on the cause, we can fix it to reach for better effects.

Bibliography 1. Banks, Michael A. (1997), Web psychos, stalkers, and pranksters: How to protect yourself online, Arizona (USA), The Coriolis group. 2. Chakrabati, Anirban and Manimaran, G. (2002), Internet infrastructure security: A Taxonomy, IEEE Network, November/December 2002, P. 13. 3. CNET (2001), FBI hack raises global security concerns [online]. Available from: web 3 - 256811. html [Accessed 14 th December 2004 ]. 4.

Crucial paradigm (2003), Hacking attacks-How and Why [online], Crucial paradigm. Available from: web [Accessed 7 th December 2004 ]. 5. Darlington, Roger. (2001) Crime on the net [online], United Kingdom, Darlington, Roger. Available from: web [Accessed 4 th December 2004 ]. 6. Digital Guards data base (2001), Glossary [online].

Available from: web [Accessed 10 th December 2004 ]. 7. Furnell, Steven. (2002), Cybercrime: Vandalizing the information society, Boston; London: Addison-Wesley. 8. Himanen, Pekka. (2001), The hacker ethic and the spirit of information age, Great Britain, Server & Warburg. 9. Levy, S. (1984), Hacker: Heroes of the computer revolution, New York: Bantam Doubleday dell. Cited in: Taylor, Paul A. (1999), Hackers: Crime in the digital sublime, London, Routledge. 10. Martha, M.

E. (1993), online with the super hacker. Available from: web Cited in: Taylor, Paul A. (1999), Hackers: Crime in the digital sublime, London, Routledge. 11. McClure, Stuart. Et al. (2003), Hacking exposed: Network security secrets & solutions, Fourth edition, Berkley, California (USA), McGraw-Hill/Osborne. 12. Niccolai, James. (2000), Analyst puts hacker damage at $ 1. 2 billion. Available from: web [Accessed 7 th December 2004 ]. 13.

Ninemsn (2004), North Korea has 600 computer hackers [online], [national Nine news]. [SCI Tech news]. Available from: web [Accessed 10 th December 2004 ]. 14. Oxford English Dictionary. (1995), Concise, 9 th edition. Oxford.

oup. 15. Pipkin, Donald L. (1997), Halting the hacker: A practical guide to computer security, United States of America, Prentice Hall. 16. Randall, Nichols K. et al. (2000), Defending your digital assets: Against hackers, crackers, spies and thieves, United States of America, McGraw-Hill. 17. Seebach, Peter. (1999), Care and feeding of your hacker [online], Seebach, Peter. Available from: web [Accessed 6 th December 2004 ]. 18.

Selwyn, Neil and Grand, Stephen. (2001), 101 key ideas in information technology, United Kingdom: United States of America: Hodder and Stoughton-McGraw-Hill. 19. Seo, Jung. U. (2001), Toward the global information society opportunities and challenges [online], [minister of science and technology, Republic of Korea]. Available from: web [Accessed 10 th December 2004 ]. 20. Server pipeline (2004), Simulated hacker attacks [online], Server pipeline, Available from: web archive/ 46200228 [Accessed 15 th December 2004 ]. 21. Sterling, Bruce. (2004), The hacker crackdown: (Law and disorder on the electronic frontier), McLean, Virginia (USA), Indypublish.

com. 22. Taylor, Paul A. (1999), Hackers: Crime in the digital sublime, London, Routledge. 23. Thomas, Douglas and Loader, Brian D (eds. ) (2000), Cybercrime: Law enforcement, security and surveillance in the information age, London: Routledge. 24. Williams, Sam. (2002), Free as in freedom: Richard Stallmans crusade for software, Farnham, Sebastopol, California: OReilly.

Word Count 3, 625


Free research essays on topics related to: computer systems, mcgraw hill, big mistake, london routledge, north korea

Research essay sample on Mcgraw Hill London Routledge

Writing service prices per page

  • $18.85 - in 14 days
  • $19.95 - in 3 days
  • $23.95 - within 48 hours
  • $26.95 - within 24 hours
  • $29.95 - within 12 hours
  • $34.95 - within 6 hours
  • $39.95 - within 3 hours
  • Calculate total price

Our guarantee

  • 100% money back guarantee
  • plagiarism-free authentic works
  • completely confidential service
  • timely revisions until completely satisfied
  • 24/7 customer support
  • payments protected by PayPal

Secure payment

With EssayChief you get

  • Strict plagiarism detection regulations
  • 300+ words per page
  • Times New Roman font 12 pts, double-spaced
  • FREE abstract, outline, bibliography
  • Money back guarantee for missed deadline
  • Round-the-clock customer support
  • Complete anonymity of all our clients
  • Custom essays
  • Writing service

EssayChief can handle your

  • essays, term papers
  • book and movie reports
  • Power Point presentations
  • annotated bibliographies
  • theses, dissertations
  • exam preparations
  • editing and proofreading of your texts
  • academic ghostwriting of any kind

Free essay samples

Browse essays by topic:

Stay with EssayChief! We offer 10% discount to all our return customers. Once you place your order you will receive an email with the password. You can use this password for unlimited period and you can share it with your friends!

Academic ghostwriting

About us

© 2002-2024 EssayChief.com