Black Hat Hackers example essay topic
All information used was found on the Internet. The sources used was very useful for writing this paper. Hackers 3 Hacking in Society Bischoff noted that most hackers are malicious and would like to breach and explore computer systems all over the world. (2001). Studies verified hackers cause billions of dollars of damage and disrupt society and businesses everywhere and should be stopped. First, there is a need to analyze the aspects of the destructive and ethical hackers.
Another aspect that is needed to be observed is, the psyche of the juvenile and disruptive hackers that cause the most damage due to lack of knowledge and skill. In the end, the precautions and the capital that has been invested in Internet and network protection against the destructive hackers by companies. Howarth explained that most ethical hackers are called white hat hackers (1998). Quittner noted hackers most known for major destruction in companies and governments are known as black hat hackers (2002). There is one more type of hackers and they are script kiddies, which are "hackers" that depend on scripts, a chat based program, which black hats attach exploits and attacks on and post on the Internet. (2) Quin The type the media is most likely to report on script kiddies, they are the ones who usually get caught by bragging on chats.
The average age of these script kiddies is around twelve to thirty. Most of the script kiddies that are past age eighteen only have a twelve grade education, and the most common of the script kiddies are white and male. Most of these hackers leave damage or calling cards on purpose, for recognition in their underground community, but even if they are not to leave damage, they are most likely to. They do not have the skills to find holes in programming on protection and patch them back up so no damage is done, which will cost company's millions of dollars just to repair their information networks.
Go rka Sadowski, director of emerging technologies for security systems developer NetScreen Technologies, referred to these packet kiddies " Some of these kids want to make a name for themselves, and other are in the prime of adolescence and are just saying 'Screw the System'. White hat hackers are the ethical, legal hackers (2002). Companies pay them to find holes in software or networks and fix the problems. The difference between white hat hackers and black hat hackers is that white hats have permission to carry out their attacks on a company to fix the problems.
(2) A majority of company owners say that white hat protection is the only true way to ensue security in their businesses. White hats use the same programs and knowledge as black hats do. They usually stay in the cyber underworld to keep updated on attacks and information. (4) Black hat hackers are the most rare and elite of all the hacker groups. Most are connected with criminal activities, such as espionage.
(2001) Not all hackers labeled black hat hackers are connected with criminal activities in real life. There are many "old school" hackers considered black hat. They are the ones that are usually from the 1960's and use the word hacker with honor and freedom. (Quinter 2) Most of these hackers do not have a negative intent they are usually programs from Stanford or MIT. They have good ethics and believe in open source and fixing flaws in programming. Most black hat hackers are criminals and are very powerful.
(Glenn 8) Political and personal revenge is a major motivating factor in becoming a true black hat hacker, but the most elite hackers go for the money. Industrial espionage is one of the best paid jobs for a hacker. A typical espionage attacks takes about three weeks and they usually pull in a million dollars a job. Black hats are good at what they do and usually don't get caught. Around 90% of companies reported at least one attack in the last year. Three-fourths of them reported some kind of financial loss because of the attacks, and 19% reported ten or more attacks.
The stereotype for hackers is usually some kind of social misfit, which some are. (teenage hackers 1) The majority are not, hackers and script kiddies are usually so diverse in lifestyles that there is not definition. They can be rich to poor, straight A to straight D students, shy to out going, and lazy to sporty kids. This breaks all the stereotypes. The FBI arrested the first teen hacker in 1983, and for the past twenty years, it's become a predominantly teenage activity.
(Teenage hackers 1) The media and public regard hackers as masked villains that break into systems in the middle of the night, though most hackers are normal kids in every school, neighborhood, and churches. There are no villains, just curios teens that are inclined to computers. Most teenagers start with one trait; curiosity. Then they have to make a choice between giving it up or becoming a full time criminal. Almost all hackers have a sense of "ethical flexibility". (Quinter 1) Ethical flexibility in their case is thinking what they are doing is a game, or for fun, since human contact is a bare minimum over a computer.
Many more have a "Robin Hood syndrome", which they believe what they are doing is alright and for the better of society. With the booming Internet revolution of business, a lot of companies let security slip with a minimum with rushing to make money. (Mc Muddy 1) They have left many holes and easily exploitable programming. Jim Can nady explains to the Henry Telecommunications and Technology partnership that there is not and will never be a completely secure system.
(Kevin 1) He explained that vital information will not be safe with minimal security, it needs to be layered since no one product can protect information for long by itself. (2) Banks even with just internet for e-mail are subjected for attacks, not just online banking. (Hacker Attacks Occur Daily 1) Almost every back in America gets probed by unauthorized people several times a day. (2) Electronic theft of sensitive banking information is just one worry that banks have of attackers. One is Denial-of-Service attacks, which will shut down online banking for a certain amount of time. Another is identity theft of customers.
Potential damage of reputation of the bank and the cost of recovery are the most worrisome to banks. In 2000 yahoo. com, amazon. com, and many other large online companies had the first major denial-of-service attacks, rendering their sites of business useless. (Teenage hackers 1) These attacks cost those companies large sums of money. Some time later, The Global online news channel, CNN, almost stopped broadcasting because of a severe attack onto the server.
(5) The majorities, 60%, of all attackers are disgruntled employees, current and former, states the Computer Crime and Security Survey. (Glenn 12) Also, 94% of respondents detected a computer virus in 2001, up from 85% in 2000. (13) This means more hackers and script kiddies are learning how to attack. Hackers are very diverse and have their own society that most public and media do not know of. Hackers cause billions of dollars of damage each year on Internet dependent and connected companies. The battle between the ethical, white hat hackers and the destructive black hat hackers is a long war, with no end in site.
The average American can become a hacker or a script kiddy; there are no requirements for becoming one, except a simple concept of computers. The cost of repair to network systems and reputations is countless. The capital poured into protection is worth it, until the software and systems are outdated. Sources Cited Bischoff, Glenn "Fear of a Black Hat" Telephony September 3 2001 "Hacker Attacks Occur Daily at Community Banks" Community banker vs. 11 no. 6 June 2002 Brad Howarth "The Hackers from Heaven" The Australian 07-07-1998 Duffy, Kevin "Computer users more aware of cyber terrorism" The Atlanta Journal and Constitution 07-04-2002 Deirdre Mcmurdo "Column: Fighting the Hackers" Maclean's 02-28-2000 "Teenage Hackers grow to big of Issue" The Gold Coast Bulletin (Queensland, Australia) 07-16-2002 Jeremy Quittner "Hacker Psych 101" 10-6-02.