A computer hacker hacks away into the intricacies of complex computer systems to uncover sources of operating problems, design expeditious remedies, and implement effective solutions. These computer enthusiasts are usually adept at several programming languages and can use these skills to uncover computer code of secure systems, thereby giving them the ability to break into proprietary systems to steal valuable information. Unfortunately, hacker attacks are rarely reported, for fear of negative publicity.
On the other hand, computer security is the area of computer science that focuses on protecting the computer infrastructure and everything associated with it (including information). For this, there are a number of standards, protocols, methods, rules, tools and laws designed in order to minimize the risk. To combat the problems of computer security, multiple solutions have been devised. Individual PCs connected to the Internet, for instance, often have virus-scanning software installed. But these are only as effective as they are up-to-date, and many companies like Symantec, the company that produces the Norton AntiVirus software, allow customers to automatically update their virus protections weekly to ward off new, continuously proliferating viruses (Donn B, 2003).
Discussion and Analysis
The more popular use of the word “hacker” is derogatory—computer experts who use their skills for malicious purposes. People in the computing profession like to refer to them as “crackers.” These expert computer enthusiasts break into secure systems and cause systems to break down, steal valuable and sensitive data, or modify code so that systems malfunction. Viruses, worms, and logic bombs have become common tools by which computer hackers create considerable havoc. Viruses are being intended to “infect” a computer and can do anything from launch a denial of service attack to entailing thousands of recipients. The worm copies itself and exploits weaknesses in the computer system. Although they are not usually criminal in intent, viruses and worms can be costly. Computer hackers in society results from many types of harmful behaviors committed by individuals or groups against other people. Behaviors considered negligent or abusive, or that otherwise are being considered criminal in a place, often depends on the amount of harm inflicted, the technological means employed, and existing laws that forbid activities. Technological means used to commit cyber offenses refers to a combination of networked systems, hardware devices, software tools, and methods that people use on the Internet. Modern information technology (IT) hardware like computers, personal digital assistants (PDAs), cellular phones, and gaming devices can be used offline (in standalone mode), online, or wireless, from private or public places, in ways that are not easily recognized as illegal and that transcend more the one geopolitical or lawful jurisdiction. In addition, illicit use of computing devices can facilitate many forms of traditional in-person crimes (Hafner, 1999).
To fully understand computer hackers, it is necessary to consider (1) the ways in which computerized devices and telecommunications systems came to be increasingly used for illicit purposes, (2) the myriad forms of online ...