Computer hacking is the practice of changing and modifying the computer software plus hardware in such a way that was beyond the objectives of the original creator. Most of the hackers have an expert level understanding of computer technology and programming. The hacking culture has its roots in 60’s and 70’s, and at that time hacking some computer meant to perform a wonderful job as it shows deep understanding of using technology. Computer hacking becomes prevalent after 1980’s when the computer literacy increased. Some of the hacking activities are legal but majority of the hacking activities are unethical and unlawful. According to some experts, hacking is a diverse phenomenon. But at this time of age hacking is totally separate and different from fraud. A fraud involves trying to take advantage of other individuals with a speculative scope but no doubt it is unethical (Margaret, 1990).
There are organizations are promoting computer hacking as they offer training to the new hackers who want to learn and hack in a very safe and legal environment. People belonging to this community promote the computer hacking and information technology skills. They are having a moto that they are teaching computer hacking so that computer hackers can detect security loopholes and notify the site’s webmaster so that the issue can be resolved (Dreamer, 2007).
Due to computer hackers it has become very risky to connect some computer to the internet and hoping that your computer is safe as there are no security systems available to protect your system. One of the essential debate of these decades is on internet legislation about the requirement of government organizations. This debate is on encryption policy where organizations and companies are concerned that they should be allowed to have protection of their valuable information by encrypting it; whereas the government has a view that in today’s fight against cybercrime they must the right of controlling, monitoring, and decrypting this encryption and internet traffic (Cyber Laws, n.d).
Dreamer, R. (2007). Computer hacking: Not just fo criminals anymore. Retrieved from https://www.hackthissite.org/articles/read/941
Cyber Laws. (n.d). Retrieved from https://cyber.laws.com/hacking
Margaret, B. (1990).Computer hacking: Proposals for protection. Facilities, 8(1). 12-14.