|
Computer Hacking Addendum Written by Ginger
Kastor, Millburn C.C. School, Wadsworth, Illinois |
|
| Introduction | |
| One fraudulent act that is illegal in some ways and helpful in others is hacking. Hacking is basically knowing programmable systems and how they work. How can hacking be helpful? Some agencies hire hackers to show them the downfalls in their security system so they can improve it against hackers that want information or access into the computer for other reasons. Hacking is a form of art for some people. Hackers have formed groups and even have conferences together to share their knowledge and abilities. Hackers started with gaining access to free telephone calls through different sources and learning more about the internal workings of the nation's phone system and radios in the mid 1950's. When computers were introduced, hackers found a new communication system to learn more about. This is generally of interest to teenagers and young adults. Self-taught hackers are generally more accepted in their "society" more openly than educated hackers. Some famous hackers have gone on to create computer systems, such as Dennis Ritchie and Ken Thompson creating UNIX operating system. Other kinds of hackers, known as crackers, have found their ways into federal prison for their work. | |
| Issues | |
| Educators can warn students about the complications of the works of hackers and crackers. By educating students about hackers, they can take proper steps in trying to secure themselves from having their information stolen or their computers broken into by unauthorized people to the best of their ability. The educators can also show students that they are ultimately in control of their actions on the computer. Their actions, if illegal, can get them into major trouble. Educators can talk to students about the consequences of their actions and talk openly about computer ethics. The students should be able to discuss right from wrong on the computer and Internet as well as other parts of their lives. | |
| Minimizing Potential | |
| One way to
minimize the consequences of having a hacker is by protecting the
computer system. This is comparable to locking you doors to your house
when you leave so you know that breaking and entering is illegal, but
that doesn't mean that you leave your doors unlocked. Protection
against hackers is basically the same thing. First the software has to
be safe and stable so you can rely on it being secure. The second part
is the government's job of certifying that the software used is really
tested and reliable for the commonwealth interest. Lastly, have
firewalls in place and make sure that encryption and other protection
are used to have information remain private. By educators and other
computer owners using these three steps, the hackers will have a more
difficult time getting information that is supposed to remain private.
By discussing computer ethics with students, educators are opening the eyes of their students and making them think about their actions on the computer. Here are some issues to help educators get started in discussing ethics with their students: The Ten Commandments of Computer Ethics
by the Computer Ethics Institute: |
|
| Legal Implications | |
| Some hackers
feel that they are no more than explorers out to see how far they can
get into other computer systems. Some of them use their skills to help
companies and agencies to find errors in their computer security
system. Others, usually known as crackers, are out to find
information, change something, or cause damage in other's computer
systems.
Hacking is covered under law Title 18: Crimes and Criminal Procedure: Part 1: Crimes: Chapter 47: Fraud and False Statements: Section 1030: Fraud and related activity in connection with computers. The federal punishment for hacking into computers ranges from a fine or imprisonment for no more than one year to a fine and imprisonment for no more than twenty years. This wide range of punishment depends upon the seriousness of the criminal activity and what damage the hacker has done. |
|
| Frequently Asked Questions (FAQ) | |
| What is
the difference between a hacker and a cracker?
According to The Jargon Lexicon,
hackers are defined as the following: Cracker is a person who breaks security
on a system. The cracker is looked down upon in the hacker group. The
crackers are usually more secretive and have small groups in which
they share their knowledge although they like to refer to themselves
as hackers. Crackers are potentially more harmful than the true hacker
who just wants to know the workings of a system. Hackers believe that they are just exploring how programmable systems work and that they are not doing anything wrong as long as no theft, vandalism, or breach of confidentiality is broken. The hackers also believe that sharing information is good to do and very powerful. They do not see any harm in sharing resources with each other to gain access into unforbidden places as long as no damage is done. |
|
| Annotated Web Site Directory | |
|
Active Matrix's Hideaway AstaLaVista H/C Search Engine Computer Hacking Regulationas and Links Concerning Hackers Who Break into
Computer Systems Ethical Issues Surrounding Technology
Use in Elementary Schools The Jargon File The New Hacker's Dictionary Technology and Pleasure: Considering
Hacking Constructive TLC Feature: Hackers: Computer Outlaws Who's Responsible for Improving
Security |
|
2 August 2002
Return
to Educator's Guide to Computer Crime and Technology Misuse
Developed 29 July 2002.