Create a new account

It's simple, and free.

HONEYPOTS and Hackers

ensure that a computer is completely invulnerable is to avoid any communication with the outside world. In today's computing environment, that is simply not feasible for organizations or even most individuals.

Many people associate the term "hacker" with negative activities. The media pays considerable attention to hackers who break into systems and plant worms, Trojan horses or other destructive software, for example. Even more devastating are the reports of hackers who break into systems with the intent of learning passwords or confidential information that they can then use for their own profit, or for the profit of the people who hire them. Industrial espionage, political espionage and personal financial gain have all gained media attention.

However, most hackers do not fall into this category. They see themselves as an "underground" community whose members have the right--indeed the obligation--to break into computer systems. Some hackers consider hacking to be a political activity that foils the plans of the governing elite to control individuals political and economically. Still other hackers are simply excited by the challenge of breaking into systems that are declared invulnerable--or at least difficult to penetrate. Many hackers log onto systems and use the increased resources of the target system to set up IRC chats and brag about their accomplishments. While this uses some computing resources, it is not as nefarious as many members of the public generally consider hackers. Still, corporations and individuals who have been hacked liken the realization t

...

< Prev Page 2 of 7 Next >

More on HONEYPOTS and Hackers...

Loading...
APA     MLA     Chicago
HONEYPOTS and Hackers. (1969, December 31). In LotsofEssays.com. Retrieved 23:27, May 01, 2024, from https://www.lotsofessays.com/viewpaper/1688039.html