Type of paper: Essay

Topic: Cyber Crimes, Computers, Information, People, Government, Politics, Identity, Confidentiality

Pages: 1

Words: 275

Published: 2021/03/03

In this modern time, a lot of people have been dependent on computers. People take advantages on using technology. However, some people use this in different way like hacking. Computer hacking has been developed and is very alarming. The effects of hacking are now rampant not only in businesses also even in the government. Hacking could also affect the privacy and confidentiality such as data, information, passwords, programs and files of the person. Hence, the use of computer hacking should be avoided, reduced or ended.
People use computer hacking in several objectives and intentions of whether for the good or bad acts. Some people or the so-called hackers use computer hacking just for fun and only want to see if the software, programs and operations inside the computer is accessible. Some use hacking to seek new ideas and new ways for the advancement of the knowledge. Others try to investigate and to root chaos by way of business disturbances (MegaEssays). There are also people who want to steal money, important information, data, passwords or passcodes of the person, the companies and even the government.
Its implications of hacking are expensive that some could steal thousands or millions of dollars in worth of the information of the government and companies. Hacking can cause damage to the systems of the computers through disabling the software and removing or else modifying the data files. This will be a serious concern in relation to the privacy and identity theft (Chang). If the privacy and identity like password, card numbers or is stolen or copied, people can be easily access the information of the person and took the identity and money by hacking. Another serious concern is the use of hacking by the terrorists (MegaEssays). In this case, terrorist could steal information and reports as well as monitor the confidential operations from the government’s defense, thus, making it more of life threatening. Regulations with regard to computer hacking should be implemented in order to stop and even to eliminate this prevalent and alarming act.

Works Cited

Chang, Jason. “Computer Hacking: Making the Case for a National Reporting Requirement (Working Paper).” Harvard. Web. 17 April 2015. <http://cyber.law.harvard.edu/wg_home/uploads/356/ComputerHacking.pdf>
MegaEssays. “Computer hacking.” Web. 17 April 2015. <http://www.megaessays.com/viewpaper/43438.html>

Cite this page
Choose cite format:
  • APA
  • MLA
  • Harvard
  • Vancouver
  • Chicago
  • ASA
  • IEEE
  • AMA
WePapers. (2021, March, 03) Computer Hacking Essays Examples. Retrieved May 19, 2022, from https://www.wepapers.com/samples/computer-hacking-essays-examples/
"Computer Hacking Essays Examples." WePapers, 03 Mar. 2021, https://www.wepapers.com/samples/computer-hacking-essays-examples/. Accessed 19 May 2022.
WePapers. 2021. Computer Hacking Essays Examples., viewed May 19 2022, <https://www.wepapers.com/samples/computer-hacking-essays-examples/>
WePapers. Computer Hacking Essays Examples. [Internet]. March 2021. [Accessed May 19, 2022]. Available from: https://www.wepapers.com/samples/computer-hacking-essays-examples/
"Computer Hacking Essays Examples." WePapers, Mar 03, 2021. Accessed May 19, 2022. https://www.wepapers.com/samples/computer-hacking-essays-examples/
WePapers. 2021. "Computer Hacking Essays Examples." Free Essay Examples - WePapers.com. Retrieved May 19, 2022. (https://www.wepapers.com/samples/computer-hacking-essays-examples/).
"Computer Hacking Essays Examples," Free Essay Examples - WePapers.com, 03-Mar-2021. [Online]. Available: https://www.wepapers.com/samples/computer-hacking-essays-examples/. [Accessed: 19-May-2022].
Computer Hacking Essays Examples. Free Essay Examples - WePapers.com. https://www.wepapers.com/samples/computer-hacking-essays-examples/. Published Mar 03, 2021. Accessed May 19, 2022.
Copy

Share with friends using:

Please remember that this paper is open-access and other students can use it too.

If you need an original paper created exclusively for you, hire one of our brilliant writers!

GET UNIQUE PAPER
Related Premium Essays
Contact us
Chat now