The Misconceptions of Cyber Security

Categories: Cyber Security

Hacking generally has a bad representation, but hacking has shown to be very useful and beneficial to society today. The concept of hacking has been an immensely debated topic among many great scholars because of how quickly technological advancements surge today. Governmental figures are constantly revising and adding new laws to keep up with the growing technology. Although I agree that the concept of hacking has a bad representation, it is important to note that hacking has a lot of greyer areas than people naturally assume.

This idea of a “Good Hacker” is what befuddles law makers and the government.

Ever since technology had its first innovation, there have been people who have taken advantage of the flaws in different codes. In 1971, the first hacker, named John Draper (Clemitt et al.), used a toy whistle to hack into free international phone calls. Hackers like John Draper have been reported across the world. According to the Meriam Webster dictionary, the definition of a hacker is “a person who illegally gains access to and sometimes tampers with information in a computer system” (“hacker.

Get quality help now
Bella Hamilton
Verified writer

Proficient in: Cyber Security

5 (234)

“ Very organized ,I enjoyed and Loved every bit of our professional interaction ”

+84 relevant experts are online
Hire writer

”). This definition is what everybody thinks of when the word “Hacker” is used. The dark and shady figure in a warehouse with only himself and a computer jammed in his face is the general description of a “Hacker” nowadays.

Additionally, hackers have shown to break the law in the past and are continuing to ignore cyberlaws to this day, which enables lawmakers to question the different ways to cease cybercrimes in its entirety.

Get to Know The Price Estimate For Your Paper
Topic
Number of pages
Email Invalid email

By clicking “Check Writers’ Offers”, you agree to our terms of service and privacy policy. We’ll occasionally send you promo and account related email

"You must agree to out terms of services and privacy policy"
Write my paper

You won’t be charged yet!

Lawmakers have found many reports about cybercrimes and how hard it is to catch cybercriminals. If fact, the most famous cybercriminal, Kevin Mitnick, has proven to lawmakers and society how hard it is to catch computerized thieves. It took officials over fifteen years to catch Mitnick and lock him up for five years, a portion of what thieves today would face. Today Mitnick teaches others how to hack through seminars, books, and training sessions (Hesseldahl et al.).

Furthermore, there are a lot of misconceptions of hacking, but learning how to hack can be used for good. There is an annual convention called DEFCON. The convention focuses on training and teaching many computer science majors how to hack. They do not teach how to hack maliciously, but how to hack like a “white hat (DEFCON).” White hats are hackers that help in the progression of technology by learning how hackers think and then building walls against all types of malicious code (“What is”). These skilled programmers have helped to save hundreds of thousands of dollars from being stolen. This hacking has contributed to so much of the technological advancement that we have today. This advancement that DEFCON has helped catalyze into effect will impact hundreds of thousands of people in the future. The issue created is the line the people place between what is good and what is bad. hackers who help others and protect the cyber universe are considered white hats, but people are not perfect and do most things out of their own self interests. Since people always have their best interests in mind, most communities are not able to fully trust white hats.

Also, the world’s most popular hacking organization, Anonymous, has hacked many other organizations such as ISIS and other terrorist groups since 2003. The organization has done so much to help the world and impact terrorist groups, but they also wage war with presidents. In 2016, when the presidential election was in full session, Anonymous posted that they were going to wage war on Trumps campaign, sabotaging it left and right. A member of Anonymous posted, “This is not a warning. This is a declaration of total war”(News Desk). Should a hacking organization that does heroic and evil deeds be stopped? Hackers are now able to wage war with presidents and other global leaders while still being pronounced anonymous. Hackers who break into different sites while not having permission is illegal.

The motive behind the hacker plays a significant part of the hacking process. Programmers who hack into a site are motivated by a lot of things, some of which could be uncovering information, stealing online currency, or protecting information from other hackers. Of all the different motivations that envelop in a hacker’s head, the public starts to notice how good and bad can mix into a massive grey area.

This concept of a grey area and how there is a lot of power in hacking has produced much debate about the cyberlaws. In the US, cyberlaws are mainly put together to enhance and reduce the effect of cybercrimes. In the law business research textbook, The Privacy, Data Protection and Cybersecurity Law Review, it states, “The state of California was the path breaker on data security and data breach notification by first requiring in 2003 that companies notify individuals whose personal information was compromised or improperly acquired” (Raul 269). Californias solution to data breaches and cybercrimes was to require business to report all cybercrimes. This gave companies a leg up against hackers and reduced the number of cybercrimes happening annually from.

Overall, hackers have been used to steal information, secure information, and start cyberwars. The power that rests in hackers’ hands is astonishing and might even be greater than some world leaders today. One solution that, the Global Economic Symposium, describes to counteract a multitude of cybercrimes is by sharing data. Limiting anonymity by including a tracker or a hardwired program that could track any computer begins to shut down computer hackers at its source (Hyppönen et al.). Limiting anonymity would decrease so many crimes because police officers would be able to find cyber criminals much easier. The organization, Anonymous, only runs to this day because of anonymity, so having a law to decrease or even eliminate anonymity should be passed. This law probably would not end up stopping cybercriminals totally, but it would help to make a drastic impact on the level of cybercrimes happening daily.

Moreover, white hackers who help to fix bugs and other things in corporations website code have so much power over the business hiring them because a hacker is allowed permission into the whole computer system. Allowing a person into every detail of a business allows for mischievous conduct to occur in the form of releasing private data, holding information hostage, and blackmailing companies. Businesses who share data and private information about cyber-attacks has given an edge to themselves. The leg up on hackers have severely decreased hacking quite a bit because sharing information takes away what hackers need in order to hack, private information.

Hackers mostly have a bad sense of reputation because of how much power they have. This power scares a lot of people in the technological industry and around regular human life. The laws in place have helped to skim a little bit of power off the computerized geniuses, but laws are not going to stop malicious code from leaking into everyday lives. There are other efforts that help tremendously through the hacking industry like DEFCON (DEFCON). Other organizations have developed many types of security software to help secure and reduce the amount of malware in systems. Securing, encrypting, and exposing information not only takes power away from hackers, but also unmasks the motivation behind every hacker.

Works Cited

  1. “DEFCON about me page” DEFCON, 2018. https://www.defcon.org/html/links/dc-about.html
  2. ‘hacker.’ Merriam-Webster.com. Merriam-Webster, 2011. Web. 8 Oct. 2018.https://www.merriam-webster.com/dictionary/hacker.
  3. Hesseldahl, Arik. “Why Kevin Mitnick, the World’s Most Notorious Hacker, Is Still Breaking Into Computers.” Recode, Recode, 26 Mar. 2015, www.recode.net/2015/3/26/11560712/why-kevin-mitnick-the-worlds-most-notorious-hacker-is-still-breaking.
  4. Hyppönen, Mikko, et al. “Proposal – Dealing with Cyber Crime – Challenges and Solutions.” Global Economic Symposium, Global Economic Symposium, 2010, www.global-economic-symposium.org/knowledgebase/the-global-polity/cybercrime-cybersecurity-and-the-future-of-the-internet/proposals/dealing-with-cyber-crime-2013-challenges-and-solutions.
  5. Marcia, Clemmitt. “Computer Hacking.” CQ Researcher by CQ Press, 16 Sept. 2011, library.cqpress.com/cqresearcher/document.php?id=cqresrre2011091600.
  6. News Desk. “Anonymous Launch ‘Total War’ on Donald Trump to Avenge ‘Hateful’ Campaign.” The Express Tribune, The Express Tribune, 15 Mar. 2016, tribune.com.pk/story/1066072/anonymous-launch-total-war-on-donald-trump-to-avenge-hateful-campaign/.
  7. Raul, Alan C. “The Privacy, Data Protection and Cybersecurity Law Review” Law Business Research Nov. 2014, http://docplayer.net/5719328-The-privacy-data-protection-and-cybersecurity-law-review.html.
  8. “What is the Difference Between Black, White and Grey Hat Hackers?” Norton, Symantec, 2018. https://us.norton.com/internetsecurity-emerging-threats-what-is-the-difference-between-black-white-and-grey-hat-hackers.html

Cite this page

The Misconceptions of Cyber Security. (2021, Aug 06). Retrieved from https://studymoose.com/the-misconceptions-of-cyber-security-essay

👋 Hi! I’m your smart assistant Amy!

Don’t know where to start? Type your requirements and I’ll connect you to an academic expert within 3 minutes.

get help with your assignment