1. Essay about Computer Hackers
Computer Hackers
Hackers are popularly defined as computer experts who spend enormous amounts of time trying to
breach the security of networks, web servers and email servers. Usually they use a selection of
specialist software to identify any weaknesses, which they are then able to exploit. There are
basically two main types of hackers, the first type is mainly consistent of intelligent adolescents who
acquire their hacking knowledge by reading, by talking to people and by spending an excessive
amount of time on their computer, learning the various programs, the source code and the
commands. They are then able to solve puzzles that people with computer engineering backgrounds
can't solve. vast...show more content...
Some, however, may cause random damage to data files (sometimes insidiously, over a long period)
or attempt to destroy files and disks. Others cause unintended damage. Even benign viruses
(apparently non–destructive viruses) cause significant damage by occupying disk space and/or main
memory, by using up CPU processing time, and by the time and expense wasted in detecting and
removing them.
There are several main types of viruses out there that hackers may use:
v File Viruses – A file virus is a virus that attaches itself to a file, usually an executable application
like a word–processing program and in general file viruses don't infect data files. However, data
files can contain embedded executable code such as macros, which may be used by hackers, as a
file virus infects other files when the program to which it is attached is run, it can spread across a
network (often very quickly).
v Boot–sector Viruses– Boot sector viruses alter the program that is in the first sector of every disk.
This is the space in the computer that automatically runs each time the machine is turned on.
Generally, a boot–sector infector executes its own code (which usually infects the boot sector or
partition sector of the hard disk), then continues the PC start–up process. In most cases, all
write–enabled floppies used on that PC from then on will become infected. A PC is infected with
Get more content on HelpWriting.net
2. Essay on Cyber Attacks
On April 27, 2007 cyber–attacks began crippling key infrastructures of banks, ministries, and
newspapers. These attacks took place, in part, because of a statue. This statue is not just a two–meter
tall man holding a helmet; this individual represents and symbolizes the lives lost in the Second
World War. The statue has been under a lot of speculation and has torn the population of the
country in half. Some believe the status is a symbol of Soviet, formerly Nazi, while some see this
statue as symbol of Soviet victory over the Nazis and Russian claims Estonia. When the government
decided to relocate the statue to Estonia's capital, the worst riots the country has ever seen took place
and this started vicious cyber–attacks (Jenik). One may...show more content...
These attacks did not target one organization either, as the attacks focused on parliaments, banks,
ministries, newspapers, and broadcasters.
The next characteristic of cyber war is anonymity. With the Estonia case nobody was sure who did
the attacking and who to blame. At first Estonian Foreign Minister Urmas Paet accused Kremlin of
the attacks but then retracted this statement because of lack of evidence. NATO nor European
Commission experts were able to find any involvement of the Russian government in these attacks.
These attacks were determined to be one of the "zombie" computers used in the attack. The only
person ever arrested for the attacks was an ethnic Russian "hacketivist" living in Estonia
(Denial–of–Service).
Fast –15 minutes to breakdown a society is another factor of cyber war. In such a short amount of
time the infrastructure of Estonia went down. The internet played a crucial part of their country
because of how people use the internet to pay for street parking and banking transactions. By
shutting down these key components of their country society is broken down and halted.
International web traffic was also blocked to assist in stopping these attacks.
By looking at the characteristics of cyber war from our lecture slides we can see that since all these
components satisfy the definition, we can view the Estonia case as a cyber–war. The broader
definition is that the use of computers
Get more content on HelpWriting.net
3. Cyber Crime Speech
Hello everyone. First of all I would like to thank Madam Munirah for giving me the opportunity to
be here today. So, before I proceed with my speech, let me introduce myself first. The name's
given is Nur Syifa and I am 20 years old. The topic of today's speech is "Internet: how wild can it
be?" As all of us aware, internet is one of the best inventions for us and importance of the internet is
huge in our lives. It has become the best source to get information about everything. With internet we
can stay updated with the latest happenings in the world, stay connected with people and many
more. But as you know, nothing comes with "benefit". Everything has its negative points as well as
the internet. The question might have hit your mind that what are the bad sides of the internet,
right? The first point that we're going to discuss is about how easily inappropriate materials can be
found on the internet. There are many things available on the...show more content...
The dependency over internet has led to increase in cyber crime. Some criminals use the internet for
spreading computer viruses and also fraud. Cyber crime is a new type of crime that occurs in this
Science and Technology years. There are a lot of definitions for cyber crime. According to
Wikipedia.com cyber crime is known as computer crime that refers to any crime that involves a
computer and a network. Besides that, cyber crime is also defined as crimes committed on the
internet using the computer as either a tool or a targeted victim. One of the cyber crime is the
internet fraud. The most severe form of internet fraud involves identity theft, which is illegally
getting a hold of someone's personal information in some way that uses fraud or deception and is
used for financial gain. One method of getting people's bank account details is the money transfer
email scam. People receive emails requesting help with transferring funds from another
Get more content on HelpWriting.net
4. Cyber Bullying Essay example
Social Networking has taken bullying to the extreme. Before advanced technology, children and
teenagers were troubled by school bullies. Today, they are targeted by bullies via internet. Most
people undergo some form of bullying in life. Growing up, I experienced the typical name calling
and spiteful comments. I also dealt with minor cases of virtual bullies. These bullies are known as
cyber bullies. I find this topic compelling because it's a matter that has spiraled out of control. "Cyber
bullying is defined as using the computer or other electronic devices to intimidate, threaten or
humiliate another individual," Admin October 13th, 2008. As the
Hartman 2 internet continues growing more popular with the youth, so do potential...show more
content...
This makes the bully feel more powerful.
Hartman 3
There's not a legitimate reason for cyber bullying. Many perpetrators bully just to get a reaction. It's
common for them to bully another just to boost their ego. It makes the tormentor feel in charge.
Some may think it's humorous to tease and make fun of others and that it's not harmful in any way.
The reality is being bullied can cause many problems for children and teenagers.
Many negative effects are outcomes of cyber bullies. The impact cyber bullying has on kids is
detrimental. Victims can develop psychological problems. For example, victims begin having
anxiety, lower self–esteem, and frustration. They may also be diagnosed with depression. It's tough
to ignore cyber bullying. Compared to school bullies, internet bullies cause their victim more
emotional pain. Children and teenagers are able to escape school bullies when they return home.
However targets of cyber bullying don't have that advantage.
There is no argument as to if cyber bullying is good or bad. However is social networking to
blame? Or is lack of parent monitoring the problem? It's true that adolescents are often given too
much technology independence. I believe parents should fully acknowledge what websites their
children are visiting and what they are posting. On the contrary, I feel there is no excuse for child or
teenager to feel the urge to emotionally attack
Get more content on HelpWriting.net