50%(2)1 out of 2 people found this document helpful
This preview shows page 1 - 3 out of 8 pages.
The preview shows page 1 - 3 out of 8 pages.
AbstractThe research paper has extensively discussed hacking and expounded ways hacking affect cybersecurity. The first section of the paper has dwelled on different types of hackers and their motives. The types of hackers discussed include black hat hackers, ethical hackers, grey hat hackers, script kiddies, phreakers, and hacktivists. The second section of the paper has discussed techniques used by hackers to hack. The techniques include keyloggers technique, Trojan horse technique and spoofing attack technique. The research paper has also discussed laws used to enforce online privacy and security in the United States. For example, the paper has discussed the Economic Espionage Act and the punishment under the legislation. Also, the paper has discussed all the online activities that are prohibited under the Electronic Communication Privacy Act. The last section of the paper has looked at some of the areas the United States need to improve to succeed in the fight against hacking.
Cabrera 2Cybercrime is any criminal activity that involves network, networked devices, and computers. Cybercriminals often use computer technology to generate profit, damage crucial information such as evidence, access business trade secrets, access personal information or spread illegal content such as hateful messages or child pornography (Reddy & Reddy 2014). There are various forms of cybercrime in the contemporary world. However, the most common and the dangerous form of cybercrime is hacking. Hacking is the unauthorized intrusion into a network or a computer. Persons who engage in hacking are often referred to as hackers, and they normally achieve their malicious objective by altering the security features of a computer or a network.Although most hackers have extensive computer programming skills and have vast knowledge about computer security, they are often driven by different intents. The intents and action of the hackers are usually used to classify them into different groups. The first group of hackers is the black hat hackers who also referred to as the crackers. Black hat hackers are often driven by personal gain, and they usually use unauthorized computer access to steal corporate data, transfer funds from bank accounts or violate personal privacy (Brown, 2015). The second group of hackers is the white hat hackers also called ethical hackers. Ethical hackers are hackers who gain access to computer systems with the aim to assess its vulnerability or perform a penetration test. In most cases, ethical hackers work for security agencies to counter threats caused by black hat hackers.