Cause and Effect of Network Hacking

Cause and Effect of Network Hacking

  • Submitted By: miang
  • Date Submitted: 03/02/2009 2:39 AM
  • Category: Technology
  • Words: 1013
  • Page: 5
  • Views: 1


Everywhere we go, technology is there. Technology is rising quickly. To mention one is, computer. As the use of computer has grown, computer crime has also become more important. Computer crime generally refers to criminal activity where a computer or network is the source, tool, target or place of crime. Computer crimes encompass unauthorized or illegal activities perpetrated via computer as well as the theft of computers and other technological hardware. As firms of all sizes, industrial orientation, and geographic location increasingly rely on computers to operate, concerns about computer crime have also risen, in part because the practice appears to be thriving despite the concerted efforts of both the law enforcement and business communities to stop it. Computer crimes are increasing rapidly nowadays maybe because many of these crimes are apparently not detected by victims, many of these crimes are never reported to authorities and partly because the losses are often difficult to calculate.

A common example is when a person starts to steal information from sites, or cause damage to, a computer or computer network. This is the so-called “hacking”. Hacking is when someone attempts to defeat or exploit the security capabilities of a computer system. A person who hacks a network is called “hacker”. A hacker is a person who is able to access other people’s computers and modify programs or information. Since the internet popularized, internet hacking has provided hackers through out the world an unlimited source of new victims, specially those who are just beginning to use the internet and are not aware of the dangers that lurk outside. Hacking wireless internet networks has provided an even wider spectrum of victims through out modern cities.

Computer shop network hacking happens when a hacker exploits a security breach in a network or computer and is able to access the information through the internet. As long as he is not...

Similar Essays