In this chapter, Sarah Baase explains the term hacking. In the early days of computer programming a hacker was a creative programmer who wrote clever programs. As time went on the word hacking took on a totally different meaning; a quote from Baase "Breaking into computers on which the hacker does not have authorized access." Hacking has created huge problems for every organization, company, and individual that has access to the internet. These individuals that are labeled "hackers" range from any age, and can break into and steal millions of dollars as well as confidential military information. How can the ordinary person protect themselves from being subjected to a hacker? What actions must be taken?
Subscribe to:
Post Comments (Atom)
1 comment:
One must also look at the fact that not all hackers are hacking for the same purpose, so actions taken against hackers should not all be the same. A hacker that hacks into a military base should have a greater punishment that someone who posts comments on someone's myspace, for example. Unfortunately, security is not always up to date enough to prevent hacking; it's easier to catch a hacker than to prevent the hacking from happening. Can there be a way to prevent hacking, when it is constantly evolving?
Post a Comment