Wednesday, May 15, 2019

Justification of Hacking into Websites Essay Example | Topics and Well Written Essays - 1250 words

Justification of Hacking into Websites - Essay standardIt is evidently clear from the discussion that most hackers state that they hack into websites not as criminals but as interested parties seeking to identify flaws in computer systems or reveal certain information. By hacking, they claim, it becomes achievable for computer security firms to prevent or rectify any damaging security leaks. However, due to the position effects of hacking and the damages it causes to computer firms images and business, questions have arisen on the issue of justification for hacking and activities. While others insist that hacking potty never be justifiable, others believe it is a justifiable practice, depending on the reasons for which it is done. Among the reasons cited for the justification of hacking are to improve the reference of computer/website products, for artistic expression, as political statements, and to uncover expose criminal activities such as decomposition and other government or corporate malpractices. In hacking into technology companies such as AT&T, which deals with millions of peoples entropy worldwide, hackers believe they compel these companies to ensure that they have tamperproof systems that keep their clients data secret. Therefore, hackers are a watchdog for the earth on the security weaknesses of technology firms. Hacking is thus justifiable since it addresses the vulnerabilities inherent in technology products that expose clients confidential information. Hacking could also be justifiable if it exposes illegal political activities by discredited groups. In addition, hacking whitethorn be justified if it reveals certain publicly important information, which the public is denied by governments, organizations, or politicians. Importantly, hackers reveal malpractices and criminal activities that may be happening without the knowledge of the public and the law enforcement agencies.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.