Hackers And Security. What Are The Effects Of Data Encryption And Firewalls?


?
Over the last several years, the computer industry has grown to an
all time high of technology and knowledge. With the existence of hackers,
swift precautions are being taken. The placement of firewalls and the task
of data encryption are becoming a necessary fact of business for those with
confidential information. And still, this is not enough. Hackers have
become so involved with the tasks of cracking firewalls and decoding
encryption, it seems that privacy is a virtue of the past. People are no
longer safe as they once were. The presence of encryption and firewalls are
growing stronger, but so are hackers. In the following report, you will
read what a true hacker is, the effects of ...

Want to read the rest of this paper?
Join Essayworld today to view this entire essay
and over 50,000 other term papers

academic circles. Hackers are becoming more common, and quickly
learning new techniques and methods, which no longer leave computer systems
as 'safehouses'. The question of "what kind of person is a Hacker?" cannot
be answered simply. Hackers vary in race, style and preference. Since every
person is different, therefore so are hackers, "Each Hacker has their own
style and methods" (Rootshell). According to the Hackers Code of Ethics, a
true Hacker is one who shares:

1 The belief that information-sharing is a powerful positive good,
and that it is an ethical duty of hackers to share their expertise
by writing free software and facilitating access to information
and to computing resources wherever possible.

2 The belief that system cracking for fun and exploration is
ethically OK as long as the cracker commits no theft, vandalism,
or breach of confidentiality.

3 The belief that there actions are not illegal, but those ...

Get instant access to over 50,000 essays.
Write better papers. Get better grades.


Already a member? Login

devices.
For Hackers, a firewall is one of the tougher devices to crack. Since
Firewalls are always different, there are no standards for breaking down
and exploiting the system. Through programs called port scanners, and
firewall phreaking, hackers are able to find vulnerable ports (open holes
in the server) which can then be sent certain packets of data, called
nuking, that can crash and disable the system. According to Dan Farmer, of
Sun Microsystems,

Every day, all over the world, firewalls and hosts are being
broken into. The level of sophistication of these attacks varies
widely; while it is generally believed that most break-ins
succeed due to ...

Succeed in your coursework without stepping into a library.
Get access to a growing library of notes, book reports,
and research papers in 2 minutes or less.


CITE THIS PAGE:

Hackers And Security. What Are The Effects Of Data Encryption And Firewalls?. (2008, January 2). Retrieved August 31, 2015, from http://www.essayworld.com/essays/Hackers-Security-What-Effects-Data-Encryption/76851
"Hackers And Security. What Are The Effects Of Data Encryption And Firewalls?." Essayworld.com. Essayworld.com, 2 Jan. 2008. Web. 31 Aug. 2015. <http://www.essayworld.com/essays/Hackers-Security-What-Effects-Data-Encryption/76851>
"Hackers And Security. What Are The Effects Of Data Encryption And Firewalls?." Essayworld.com. January 2, 2008. Accessed August 31, 2015. http://www.essayworld.com/essays/Hackers-Security-What-Effects-Data-Encryption/76851.
"Hackers And Security. What Are The Effects Of Data Encryption And Firewalls?." Essayworld.com. January 2, 2008. Accessed August 31, 2015. http://www.essayworld.com/essays/Hackers-Security-What-Effects-Data-Encryption/76851.
JOIN NOW
Join today and get instant access to this and 50,000+ other essays


PAPER DETAILS
Added: 1/2/2008 04:12:12 PM
Category: Computers
Words: 1288
Pages: 5

Save | Report

SHARE THIS PAPER

SAVED ESSAYS
Save and find your favorite essays easier

SIMILAR ESSAYS
David And Hamlet
Song Of Myself: Individuality A...
Barney The Hitler Of My Generat...
The Importance Of Human Interac...
Barney The Hitler Of My Genera
The Influence Of Thoreau On Gan...
Compare How Hobbes And Augustin...
Marketing Research For Augusti
Universial Themes In "The Retur...
The Effects Of Television Viole...
Copyright | Cancel | Contact Us

Copyright © 2015 Essayworld. All rights reserved