Skip to main content icon/video/no-internet

BEGINNING IN THE 1980s, as new technology made what former Vice President Al Gore called the Information Superhighway possible, the world has become smaller and more vulnerable. Any computer that is connected to the internet or to a network opens a line of communication that can be accessed by computer hackers around the world. Computer hackers have been responsible for threats to national security, credit-card and identity theft, software piracy, financial fraud, trade-secrets theft, information theft, denial of service attacks, wanton destruction of data, software, and hardware, and various other malicious behaviors.

It is difficult to estimate the full extent of the damage caused by computer hackers because of under-reporting. Estimates of annual costs have ranged from $555 million and $13 billion. When government agencies or businesses are attacked, costs include downtime, lost business opportunities, salaries for staff who spend time repairing damage, and fees for consultants and lawyers. Homeowners who have been maliciously hacked may have to replace a damaged hard drive or even an entire computer.

Originally, the term hacker was used to identify anyone who gained entry into another computer without the consent of the owner. The typical hacker was curious about the way that computers worked and how they communicated with each other. This sort of hacker has also been called “benign” or a “white hat.” Some companies have hired these hackers to test their systems and to find and plug holes in operating systems such as Unix or Windows or to protect confidential information and products. When most people refer to computer hackers, they are referring to what is also known as “crackers” or “black hats.”

Unlike the traditional hacker, the cracker is interested in accessing other computers for malicious or criminal purposes. This individual is generally profiled as a young, male computer genius. He is often characterized as precocious, curious, and persistent. He may be delinquent, hyperactive, or a drug or alcohol abuser. The cracker is also known to lie, cheat, steal, and exaggerate. A network of hackers has developed through online bulletin boards, 2600 magazine, and through other less formal means of communication. Networking allows hackers to communicate with one another, to trade hacking techniques, to identify holes in operating systems and other software, and to brag about their exploits to one another. The more professional hackers who belong to this network are critical of uninitiated hackers who are called “script kiddies” who may download hacking software from the internet rather than calling on their own skills and initiative to engage in computer hacking.

Hackers enter computers for a number of reasons and may come from either inside or outside a company, agency, or network. Inside hacking is generally performed by employees or former employees who illegally or unethically try to access privileged information or attempt to manipulate or destroy information. They may also hack simply out of spite or revenge. Outside hackers may be interested in stealing proprietary information such as user passwords that allow access to entire networks, or in stealing trade secrets or source codes or financial records. Others may be looking for personal information to pave the way for identity theft. Still others may be interested in setting up denial of services attacks that have been known to crash the entire systems of government entities and large corporations, or the hackers might just enjoy snooping or acting maliciously.

...

  • Loading...
locked icon

Sign in to access this content

Get a 30 day FREE TRIAL

  • Watch videos from a variety of sources bringing classroom topics to life
  • Read modern, diverse business cases
  • Explore hundreds of books and reference titles

Sage Recommends

We found other relevant content for you on other Sage platforms.

Loading