Skip to main content icon/video/no-internet

A hacker hacks away into the intricacies of complex computer systems to uncover sources of operating problems, design quick remedies, and implement effective solutions. These computer enthusiasts are usually adept at several programming languages and can use these skills to uncover computer code of secure systems, thereby giving them the ability to break into proprietary systems to steal valuable information. Unfortunately, hacker attacks are rarely reported, for fear of negative publicity (Bradner, 2002).

The more popular use of the word “hacker” is derogatory—computer experts who use their skills for malicious purposes. People in the computing profession like to refer to them as “crackers.” These expert computer enthusiasts break into secure systems and cause systems to break down, steal valuable and sensitive data, or modify code so that systems malfunction.

The security threat posed by hackers (crackers) can be potentially devastating. The most common reason for breaking into an organization's computer systems is to steal sensitive business and personal information so that it can be sold to competitors and marketing firms. Organizations are spending a significant proportion of their information technology (IT) budgets to prevent unauthorized security breaches by hackers. Several laws are in place so that organizations protect the privacy of their customers and employees.

One such law, the Health Insurance Portability and Accountability Act of 1996, mandates that hospitals and their business partners secure their business networks and patient registry information systems (Tieman, 2001). A hacker can potentially break into a hospital's database and retrieve sensitive and personal information on patients. This information can be used in many ways, ranging from relatively benign marketing programs to more damaging activities such as credit card theft. On the business side, a hacker can disrupt a hospital's ordering and scheduling systems, thus disrupting supplies and operations. Unfortunately, hacker attacks are rarely reported, for fear of negative publicity (Bradner, 2002).

The American Hospital Association, with 4600 member organizations, is designing a hub to manage business networks of hospitals and their business partners. These “hacker proof” network and e-commerce services will help health care organizations protect their patient, clinical, and business information (Tieman, 2001).

Hackers are expert computer programmers or users who possess skills that can be used for productive or desirable purposes. The correct term for the person who uses these skills for malicious reasons is “cracker.” This distinction is made clear in a news story on efforts to break into the communication networks of terrorists. After the World Trade Center tragedy, a top-secret U.S. security agency recruited a 16-year-old hacker from New Delhi. He is a security expert with expertise in deciphering messages hidden in Web pages. His expertise is being used to make it harder for crackers to communicate (Mackler, 2002).

AlokSrivastava

Further Reading

Bradner, S.Your confession is good for us. Network World1530(2002)
Mackler, C.Hacker vs. crackers. Teen People5136(2002)
Tieman, J.AHA tries to make a sale. Modern Healthcare469(2001)
  • Loading...
locked icon

Sign in to access this content

Get a 30 day FREE TRIAL

  • Watch videos from a variety of sources bringing classroom topics to life
  • Read modern, diverse business cases
  • Explore hundreds of books and reference titles

Sage Recommends

We found other relevant content for you on other Sage platforms.

Loading