Wednesday, October 9, 2019
Justification of Hacking into Websites Essay Example | Topics and Well Written Essays - 1250 words
Justification of Hacking into Websites - Essay Example It is evidently clear from the discussion that most hackers state that they hack into websites not as criminals but as interested parties seeking to identify flaws in computer systems or reveal certain information. By hacking, they claim, it becomes possible for computer security firms to prevent or rectify any damaging security leaks. However, due to the side effects of hacking and the damages it causes to computer firmsââ¬â¢ images and business, questions have arisen on the issue of justification for hacking and activities. While others insist that hacking can never be justifiable, others believe it is a justifiable practice, depending on the reasons for which it is done. Among the reasons cited for the justification of hacking are to improve the quality of computer/website products, for artistic expression, as political statements, and to uncover expose criminal activities such as corruption and other government or corporate malpractices. In hacking into technology companies su ch as AT&T, which deals with millions of peoplesââ¬â¢ data worldwide, hackers believe they compel these companies to ensure that they have tamperproof systems that keep their clientsââ¬â¢ data confidential. Therefore, hackers are a watchdog for the public on the security weaknesses of technology firms. Hacking is thus justifiable since it addresses the vulnerabilities inherent in technology products that expose clientsââ¬â¢ confidential information. Hacking could also be justifiable if it exposes illegal political activities by discredited groups. In addition, hacking may be justified if it reveals certain publicly important information, which the public is denied by governments, organizations, or politicians. Importantly, hackers reveal malpractices and criminal activities that may be happening without the knowledge of the public and the law enforcement agencies. Ã
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.