Sunteți pe pagina 1din 4

Impacts of Hacking Accounts through Private Accounts

Jeremy M. Piscano Jobert Justin Villanueva Adrian Castelo


Humanities and Social Sciences 1101 Humanities and Social Sciences 1101 Humanities and Social Sciences 1101
Antipolo City Senior High School Antipolo City Senior High School Antipolo City Senior High School
piscanojeremy05@gmail.com --------------------------------- casteloisaac2@gmail.com

Johnalyn Casolita Joanna Montanez Hasmin Bilao


Humanities and Social Sciences 1101 Humanities and Social Sciences 1101 Humanities and Social Sciences 1101
Antipolo City Senior High School Antipolo City Senior High School Antipolo City Senior High School
------------------------------ sucgangjoanna96@gmail.com -----------------------------

Eljohn E. Doncel Angela B. Adino Miguel Sarian III


Humanities and Social Sciences 1101 Humanities and Social Sciences 1101 Humanities and Social Sciences 1101
Antipolo City Senior High School Antipolo City Senior High School Antipolo City Senior High School
jhaydoncel@gmail.com adinoangela03@gmail.-com migzysarianity22@gmail.com

ABSTRACT or networks to exploit its weaknesses to gain access. Example of


Hacking: Using password cracking algorithm to gain access to a
The Information Technology is becoming more and more of a system Computers have become mandatory to run a successful
hacking industry. Hacking is not only done by criminals it’s also businesses. It is not enough to have isolated computers systems;
done by government agencies. Now what we have here is a they need to be networked to facilitate communication with
hacker that is hacking into email addresses and taking all kind of external businesses. This exposes them to the outside world and
information. The yahoo company is working with the Federal hacking.
law enforcement for the investigations to solve the problem of Hacking means using computers to commit fraudulent
the 81 million accountsbeing hack on yahoo. In some students in acts such as fraud, privacy invasion, stealing corporate/personal
colleges are learning how to stop hackers from getting into data, etc. Cybercrimes cost many organizations millions of
server, emails, and government data bases. Hacking Today the dollars every year. Businesses need to protect themselves
major problems in the information technology are hacking. No against such attacks. Hacking is identifying and exploiting
one has figured out how to stop this problem. This problem is a weaknesses in computer systems and/or computer networks.
securities breach even the enforcement agencies which is Ethical Hacking is about improving the security of computer
puzzled about on how to solve this problem. While everybody is systems and/or computer networks. Ethical Hacking is
on a computer the hackers are figuring out different ways to legal.Knowing how to identify computer security threats is the
hack and steal information. This has become a global problem to first step in protecting computer systems. The threats could be
the NSA so they are taking all options out to try to shut them intentional, accidental or caused by natural disasters.
down! So many company and agencies are seeing information Hacking according to oxford dictionary means to
get stolen. This has been going on for several years. That is why “gain unauthorized access (to data in a computer)”. Banks
the federal government is always looking for new students defines hacking as “something that boring mainframe computer
coming out of colleges in Network System Administration field. operators did to improve performance and battle boredom.”.
Here a bank focuses on boredom as the reason of hacking.
1 INTRODUCTION Darlington believes hacking is not limited to accessing data or
information but also includes an attack on the privacy of all
In this twenty first century is the era of that the people people. Almost all different opinions agree on the illegality of
can easily access, share information, save files through internet. hacking.
The internet is wide range of communication that allows people On the other hand the word hacker is the agent of hack
to interact with other people and make things more easy. or hacking and it was defined as a person who enjoys accessing
Therefore, accessing the internet is not quite secured that some files whether for fun, imposing power or the interest related to
people do inappropriate and mannerless things such as hacking. the accessed files or data according to Taylor. While Marotta
Hacking is gaining or accessing computer illegally. In this has a negative view of the hacker as a data lord, a barbarian who
study,the researchers aim to know the impacts of hacking takes what he wants. Himanen defines hacker as any person who
accounts.Hacking is identifying weakness in computer systems performs illegal actions whether they were related to computer

1|Page
or not which means the usage of a device apart from its Computer Insider, a newsletter for hackers, estimated
functionality. Seems hacking according to Himanen is related to that about 900 hackers were hired during the past few years by
any illegal or unauthorized action. organizations that they once targeted. For instance, after a
Clear from the definitions mentioned above that there hacker successfully created a negative balance in a German bank
is a controversy that encounters the judgment and definition of account, he received job offers from several German companies
hacking, controversy aroused because it’s hard to decide exactly desperate for his expertise in beefing up their security systems
what the aim is behind hacking or how to know the mentality of from external threats (Cushing 2001).
the hacker. That’s why the ethics and motivation of hackers
should be paid attention and discussed then understanding the 3 METHODOLOGY
hacker will be much easier.
In this chapter the researchers were about to present
2 RELATED WORKS AND LITERATURE the research design, setting of the study, subject of the study,
data gathering instrument, procedure of the study and the
The Department of Justice defines computer crimes as sources of data.
“any violations of criminal law that involve knowledge of
3.1 Research Design
computer technology for their perpetration, investigation, or
prosecution” (Benson et al.1997). Hacking, in particular, is In this study, we will use quantitative research. We
defined as “the process of accessing computer systems by need to know the frequency numbers of the respondents who
persons who have no legitimate access to the systems” in will answer our survey form. According to Mattues (2019),
Computer Misuse Executive Briefing (1990) by Coopers and quantitative methods emphasize objective measurements and the
Lybrand Deloitte (Mulhull 1999).Hacking can undermine the statistical, mathematical, or numerical analysis of data collected
fundamentals of financial systems by exposing the flaws in these through polls, questionnaires, and surveys, or by manipulating
systems. Poorly designed systems are susceptible to security pre-existing statistical data using computational techniques. The
breaches that can compromise the quality of financial and participants or respondents will be Grade 11 HumSS students of
operational information that resides on these systems. Decision Antipolo City Senior High School. The answer sheet or survey
makers who use information compromised by breaches may form will be provided by the researchers who will conduct this
face adverse economic consequences such as impaired study. They only check their chosen answer from the survey
reputation, higher costs to detect or correct the breaches, and form.
potential legal liability (Campbell et al. forthcoming).
A survey of 500 U.S. companies by the Computer 3.2 Setting of the Study
Security Institute (CSI) and Federal Bureau of Investigation
(FBI) indicated an increase in reported financial losses of 21 The study will undergo at Antipolo City Senior High
percent (or $456 million) for 2002; mostly a result of organized, School, Located at Olalia Road, Brgy. Sta. Cruz, City of
planned cyber-attacks (Farber 2003). TruSecure, a security firm, Antipolo, Province of Rizal. The researchers will interview
found that a company suffered an average loss of $475,000 as a students from different HumSS sections in Antipolo City Senior
result of the Blaster Worm infection (Varghese 2003). The High School.
information age has created an environment whereby
information is a key asset and information security is a strategic 3.3 Procedure of the Study
variable that helps firms gain a competitive advantage (Gordon
et al. forthcoming). Recognition of the role of IT and its The researchers will use quantitative design for this
accompanying budgetary demands for compliance with study, wherein they are going to answer a survey form. The
regulatory requirements is critical in maintaining a firm’s survey questionnaire consist of 10 questions to be answered by
competitiveness. An annual survey revealed that 40% of the the respondents, the questions are made based on the statement
chief financial officers polled believed that compliance with of the problem of the study. The survey questions to the
the requirements of the Sarbanes-Oxley Act (SOA) would not respondents will serve as the basis of thee data of the study.
affect their IT budget (Gates 2003). This belief illustrates a
3.4 Sources of Data
disconnection between chief financial officers and chief
information officers (Gates 2003). Besides chief executive
The main sources of data in the study was the Grade
officers and chief financial officers, chief information officers
11 HumSS students in Antipolo City Senior High School are the
are also affected by SOA because assurance of compliance is
respondents of this research wherein they'll be the researchers
provided by the systems that contain the financial information
source of data.
(Imhoff , 2004).

2|Page
4 RESULTS AND DISCUSSION Computers have made our world and lives much easier. In the
past, many jobs were done by hand. Computers have replaced
When computers were introduced to the nation, the calculators. Word processing is now much faster and more
issue of ethics was not relevant. However, in present day, most conveienent than it was when we had to use typewriters. Not
of the world owns a computer or has some way to access a only can we type and correct errors much quicker since it can be
computer. Especially with a modem, almost anyone can tap into done on a computer, but we don't even have to type at all as a
confidential files and use information in an illegal way. It is result of dictation software, which allows us to speak to our
extremely difficult to track down computer crimes as well, so computers. Computers revolutionized our world. We can
more often than not, the public must rely on the computer ethics communicate through e-mail with friends around the world.
of those who can retrieve this information to not do it. Research on any form or type of information is readily and
easily accessible through the Internet. Computers have opened
The main scare is computer hackers; professional doors to people all over the world that just twenty years ago
computer thieves that purposefully break into computer were not even dreame.
databases to illegal gather information that can be used against
an individual or government. The world must open its eyes 5 CONCLUSION AND RECOMMENDATIONS
quickly in order to realize that the Internet can provide easy
access to personal records and there should be some protection Earlier hackers were considered to be genius because
against hackers. they helped in many ways in the development of computers and
internet technology as such, but in this modern world where
Another raging issue in the world of computer ethics personal benefit has played a major importance in one’s life,
would be the question of whether or not to pirate software. people are often attracted to things they can do and gain through
Piracy is simply copying software without paying for it. This is a illegal entry into people privacy and using for their own
huge problem for many software companies on the market and benefits.
can ruin businesses left unchecked. The person pirating the Different motivations and opinions have been
software won't be able to receive technical support on the discussed in this paper, but if we consider them as a person they
software, that's the only disadvantage, not a big deal when the are a live example of genius because of their abilities of doing
game or other software was free. Those who do this have the the unbelievable and unachievable by getting more involved into
option to register the software and pay for it, this is the the programming and understanding the loop holes in the
consumer's dilemma, do the right thing and pay for it, or get the security systems. I think because of these, scientists and
game for free and help ruin the economy for the whole. It is researchers have spent lots of technology to improve the systems
estimated that software piracy costs the U.S. $10 billion and security and make them more secure so that no illegal access can
worldwide $12 billion. There may be ways to catch them, be gained.
however, as we will discuss. In my own view understanding the different
perspective of a hacker, we can develop a much more secure and
In today's fast-paced world, the high-tech computer much more sophisticated environment and provide a safer world
industry offers a unique opportunity for high-paying jobs. Many for transactions and online shopping. The bad things of them
people start their careers much younger than I have, so should be taken into good only to benefit our country and its
consequently I have to search for a career in a field that will progress.
offer me adequate financial rewards in a limited amount of time. We recommend that keep your personal information
I started working with computers four years ago, upgrading secure offline.
systems, and increasing modem speeds to enable me access to  Lock your financial documents and records in a safe
the World Wide Web. I find programming to be the most place at home, and lock your wallet or purse in a safe
interesting area of Computer Science; there is a subculture place at work. Keep your information secure from
within this area that call themselves hackers. There seems to be roommates or workers who come into your home.
a negative connotation with the word hacker. This is a
 Limit what you carry. When you go out, take only the
misunderstanding because these programmers, who consider
identification, credit, and debit cards you need. Leave
themselves to be hackers, are not the evildoers that the media
your Social Security card at home. Make a copy of
portrays them as. Some misguided souls do attack systems for
your Medicare card and black out all but the last four
profit and pleasure, but these are usually the wannabe hackers;
digits on the copy. Carry the copy with you unless you
they are referred to as crackers or cyberpunks. True hackers do
are going to use your card at the doctor’s office.
not waste their time with these types of antics. It is similar to an
 Before you share information at your workplace, a
artist who, instead of painting a beautiful picture, sprays
business, your child's school, or a doctor's office, ask
profanity on a city wall. There are many misconceptions
why they need it, how they will safeguard it, and the
surrounding the artform of hacking.
consequences of not sharing.

3|Page
 Shred receipts, credit offers, credit applications, when it’s transmitted. Look for the lock before you
insurance forms, physician statements, checks, bank send personal or financial information online.
statements, expired charge cards, and similar
documents when you don’t need them any longer. We recommend that you must:
 Destroy the labels on prescription bottles before you KEEP PASSWORDS PRIVATE
throw them out. Don’t share your health plan  Use strong passwords with your laptop, credit, bank,
information with anyone who offers free health and other accounts. Be creative: think of a special
services or products. phrase and use the first letter of each word as your
 Take outgoing mail to post office collection boxes or password. Substitute numbers for some words or
the post office. Promptly remove mail that arrives in letters. For example, “I want to see the Pacific Ocean”
your mailbox. If you won’t be home for several days, could become 1W2CtPo.
request a vacation hold on your mail.
 When you order new checks, don’t have them mailed
to your home, unless you have a secure mailbox with a DON’T OVERSHARE ON SOCIAL NETWORKING
lock.
SITES
 If you post too much information about yourself, an
We recommended that you must be alert to
identity thief can find information about your life, use
impersonators:
it to answer ‘challenge’ questions on your accounts,
 Make sure you know who is getting your personal or and get access to your money and personal
financial information. Don’t give out personal information. Consider limiting access to your
information on the phone, through the mail or over the networking page to a small group of people. Never
Internet unless you’ve initiated the contact or know post your full name, Social Security number, address,
who you’re dealing with. If a company that claims to phone number, or account numbers in publicly
have an account with you sends email asking for accessible sites.
personal information, don’t click on links in the email.
Instead, type the company name into your web
SECURING YOUR SOCIAL SECURITY NUMBER
browser, go to their site, and contact them through
 Keep a close hold on your Social Security number and
customer service. Or, call the customer service
ask questions before deciding to share it. Ask if you
number listed on your account statement. Ask whether
can use a different kind of identification. If someone
the company really sent a request.
asks you to share your SSN or your child’s, ask: why
they need ithow it will be usedhow they will protect
We also recommend that you must be safely dispose
itwhat happens if you don’t share the number. The
of personal information:
decision to share is yours. A business may not provide
 Before you dispose of a computer, get rid of all the
you with a service or benefit if you don’t provide your
personal information it stores. Use a wipe utility
number. Sometimes you will have to share your
program to overwrite the entire hard drive.
number. Your employer and financial institutions need
 Before you dispose of a mobile device, check your
your SSN for wage and tax reporting purposes. A
owner’s manual, the service provider’s website, or the
business may ask for your SSN so they can check your
device manufacturer’s website for information on how
credit when you apply for a loan, rent an apartment, or
to delete information permanently, and how to save or
sign up for utility service.
transfer information to a new device. Remove the
memory or subscriber identity module (SIM) card
KEEPING YOUR DEVICES SECURE
from a mobile device. Remove the phone book, lists of
 Use Security Software. Install anti-virus software,
calls made and received, voicemails, messages sent
anti-spyware software, and a firewall. Set your
and received, organizer folders, web search history,
preference to update these protections often. Protect
and photos.
against intrusions and infections that can compromise
your computer files or passwords by installing security
We recommend that must be keep your browser
patches for your operating system and other software
secure:
programs.
 To guard your online transactions, use encryption
software that scrambles information you send over the
internet. A “lock” icon on the status bar of your
internet browser means your information will be safe

4|Page

S-ar putea să vă placă și