Sunday, January 5, 2020
Speech For Young Group Of People About Computer Hacking Essay
iGCSE English Language 0522 Assignment 2: Descriptive and/or Narrative Name: Haider Abbasi ID: ABB15368524 Title of Assignment: speech to young group of people about computer Hacking. English Teacher: Sally whitehead Good morning ladies and gentleman, how you doing? I hope everyone is doing well. My name is Haider Abbasi and I am here today to talk about computer hacking and the pros and cons. I am sure that we have all been affected at some point by hacking and some of us may have experienced a financial crisis as a result of hacking. I am sure that most of us would like to see computer hackers imprisoned and removed from sight. However, I would like to present you with a different perspective on hacking and its importance to our societies. To understand these we have to understand who computer hackers are? Let me get the meaning straight. A computer hacker is a person who finds and exploits weakness in computer system or network to gain access. Hackers are usually skilled computer programmer with knowledge of computer security. If you look at the news and see how hacker are been portrayed as the cause of everything that is wrong with online security. Hacker are the people with lots of power, they find the different solution for the cyber corner they discover. We all have this thought in our mind that hacker are evil and they do bad thing but in reality there are lots good things that hackers did. In 24 October 2011 hacker taken offline 40 child pornographyShow MoreRelatedHacking And The Social Learning Theory1365 Words à |à 6 Pagesmore someone has learned and approves of definitions favorable to deviance, the more likely they will participate in that behavior (Morris Higgins, 2010). Hacking and the Social Learning Theory The social learning theory views hackers as individuals who are socialized into breaking rules through peer-association. A majority of hackers are young and learn from their friends in a type of communal environment. Studies show that this behavior takes place in a distinctive socio-cultural context and ââ¬Å"communalâ⬠Read MoreComputer Hacking1449 Words à |à 6 PagesComputer hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creatorââ¬â¢s original purpose. People who engage in computer hacking activities are often called hackers. Since the word ââ¬Å"hackâ⬠has long been used to describe someone who is incompetent at his/her profession, some hackers claim this term is offensive and fails to give appropriate recognition to their skills. Computer hacking is most common among teenagers and young adults, although thereRead MoreContemporary Outlaws : Today s Modern Outlaws1529 Words à |à 7 PagesThey take from the powerful groups in the community and give to the needy. Todayââ¬â¢s outlaws are following in the similar steps but, in a digital world. The digital world is now the modern Wild West because itââ¬â¢s a new frontier that keeps growing without control, and laws are still being set in place so everyone online is free to do as they wish until a law has been set in place. The modern outlaws I will be writing about are Edward Snowden, Julian Assange and the hacker group of Anonymous. Each out lawRead MoreCyber Criminals: Cyber-Crime and Cyberstalking Essay1422 Words à |à 6 Pages People want to feel safe. If someone owns a precious object it is stored in a safe hidden in their house. To further protect a house the front doors have handle locks and dead-bolts. To keep personal items safe items like wallet chains are used to stop criminals in their tracks. In the case of cars where they cannot always be watched, car alarms were made to protect from thieves. All of these systems are in place to keep people and their possessions safe. There is an area in peopleââ¬â¢s lives thatRead MoreComputers And Privacy : The Cloud1296 Words à |à 6 Pagesfear- Computers and privacy donââ¬â¢t mix Computers and privacy is an ever growing topic of conversation. Technology has advanced so much over the past 10 years it is hard to know how secure files on our computing devices really are. Storage methods like ââ¬Å"The Cloudâ⬠are used by millions of people every single day to store files like music, images and personal details like bank account details that people simply donââ¬â¢t have the space to hold on their devices but how much do we really know about the cloudRead MoreCybercrime Research Paper : Cybercrime2453 Words à |à 10 Pageshas also opens greater opportunities for identity, banking and credit card theft. The individuals that commit this cybercrime are often referred to as hackers. Oxford Dictionaries defines a hacker as, ââ¬Å"a person who uses computers to gain unauthorized access to dataâ⬠. Hacking influences and impacts our daily lives and will affect the future. In the future, the major question that must be answered is whether common values and rights might have to be sacrificed to secure the public from cybercrimeRead MoreAnonymous Group1600 Words à |à 7 PagesAnonymous Hacktivist Group Anonymous is an international group that is dedicated to computer hacking, using the Internet as their main weapon. They were formed in the years between 2003 and 2004 originating from an imageboard web site named 4chan. Their membersââ¬â¢ real identities are not known, as they are always maintaining anonymity within their operations and messages. They are represented by a logo of a headless suited man, than instead of a head has a question mark. The group has become famous forRead MoreA Brief Look at Cybercrimes1869 Words à |à 7 Pageslegal and people who do responsible accept fine sentence or jail. With other word meaning, criminal is anything that can give problem or hardship to others. Cybercrime is crime which involves all crime activity the usual carried out like theft, fraud, extortion and all activity which involves breach of law that is existing by using computer facility or more accurately more, by using internet in cyber column. Nevertheless, computer crime is where show with intention and associated with computer throughRead MoreThe Effects Of Cyberbullying On The Internet1449 Words à |à 6 Pagesthat follow. Despite, the severe effects cyberbullying has on adults, it seems the younger group of individuals seems to be impacted more by cyberbullying that has fatal results leading to suicide. The purpose of this research is to alleviate cyberbullying on the internet. Cyberbullying has received so much publicity due to some of the more severe cases like those involving suicide. Whatââ¬â¢s interesting about cyberbullying is that in traditional bullying the victim and the bully identify each otherRead MoreWhat Rank Are You Applying For?1668 Words à |à 7 PagesWhat rank are you applying for?: Helper How young are you?: 15 Are you a Male or Female?: Male What country do you live in?: United States (C.T.Z.) Do you have a YouTube or Twitch channel? I have a youtube channel. I just use it for hacker proof. https://m.youtube.com/channel/UCCPNxZEv0a-lnDmXowT5hHA I do not have a twitch. Do you have a microphone/headset? Yes I have both. (My computer headphone jack is messed up so I can t talk in teamspeak but I can hear.) Skype is best for me. Why
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.