Premium Essay

The Pros And Cons Of Hacking

Submitted By
Words 1066
Pages 5
Syed Farook, one of the most deadly terrorists in recent time, recently killed many people in San Bernardino, California (Ahmed).In America there have been multiple shootings in the past year and the Federal Bureau of Investigation is trying to stop them by finding evidence and getting leads to stop future terrorists.The FBI has been investigating the San Bernardino attack because there main goal is to stop terrorism in America and make it a safer place and recently, the FBI acquired Syed Farook’s iPhone and is trying to unlock it ,but since the Apple Iphone is very secure with a six digit passcode it would take five and a half years long to unlock it at 12 tries a second (Guo).The FBI has asked Apple many times to help unlock the phone and they have denied every time and the FBI has brought it to court. This is a problem for the FBI because they could unlock the iPhone and find encrypted data, that would reveal much needed terrorist information. Apple should unlock the Iphone of the terrorist even though it violates his privacy because the Patriot Act allows the FBI …show more content…
According to the United States Department of State there were 11,774 terrorist attacks globally and that overall in the past decade terrorist attacks and mass shootings as a whole have increased and it will not stop soon unless every possible evidence is given to the FBI and other terrorist fighting agencies (“Study of Terrorism”).The FBI needs to have the evidence because fighting terrorism is one of their main investigative priorities and that they have been trying to unlock this phone for a while so they can ultimately make America a more safe place (“What we Investigate”). Also they should unlock the phone because thousands of innocent Americans over the years have died from shootings and attacks in the United

Similar Documents

Premium Essay

Microsoft

...Microsoft dominates the operating system market for microcomputers with its Windows operating system. Discuss the pros and cons this creates for computer users. Does the dominance of Windows make it easier or harder for you to use computers? I have only used Windows operating system on all my computers, therefore I am not familiar with any other operating systems. I would think because Microsoft dominates, that if you used a different operating system, it would be more difficult to find software with the system requirements to be compatible. Therefore, the opposite would be true if you used the Windows operating system, you could find more compatible software.1. Microsoft dominates the operating system market for microcomputers with its Windows operating system. Discuss the pros and cons this creates for computer users. Does the dominance of Windows make it easier or harder for you to use computers? The pros to the dominate Microsoft operating system is that most people that we come into contact with and discuss computers with will be using the same operating system as you. You will not have to explain how it works (simple tasks) and explaining to someone how to do something will be easier. The other big Pro is that as you upgrade or replace you computer, the worst problem you will encounter (with an operating system) is the newer version, i.e. window XP vs. Vista. from computer to computer they are basicly the same. I have found it quite helpfull when I go work on a friends...

Words: 837 - Pages: 4

Free Essay

Ethical Hacking

...Ethical Hacking Computer Ethics – CIS 324 Dr. Nelson Stewart June 7, 2013 INTRODUCTION When most people hear the term “hacker” they think of an evil person committing crimes by hacking into their computers to steal, destroy and/or steal identities. This is so in some cases, but not all hackers are bad. Hackers are merely curious technically skilled individuals who gain unauthorized access to computers, networks of various companies, organizations and individuals. Good hackers are considered white hat hackers. They are the ones that are hired to break into systems as a way of testing the vulnerabilities and security issues that may be present in the computer system. Bad hackers are considered black hat hackers. They are the “evil” hackers, or should I say “crackers” who hack into systems to steal identities, information, crack into software programs and create nasty viruses. What is Ethical Hacking? Ethical hacking provides a way to determine the security of an information technology environment – at least from a technical point of view. As the name ethical hacking already tells, the idea has something to do with hacking. But what does “hacking” mean? The word hacking has two definitions. The first definition refers to the hobby/profession of working with computers. The second definition refers to breaking into computer systems. While the first definition is older and is still used by many computer enthusiasts (who refer to cyber-criminals as “crackers”), the...

Words: 1280 - Pages: 6

Premium Essay

Are Social Networking Sites Beneficial to the Society or Not?

...Are Social Networking Sites Beneficial to the Society or Not? Social networking sites are great for our society, due to its promotion increased interactions and connection between millions of people throughout the world. I personally am in favor of social networking sites because it allows people to create new relations and reconnect with their friends and family members. In addition, the reputation of social networking sites such as FaceBook, Twitter, and Linkedln, more than doubled from year 2005 to year 2009. These sites allowed all users to develop their online profiles of their background and interests as well as share thoughts, photos, links, music, and more (are social sites…for our society?). However, many argue that social networking sites attract people to spend more time online and less time with face-to-face interactions. Also, opponents say that the social networking sites provide many time wasting activities which replace the productive activities. According to the article, Are Social Networking Sites Good or Bad for Our Society? Teens spend an average of nine hours per week on social networking sites. The opposition states that teens growing up with these social networking sites may not be aware that all the information and photos posted on these networking sites can be regained even after deletion. The opponents also states that the consequences of over-sharing personal information and photos can lead to vulnerability to sexual and financial predators. It can...

Words: 1418 - Pages: 6

Premium Essay

Support Electronic Voting

...Voting is a right that every citizen of the United States of America is entitled to as long as they are legally allowed to vote according to the constitution and as long as they are of legal voting age. Electronic voting machines can be both a pro and a con in my opinion. I will go ahead and start with the pros. a)Voters with dissabilities, such as poor vision can use the voice and audio systems in the machines for better voting aide. this is my opinion reduces the needed for many poll workers and hence savibg the country some money. And alos hand held devices for people that are not able to stand for the voting period. b)The machines are able to provide ballots in alot of different languages.The USA is populated with citizens from all over...

Words: 465 - Pages: 2

Free Essay

Videoconferencing

...Introduction Most of us live far from home? Right? Wouldn’t it be great to be able to see your families more often than not? Over the past few decades, technological advancements have changed our world. Communication between people has developed greatly over the past century. In the old days, communication was normally face-to-face. With new developments, worldwide videoconferencing can now take place. It doesn’t matter how the technology is used. Whether it’s a family talking to a loved one overseas, a couple in a long distance relationship or a businessman talking to a client; with the personal uses, business uses and the overall pros and cons of using the technology. It will be the new way of life. Communicating all over the world is virtually limitless. Transition: Having the ability to communicate with someone in a more lifelike manor is the major benefit to video conferencing but there are so many more for the average person. Main Point #1 Personal Benefits Benefits of Video Conferencing.com Timing On the Go, while running errands While at home, in comfort Last minute notice and need to explain something to a co-worker Long Distance Having face time with a loved one in Iraq or another home land Cost Effectiveness Saves money from traveling cross country or worldwide\ Transition: Even with all of the personal benefits, a company’s use of the technology is even more beneficial. Main Topic #2 Business Benefits Increase in Productivity ...

Words: 641 - Pages: 3

Premium Essay

Pros and Cons of Snapchat

... video chat and post 'stories' for their friends to view for 24 hours that automatically delete themselves shortly after being viewed. Pros • Snapchat is fast. Snapchat is the fastest way to share a moment with friends. Snapchat 's user control how long your friends can view your message and simply set the timer and send. • Snapchat allow you to draw on the pictures and stuff. Besides that, it allows you to add emoticon on your pictures and videos. • Prevents other snapchatters from screenshooting your picture. User will get notification whenever people who take a screenshot on your picture. • Snapchat prevents the risk of people hacking into it's servers, unlike some e-mail providers and other social media. • User can save down the videos and pictures so you can avoid missing your stuffs after 24 hours. Cons • The message will automatically be disappeared after you have viewed it, if you accidentally forgotten to reply , you would have to ask him/ her to send you again • Snapchat is designed so that all photos and videos will disappear after a predetermined amount of time set by the sender. In conclusion, Snapchat is a way to communicate faster among your peers, and that is has a simple interface design to make communication easier for the users. Snapchat is indeed a successful social networking application as it pros outweight the...

Words: 290 - Pages: 2

Premium Essay

Health Care

...system. Assess the issues that are being presented by the technology and evaluate the benefits against the issues. Before the computerized era started, patient’s health records were kept on paper or other non-sophisticated methods. Those color tabbed folders are still in place, but all the information contained in those folders now can be stored in electronic files utilizing huge memory banks and backup systems to protect this information. Everything can be saved and preserved for a very long time. Health information management (HIM) has become a main concern of all healthcare organizations, not only to stay with law compliance, but also to run a more efficient operation. The pros of keeping electronic record versus paper out weight the cons. The main con could be the possibility of someone “hacking” those records. However, that someone could also have access to the paper records and use them illegally. The important issue here is that these records must be kept for a number of years depending of the state and federal requirements (five years or more depending on the state). ACA and HITECH (Health Information Technology for Economic and Clinical Health) act have encouraged the widespread use of electronic records versus paper for obvious reasons. Now, HITECH act is designed to enforced HIPAA (Health Information and Accountability Act) standards, and prosecute major PHI (Protected Health Information) violations. These acts, rules and regulations are in place to protect patient’s...

Words: 472 - Pages: 2

Free Essay

Social Networking

...Social Networking A social networking service is a platform to build social networks among people who share common interests, activities, backgrounds or real – life connections. People create user profiles. Different countries have different names and sites. Such as American based sites are Facebook, Google +, LinkedIn, Instagram, Pinterest, vine, Tumblr and twitter. They are all used worldwide. Other countries have different names and different sites. Some examples of these are in Germany you have skyrock in Spain you have tagged and in Europe you have Myspace. When it comes to the history of social networking. Social networking began back in 1994-1995 most of the communities focused on bringing people together to interact with each other in different chat rooms. Some of these communities included: theglobe.com, and tripod.com. Some communities such as classmates.com took a different approach by simply having people link to each other via email addresses. In the late1990’s user profiles became a central feature of central networking sites. You were able to create a list of friends. By the end of the 90’s you were able to search and manage your friends list a little bit better. Myspace and LinkedIn began in 2003, by 2005 Myspace was visited more than google. In 2004 Facebook was launched. It was originally created for Harvard students. Then it was opened up to other universities and eventually opened up to everyone. In the year 2009 it became the largest social networking...

Words: 871 - Pages: 4

Premium Essay

Social Media

...Outline: 1. Social Media good or bad 2. It all started with AOL. a. Social media may very well be helping professionals network and new or existing businesses grow but are we willing to allow it to hinder the development of social skills and cause a new dangerous addiction? 3. Professional a) Pros: Job hunting, networking, latest and greatest in your field b) Cons: Companies with policies, distractions from work, not having a “filter” or restrictions 4. Personal a) Pros: Communication with family, meeting new and old friends, new ideas and activities b) Cons: Hacking and virus', permanent postings, addiction 5. Children a) Pros: Be computer literate, connection with family members, accepting of diversity b) Cons: Face-to-face time lost, less playing outside, college/job interference 6. Education, moderation, self control Social Media: Does it Do More harm than Good? It's hard to believe social media started in 1985. Quantum Computer Services Inc., which later becomes America Online Inc. launched its first online service, Q-Link, according to Washingtonpost.com. Shortly after in 1989 Instant Messenger and the greeting "Welcome! You've got mail" debuted. However, the AOL that most of society recalls didn't become available until 1995. This is the stepping stone for My Space, facebook, and Twitter. Social networking sites have grown so popular today that many individuals, especially teenagers, reference them in...

Words: 1167 - Pages: 5

Premium Essay

Bus 508 Ipad Security Breach

...IPad Security Breach Kimberly Parker Dr. Brenda Harper The Business Enterprise- BUS 508 Strayer University May 25, 2011 Hacking a Website A group of expert hackers breached Eidos Montreal website which disclosed information of more than 25,000 email addresses along with more than some 350 resumes dated May 13, 2011. The details of the incident were reported by the company as "Square Enix who could verify that several hackers gained entry to portions of Eidosmontreal.com website along with several of the merchandise locations. Our company immediately removed the sites to further investigate the incident of what other information had been compromised. After a lengthy and thorough investigation, our company began to take the necessary precaution to safeguard the safety of these and of all our websites, before permitting the sites to go on-line again"(Square enix confirms data lifted in website raids • the register ). Nonetheless, data related with online e-commerce transactions and credit cards was available but not associated with the website. Similarly, many applicants have applied for recent job openings at the studio, their resumes were also stolen, revealing educational background, home address and contact numbers. However, the organization claimed that only email addresses were stolen. The businesses did however, verified that individual email addresses were also taken. However, the organization...

Words: 1946 - Pages: 8

Premium Essay

Wireless Technologies Proposal

...Technologies Proposal Learning Team B Jessica L Jones, Christina Valdez, Kathy Moles, & Steven Goodwin Table of Contents * Page 2 * Table of Contents * Page 3 * The problem * The proposed changes * The pros and cons of proposed changes * Page 4 * Justification of decision * Page 5 * The risks involved * The costs * Conclusion * Page 6 * References Wireless Technologies Proposal To: President of Party Plates From: Sales Department of Party Plates Date: February 6, 2012 Subject: Wireless Technologies Proposal The problem: Party Plates currently uses a wired local area network to access the Internet. This requires each desktop and laptop computers be connected to the network via Ethernet cables. Party Plates supplies certain employees with company financed mobile phones. However, the current phones have minimal functions. The proposed changes: An upgrade to a wireless local area network (WLAN) would offer Party Plates several benefits. Providing smart phones instead of current phones to the employees would also be valuable. With smart phones the employees would have several functions at their disposal that would make them more efficient. The pros and cons of proposed changes: Incorporating wireless technologies into any business has advantages and disadvantages. For Party Plates, the wireless technologies that the sales department would like to incorporate are mobile devices, like cell...

Words: 888 - Pages: 4

Premium Essay

Infosec Career

...help from many of my colleagues and friends in the field, I have endeavored to compile a comprehensive blog about starting an InfoSec career. This is a very lengthy blog broken into sections that may help people as parts or as a whole. We want you to succeed in our field. As always, please feel free to ask questions or leave comments / gripes / suggestions. Chapter 1: The Fundamentals  Unfortunately, for all the interminable hacking tool tutorials and security guides floating around the internet, many InfoSec job candidates haven’t grasped two fundamental concepts: * To hack something (or defend it from hacking), you must have a solid understanding of how that thing works. And, * InfoSec is not a career that can be put in a box once you go home from work or school. You must be passionate enough about the field to be continually learning and aware of quickly changing current events. If you want a career that you can forget about once you go home at 5:00 PM, InfoSec is probably not the right choice. The really intriguing thing about InfoSec and hacking in general is how they draw heavily from knowledge of all sorts of IT subjects. It’s difficult to understand attacks,...

Words: 11232 - Pages: 45

Premium Essay

Bis 220 Final Paper

...Party Plates want their services readily available, convenient to their customers, and to remain productive; then they may consider the use of wireless devices to compete with other businesses that supply the same services. Mobile services allow Party Plates as well as their customers to access information real-time while connecting from mobile devices and other computing environments. Whether Party Plates use mobile devices or remain in its current position, we are recommending mobile computing and mobile commerce as wireless services to move Party Plates into the future. The pros and cons of each service are listed within this proposal. Mobile computing refers to real-time wireless connection between a mobile device and other computing environments, such as the Internet. These days it is spreading everywhere, at work, at home, in education, health care, entertainment, and in so many other areas. The pros of mobile computing is its mobility to take a small hand held device and go anywhere and its broad reach to just about anywhere instantly [ (Rainer & Cegielski, 2011) ]. Mobile commerce is just like e-commerce in that we can conduct business transactions the same way with our wireless devices such as smart phones, internet, smart cards, and other devices. This can attract many new customers because of the availability of doing business anywhere we are with our devices [ (Rainer & Cegielski, 2011) ]. The down side of both Mobile computing and Mobile commerce is the...

Words: 619 - Pages: 3

Free Essay

Open and Closed Source Software

...Open Versus Close Source Software Tristan San Juan 03/17/2015 POS/355 Brian Davis Open versus Closed Source software? Which is better? There are many questions behind which software is better. There are literary many pros and cons on both of the soft wares. It comes down to the users’ limitation and preferable on which one is to use. Some people have both and use them for different reasons. As you read on we going to clarify some features on each kind of software to further explain the difference between the two kinds of software. Closed source Software, most users are going to be familiar with this. Windows, Adobe (Photoshop), Norton Anti-Virus and Mac OS are very fine example of what closed software are. In definition a closed software or aka a proprietary software is, “any software that is copyrighted and bears limits against use, distribution and modification that are imposed by its publisher, vendor or developer. Proprietary software remains the property of its owner/creator and is used by end-users/organizations under predefined conditions ("Proprietary Software", 2015).” Meaning it is what it is you cannot edit it in source code level, I mean you can hack it but most likely as users who doesn’t know anything about coding will most likely break it. One of the biggest sign when people see closed source software is it cost money, yes it does and you pay for what you get. Some of the benefits of having a closed source software is that is one its reliable quality...

Words: 942 - Pages: 4

Free Essay

Social Networking

...10 Pros and Cons of Social Networking: It allows people to create new relationships, keep old ones with family and friends and strengthen relationships through easy communication. | Social Networks encourage people to spend more time on them then face to face contact. Also have various time wasting things such as games. | It allows for creativity in a new way. Such as through free messaging, photo updates, blogging, games for anyone to see who has access to the sites. | People do not know that thing s they post such as texts and photos can be retrieved after they have been deleted. Sexual predators could find posts or pictures or even staff which could be embarrassing. | Allows people with similar interests to connect. Also exposes you to new ideas. Also helps thoughs who struggle talking face to face to communicate via internet. | Social Media sites have no way to verify who the person says they are and who they actually are. Such as sexual predators can make any profile and no one will know about them. | Can help you receive help across the world, such as finding a job, car or house or even experts across the world to assist you. | Cyber bullying is common. Victims experience depression, drop in grades and suicide. | It can also be used to discuss educational topics, such as where to study or school projects or topics. Teaches state it has helped improved reading, resolution skills, and to express themselves clearly. | There can also be damaging information released...

Words: 580 - Pages: 3