Computer hacking and the hacker subculture.
Holt, T. J. (2020). Computer hacking and the hacker subculture. The palgrave handbook of international cybercrime and cyber deviance, 725-742.
This article discusses computer hacking and the hacker subculture. There are different ways that people with interest in hacking view themselves in the larger society. Computer hacking is identifying weaknesses in a computer, computer applications, or even network, exploiting the security to gain unauthorized access to personal information or business data. There are different types of computer hacking; some are complex, while others are simple. For instance, they are using cracking algorithms for passwords to gain computer access. Businesses and organizations depend on computers to run smoothly. For more efficiency, computers need to be networked for organizational communication instead of isolated. Due to the connection of these computers, they are exposed to outside attacks and hacking.
Holt, T. J. (2020). Computer hacking and the hacker subculture. The palgrave handbook of international cybercrime and cyber deviance, 725-742.
This article discusses computer hacking and the hacker subculture. There are different ways that people with interest in hacking view themselves in the larger society. Computer hacking is identifying weaknesses in a computer, computer applications, or even network, exploiting the security to gain unauthorized access to personal information or business data. There are different types of computer hacking; some are complex, while others are simple. For instance, they are using cracking algorithms for passwords to gain computer access. Businesses and organizations depend on computers to run smoothly. For more efficiency, computers need to be networked for organizational communication instead of isolated. Due to the connection of these computers, they are exposed to outside attacks and hacking.