Preview

Computer Memory Hacking

Good Essays
Open Document
Open Document
820 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Computer Memory Hacking
Computer Memory Hacking

Computer Memory Hacking
Rebecca M. Shepherd
CIS 106 Intoduction to Information Technology
Professor Dima Salman
Stayer University
November 23, 2014

Computer Memory Hacking

Hacking of memory or hacking of RAM describes when a person or person(s) gains unauthorized access to the RAM (random access memory) of a computer system. There a couple of reasons that one might participate in hacking the memory of a computer system. One reason that a person may attempt to gain unauthorized access to a computer is simply to demonstrate that they are capable of doing so. By demonstrating this skill, the hacker (the person gaining unauthorized access) has shown that the security of the computer system can be penetrated. This is often useful when the owner of the computer system wants to ensure its security is optimal.
Another reason a person or person(s) would want to access a computer systems RAM without the owners permission would be to gain information from that computer system. That information may or may not include personal data such as names, addresses, telephone numbers, email addresses, credit card information, account numbers, and other pertinent information that thieves could use to gain financially.
Hackers use many tools and techniques to penetrate the security of the computer system that they choose to attack. Some techniques can include dns spoofing, packet sniffers, social engineering, and trojan horses. DNS spoofing occurs when the hacker changes the DNS entry on a server and redirects the browser to an alternate site. This method is often used to steal usernames, passwords, or other personal information. Packet sniffers were originally designed for administrators to debug their systems. They are devices that intercept and interpret packets of information crossing a network. Social engineering is the method of obtaining personal information and network information through



References: Best Practices for Employees to Protect the Company From Hackers. (n.d.). Retrieved from  http://www.entrepreneur.com/article/237174  Best Practices for Protecting Critical Business Data. (n.d.). Retrieved from  http://www.ittoday.info/Articles/Protecting_Critical_Business_Data.htm  Target Breach: 8 Facts On Memory­Scraping Malware. (n.d.). Retrieved from  http://www.darkreading.com/attacks­and­breaches/target­breach­8­facts­on­memory­scraping­m alware/d/d­id/1113440  Who Are Hackers ­ A Hacker 's Tools Of The Trade | Hackers | FRONTLINE | PBS. (n.d.).  Retrieved from http://www.pbs.org/wgbh/pages/frontline/shows/hackers/whoare/tools.html

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Computer Misuse Act

    • 277 Words
    • 2 Pages

    Consequences of the Act if broken (perhaps look for a real life example) An example of computer misuse is the when a group of hackers hacked Apple taking peoples usernames and passwords taking control of their accounts. This group is called Anonymous can be able to hack into any site or company to promote the companies flaws. But this can be fatal to taking people’s money if they use Apples costumer’s usernames and passwords to corrupt and take money out of their accounts causing money loss to Apple and their customers.…

    • 277 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    - Display any information which enables others to gain unauthorised access to computer material including instructions for gaining access, computer codes or other devices which assist hacking.…

    • 1135 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Computer hacking is when a person can steal information that people provide on the internet for various types of reasons. It is never recommended to put all of your information on the internet unless it is a secured and trusted website. A hacker can hack into your system, and steal whatever information is provided to them such as account numbers, or credit card information, even social security thefts for illegal purposes.…

    • 339 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Properly investigate computer crimes. Computer crime is defined as any person that violates any Of the provisions of the following; unauthorized access to a computer system, Theft of computer…

    • 2776 Words
    • 12 Pages
    Better Essays
  • Better Essays

    Computer Hacking

    • 2149 Words
    • 9 Pages

    Computer hacking is one of the biggest crimes in all over the world today. Hacking began in the sixties when MIT students gained control of the school’s mainframe and over the central processing unit and deleted programs. They also used hacking in wars to hack into predator’s machine and change things like times (Harmless Hacking, 2006). When hackers learned about flaws in security systems and found that they could hack into big cooperation’s accounts and bank systems and take money hacking kept growing from there (Bavisi, J 2006). Every day all over the world hacking continues to increase…

    • 2149 Words
    • 9 Pages
    Better Essays
  • Good Essays

    Yadhu Khatri Professor Wilson ENGL 1301 23 June 2013 Computer Hacking: is it an acceptable?…

    • 1042 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Cyber Espionage

    • 3589 Words
    • 15 Pages

    Cyber espionage:- Definition:- Cyber espionage (also spelled cyber espionage) “ | involves the unauthorized probing to test a target computer’s configuration or evaluate its system defenses, or the unauthorized viewing and copying of data files.…

    • 3589 Words
    • 15 Pages
    Powerful Essays
  • Powerful Essays

    The Past, Present and Future of Computer Hacking Abstract Society relies heavily on technology for many things, but our use of technology opens us up to become victims of cybercrimes, like computer hacking. Hackers can be divided into three main categories: novice, intermediate, and elite. Hacking has been in the information technology (IT) field for a while. The first hackers appeared in the nineteen sixties and hackers have continued to make progress since then. People hack for a variety of reasons including ego, fun, knowledge, and profit. The first major hacking program, SATAN, caused controversy in 1995, and numerous hacking programs exist today. The future of hacking looks bright because people will only continue to rely even heavier on technology and as the IT field expands, so will the hacking community.…

    • 1915 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    Online Identity Theft

    • 6864 Words
    • 28 Pages

    a large enough corpus that they can successfully impersonate another individual. Frequently such identity-theft is used to obtain financial benefit through…

    • 6864 Words
    • 28 Pages
    Powerful Essays
  • Good Essays

    Different Computer Users

    • 857 Words
    • 4 Pages

    Hackers, rule breakers and criminals spend most of their time remotely breaking into other computers. The word hacker is synonymous with Internet crimes, but most people overlook the fact that they are highly intelligent individuals with a vast knowledge of computers. They spend their time trying to break through security systems of various networks connected to the Internet. There have been infamous hackers who have penetrated through the CIA database and others into credit card companies. These people stay up for hours looking for codes and passwords for various systems on the Internet in the hopes of obtaining some valuable information. There are actually many websites dedicated to this past time which educates the general public as well as new hackers to the game. They know how the computers operate and are usually very familiar with programming languages, so they…

    • 857 Words
    • 4 Pages
    Good Essays
  • Better Essays

    ANS: T 8. IP spoofing is a form of masquerading to gain unauthorized access to a Web server.…

    • 4079 Words
    • 17 Pages
    Better Essays
  • Better Essays

    ISM Workshop

    • 1008 Words
    • 5 Pages

    Computer security refers to the methods and practises that are employed by employees to protect private resources in a computer system from being accessed, modified or deleted (Gollmann 2010). Many industries implement strict computer security measures. This may include installing physical locks on doors, security cameras, security guards, and emergency protocols in the occurrence of a flood or fire. Firewalls, varying levels of access privileges, and data encryption prevent the interference of data that is stored or accessed on a computer. The United States’ Computer Security Act of 1987 requires federal departments to provide training to employees to teach knowledge workers these skills, as the emergence of communications devices and technologies has made most industries vulnerable (Whitman 2010, 194). Schell discusses how a lack of computer security in US Government programs has led to the exposure of sensitive military communications and strategies (2013). This is in contrast to Information security, which encompasses computer security in addition to physical, operations, communications and network security in an information system (Whitman 2010, 4). The CNSS security model provides a framework of desirable attributes of a secure information system, which includes confidentiality, integrity and availability (Whitman 2010, 4).…

    • 1008 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    essay

    • 466 Words
    • 2 Pages

    Premium2602 Words11 Pages Computer Crime Hackers and Security Measures from Research Assistance Abstract A diffuse group of people often called "hackers" has been characterised as unethical, irresponsible, and a serious danger to society for actions related to breaking into computer systems. In this essay I try to construct a picture of what is and includes a computer crime as well as a por…

    • 466 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Body: When someone hacks a computer or network system, it's typically for one of three main reasons:…

    • 1778 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    What Really Is a Hacker?

    • 424 Words
    • 2 Pages

    wrong. Hacking would cease if there was References: Consulted Internet. http://www.ling.umu.se/~phred/hackfaq.txt Internet. http://www.jargon.com/~backdoor Internet. http://www.cyberfractal.com/~…

    • 424 Words
    • 2 Pages
    Good Essays