Preview

Hacking

Better Essays
Open Document
Open Document
625 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Hacking
HACKING

The incredibly fast development of the Internet has brought many benefits both to consumers and businesses.
However, it has also provided criminals or misguided individuals with great opportunities for crime or 'mischief'.
The Internet is not only used by innocent members of the public, but also by fraudulent traders, software pirates, hackers and con-artists, to name but a few.

A hacker is a person who breaks codes and passwords to gain unauthorized entry to computer systems.
Hackers can do an enormous amount of damage if they break into a computer system.
For some people, the challenge of breaking the codes is irresistible and so precautions have to be taken.
Stand-alone computers are usually safe as there is no connection for the hackers to break into. Computers which form part of networks or those with external links, such as attached modems, are in danger from hackers.
Many hackers often don't intend to cause damage or steal data, they just enjoy the challenge of breaking into a system. However, in some instances the hacker's purpose could be to commit fraud, to steal valuable data or to damage or delete the data in order to harm the company.
It might be hard to believe, but most hacking is carried out by employees with a grudge or those who want to 'make a quick buck'. They have insider knowledge of passwords and User IDs which makes it easy for them.

Data Theft

Data is often the most valuable resource any business has. The cost of creating data again from scratch can far outweigh the cost of any hardware or programs lost.
Physical theft or unauthorized access is the means of data theft.
Loss of data from hacking can have various consequences, some of which can be seen below.

Physically protecting systems

Businesses can use a range of physical methods to protect their systems and data.
Some of these include:
- Keeping important computers such as servers or mainframes in locked rooms
- Posting security guards

You May Also Find These Documents Helpful

  • Good Essays

    That is why most big businesses have hired individuals that do what hackers do, which is to find gaps or spaces in an organisations or a person’s security and report the problem or at least fix/repair the space before it gets into the hands of worse hackers, very similar as to what Uber has done recently, which was that they paid a couple of hackers to delete their own stolen data on 57 million people. This is against the law…

    • 1232 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Unit 1 Assignment Q A

    • 592 Words
    • 2 Pages

    Any good hacker will always leave some sort of a backdoor into the system. This allows for easy access…

    • 592 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Nt1310 Final Exam

    • 393 Words
    • 2 Pages

    The Motives Behind Hacking: Vandalism, Public Interest, Reveal Wrongdoing, Financial Gain, As a Protest, The Challenge (fun).…

    • 393 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Nt1310 Unit 3 Essay

    • 1872 Words
    • 8 Pages

    There are cybercriminals who commit crimes using the computers and networks. They spread malicious viruses through the networks such as worms and Trojan horses. They hack other people's computers to steal important data and identity or destroy data. A hacker uses a packet sniffer to intercept the unencrypted network traffic and capture the passwords or other important information which was communicated through the network. Botnet or a Zombie computer is a computer which a hacker uses to spread viruses and to commit cybercrimes while the owner of the computer is unaware of it.…

    • 1872 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    Tim J. Watts goes more into the dark side of the “hacker” community by bringing up the constant back in forth between computer security officers and the so called hackers. This article, being written this year is able to reflect on the events of September 11, 2001 and new homeland security measures. He represents this viewpoint of a dangerous hacker in his definition: “While some hackers are harmless, others break into systems with the intent to steal information or to do destruction to the system. Hackers performing the latter pose a serious threat to the economic future of the United States” (Watts). Tim Watt outright blames the hacker community of accessing information that should be private. Only looking and reflecting on the serious threat…

    • 154 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Hacker: An individual who enjoys breaking systems or software without causing harm, presumably with the intent to better understand and improve security.…

    • 413 Words
    • 2 Pages
    Good Essays
  • Good Essays

    To elaborate, according to the article the government frequently encounters cyberattacks, ranging from groups like Anonymous, to more severe groups like Russian hackers Guccifer 2.0. Additionally, most of the hacks come from China and Russia and have had success with breaching security through a tactic called phishing. By sending links disguised as company or personal emails, hacker groups can easily infect computers with malware and other viruses. Although the hacks have mostly been targeted to gain unleaked and classified material, the capability for hacks with more severity is real.…

    • 445 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    A Description of Computers

    • 1084 Words
    • 5 Pages

    It is easy to hack into a computer system. Types of computer Mainframes-biggest They are the most powerful They are very large VERY expensive They are used in BIG businesses-banks, insurance companies.…

    • 1084 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Hacking into a computer is not allowed as it can disrupt the business as personal information can be stolen and also be used in crime, this can cause a problem in the businesses finance sector.…

    • 1633 Words
    • 7 Pages
    Good Essays
  • Good Essays

    hacktivists

    • 370 Words
    • 2 Pages

    Hackers have been around for a very long time. Hacks can range from disrupting websites, cracking data bases and releasing untold amounts of sensitive or private data. There are two different types of hackers, white hats and black hats. White hats are hackers that help prevent people that are on the other side of the law. Some white hats were once black hats that may have been caught and decided to work with government agency’s such as the FBI rather than go to jail. Black hats are hackers that hack for things such as personal gain or to simply disrupt or gain access to information that they want. Almost all hackers have an alias or a handle such as Dark Dante or C0mrade.…

    • 370 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Computer Crimes

    • 679 Words
    • 3 Pages

    a thrill to figure out how to break into a computer. Most people never have any…

    • 679 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Hacking

    • 4142 Words
    • 17 Pages

    their pursuit of information, so are we. The thrill of the hack is not in…

    • 4142 Words
    • 17 Pages
    Good Essays
  • Satisfactory Essays

    Computer Hacking

    • 306 Words
    • 2 Pages

    I believe that computer hacking is a very serious problem. Hackers tap into other users networks and completely invade their privacy. Hackers steal essential and personal information and take advantage of the user that they have invaded. Even if the results of someone hacking into another users network turns out to be for the better, punishment should still enforced.…

    • 306 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Imagine yourself going into the bank to get money out of your account for your rent or other important bill, and the account is dry and you just got paid the day before..or going to pay a bill with your credit card and card after card is maxed out then you find out that someone has stolen all your information and used all of your resources to live and pay bills. If this happened to me my heart would be beating so fast in panic id probably pass out considering I have so many kids to provide for. Well it happens everyday to people everywhere all over the world. One of the major problems causing this is called hacking which is defined by the company who created the website the free dictonary dot com, Houghton mifflin company, as to gain access to a computer file or network illegally or without authorization. It is a big problem not just here but in other countries as well.One incident id like to mention is the playstation store being hacked into…

    • 521 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Hacking is unauthorized access to a computer system intentionally releasing computer viruses, according to (Baase 2008). Hacking remains one of the largest forms of theft with millions of dollars being stolen yearly. Hacking, for many early years did not have such negative impact on our society or was not taken as serious as it is today. Hacking in earlier years…

    • 1662 Words
    • 7 Pages
    Better Essays