Hacking
.docx
keyboard_arrow_up
School
University of Maryland, University College *
*We aren’t endorsed by this school
Course
321
Subject
Information Systems
Date
Dec 6, 2023
Type
docx
Pages
12
Uploaded by justinbucelato
Hacking
is the activity of identifying weaknesses in a computer system or a
network to exploit the security to gain access to personal data or business
data. An example of computer hacking can be: using a password cracking
algorithm to gain access to a computer system.
Computers have become mandatory to run a successful businesses. It is not
enough to have isolated computers systems; they need to be networked to
facilitate communication with external businesses. This exposes them to the
outside world and hacking. System hacking means using computers to
commit fraudulent acts such as fraud, privacy invasion, stealing
corporate/personal data, etc. Cyber crimes cost many organizations millions
of dollars every year. Businesses need to protect themselves against such
attacks.
A
Hacker
is a person who finds and exploits the weakness in computer
systems and/or networks to gain access. Hackers are usually skilled
computer programmers with knowledge of computer security.
Type of Cybercrime
The following list presents the common types of cybercrimes:
Computer Fraud:
Intentional deception for personal gain via the use
of computer systems.
Privacy violation:
Exposing personal information such as email
addresses, phone number, account details, etc. on social media,
hacking a websites, etc.
Identity Theft:
Stealing personal information from somebody and
impersonating that person.
Sharing copyrighted files/information:
This involves distributing
copyright protected files such as eBooks and computer programs etc.
Electronic funds transfer:
This involves gaining an un-authorized
access to bank
computer networks
and making illegal fund transfers.
Electronic money laundering:
This involves the use of the computer
to launder money.
ATM Fraud:
This involves intercepting ATM card details such as
account number and PIN numbers. These details are then used to
withdraw funds from the intercepted accounts.
Denial of Service Attacks:
This involves the use of computers in
multiple locations to attack servers with a view of shutting them down.
Spam:
Sending unauthorized emails. These emails usually contain
advertisements.
What is Ethical Hacking?
Ethical Hacking is identifying weakness in computer systems and/or
computer networks and coming with countermeasures that protect the
weaknesses. Ethical hackers must abide by the following rules.
Get
written permission
from the owner of the computer system
and/or computer network before hacking.
Protect the privacy of the organization
been hacked.
Transparently report
all the identified weaknesses in the computer
system to the organization.
Inform
hardware
and
software
vendors
of
the
identified
weaknesses
.
Why Ethical Hacking?
Information is one of the most valuable assets of an organization.
Keeping information secure can protect an organization’s image and
save an organization a lot of money.
Fake hacking can lead to loss of business for organizations that deal in
finance such as PayPal. Ethical hacking puts them a step ahead of the
cyber criminals who would otherwise lead to loss of business.
Legality of Ethical Hacking
Ethical Hacking is legal if the hacker abides by the rules stipulated
in the above section on the definition of ethical hacking
.
The
International Council of E-Commerce Consultants (EC-Council)
provides a
certification program that tests individual’s skills. Those who pass the
examination are awarded with certificates. The certificates are supposed to
be renewed after some time.
Summary
Hacking is identifying and exploiting weaknesses in computer systems
and/or computer networks.
Cybercrime is committing a crime with the aid of computers and
information technology infrastructure.
Ethical Hacking is about improving the security of computer systems
and/or computer networks.
Ethical Hacking is legal.
What Devices Are Most Vulnerable to Hackers?
Many different devices are vulnerable to cyber hackers, but some of the most
common include:
Computers –
Common computer systems like laptops and PCs are
prime targets for hackers due to the vast amount of personal and sensitive
information they contain, such as financial data, login credentials, and
personal documents. Computer systems are particular targets of cyber
attacks on a commercial and enterprise level, given the value of assets
associated with them.
Mobile Devices –
Mobile devices such as smartphones and tablets are
also at risk of being hacked, as they often store sensitive information,
including personal photos, messages, and emails. They can be particularly
susceptible to hackers when using public
Wi-Fi
and shared networks.
Internet of Things (IoT) Devices –
IoT
devices such as smart home
appliances, security cameras, and even medical devices are common
targets for hackers. These devices are often poorly secured and typically
hacked to gain access to personal information or even to control the
device remotely.
Network Routers –
Network routers, responsible for distributing Wi-Fi
signals, are often targeted by hackers. Hacked routers provide a means to
gain access to entire networks of devices, enabling hackers to access
sensitive data and valuable digital assets.
ATM Machines –
Bank ATMs are also vulnerable targets to hackers
motivated by financial incentives, as many ATMs often operate on
outdated software and may be connected to an unsecured network. Flaws
in card reader technology can also be used as a means of cyber hacking.
Additional devices vulnerable to cyber hackers that are often overlooked are
things like internet-connected security cameras and IP cameras, smart TVs
and smart appliances, and even
baby monitors
. It's critical to acknowledge
that any device connected to the Internet is potentially susceptible to
hacking, so it's important to take necessary precautions to ensure your
technology is protected with whatever means possible.
Effects and Impact of Hackers
Hackers can have significant effects and consequential impacts on
individuals, businesses, and even entire countries, regions, and
municipalities. Here are some of the most common effects of hacking at
large.
Financial Loss –
Hackers that breach bank accounts can steal money
or commit fraud, leading to substantial financial loss for individuals or
businesses. The damages hackers introduce to computer systems can also
result in costly repairs.
Identity Theft –
Hackers have been known to hijack sensitive
personal information, such as birth dates, Social Security numbers,
addresses, and credit card numbers, to maliciously commit various cyber
crimes that fall under the category of identity theft.
Data Breaches –
Data breaches are one of the most detrimental
forms of hacking, especially when data gets leaked to malicious parties.
With these attacks, hackers can gain unauthorized access to confidential
or sensitive data, like financial records, medical records, or intellectual
property.
Disruption of Services –
In a hacked computer or network, the
immediate outcome disrupts the normal function of websites, computer
systems, or entire networks. Not only does this disrupt standard
operations, but it can damage critical infrastructure.
Cyber Espionage –
Hackers can steal valuable information, such as
government data, confidential information, or sensitive trade secrets, to
gain a competitive advantage with political interests and foreign affairs or
by putting national security at risk.
Spread of Malware –
The creation and distribution of malware, such
as viruses or ransomware, are common ways for hackers to infect and
damage computer systems, steal data, or demand ransom payments from
organizations or individuals.
The impact of hackers can range from minor inconveniences to major
disruptions. That's why individuals and organizations must take steps to
prevent and mitigate the effects of hacking.
All-Time Historic Hacks
Although the sheer volume of hacking cases reaches the tens of thousands
annually, a few monumental hacks stand out in history as the most
damaging and impactful.
PlayStation Network Hack
Sony PlayStation's gaming network was hacked in 2011, resulting in an epic
case that impacted 77 million consoles and almost a month-long shutdown
on the gaming system's network. Although they never identified the hacker
responsible for the data breach, Sony estimated $171 million in financial
losses from the incident.
DoD and NASA Hacks
In 1999, a teenager hacked into NASA's computer networks and the
Department of Defense (DoD). The hacker downloaded software from NASA
that was valued at $1.7 million. While this historic hack against two of the
most prominent U.S. governmental organizations had little damaging impact
overall, the teenager's actions resulted in NASA's networks shutting down for
three weeks.
Yahoo Data Breach
In 2013, Yahoo encountered two hacking incidents that resulted in one of the
largest data breaches in history, impacting over 3 billion user accounts. The
breach was executed by four Russian agents that were recruited through a
hacker-for-hire scheme. While the breach affected billions of accounts, the
biggest concern involved targeted attacks on high-profile U.S. Intelligence
officials, opening the door to potential cyber espionage.
How to Prevent Hackers
There are many ways that individuals and organizations can effectively
protect their digital assets from hackers. For individuals looking to prevent
hackers from hacking personal computers and devices, several cybersecurity
best practices can be employed.
Maintain strong, complex passwords –
According to
UC Santa
Barbara Information Technology
, the longer a password is, the better.
Whenever possible, use at least 16 characters.
Set up multifactor authentication –
In addition to a strong
password, include a layer of security protection using two-factor
or
multifactor authentication
.
Install antivirus and anti-malware software –
Software programs
that detect and remove viruses and malware are essential in protecting
your computer system and ensuring your data is safe.
Stay alert about suspicious emails –
Avoid clicking questionable
links or opening attachments to emails you don't recognize.
Minimize your online footprint –
While not always applicable to
certain individuals, reducing the amount of information available about
you online can make you less of a target to hackers.
Avoid public Wi-Fi networks for personal or financial data
–
Never use public Wi-Fi to access sensitive personal accounts, like bank
accounts, online wallets, or trade accounts where financial exchanges
occur.
Backup your computer –
Backing up your data is critical to quickly
recovering in the instance hackers do succeed in hacking your computer.
Properly dispose of electronic devices –
Make sure to properly
erase and dispose of old computers and devices that may have contained
personal information and login credentials.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help