Hacking

.docx

School

University of Maryland, University College *

*We aren’t endorsed by this school

Course

321

Subject

Information Systems

Date

Dec 6, 2023

Type

docx

Pages

12

Uploaded by justinbucelato

Report
Hacking is the activity of identifying weaknesses in a computer system or a network to exploit the security to gain access to personal data or business data. An example of computer hacking can be: using a password cracking algorithm to gain access to a computer system. Computers have become mandatory to run a successful businesses. It is not enough to have isolated computers systems; they need to be networked to facilitate communication with external businesses. This exposes them to the outside world and hacking. System hacking means using computers to commit fraudulent acts such as fraud, privacy invasion, stealing corporate/personal data, etc. Cyber crimes cost many organizations millions of dollars every year. Businesses need to protect themselves against such attacks. A Hacker is a person who finds and exploits the weakness in computer systems and/or networks to gain access. Hackers are usually skilled computer programmers with knowledge of computer security. Type of Cybercrime The following list presents the common types of cybercrimes: Computer Fraud: Intentional deception for personal gain via the use of computer systems. Privacy violation: Exposing personal information such as email addresses, phone number, account details, etc. on social media, hacking a websites, etc. Identity Theft: Stealing personal information from somebody and impersonating that person. Sharing copyrighted files/information: This involves distributing copyright protected files such as eBooks and computer programs etc. Electronic funds transfer: This involves gaining an un-authorized access to bank computer networks and making illegal fund transfers. Electronic money laundering: This involves the use of the computer to launder money. ATM Fraud: This involves intercepting ATM card details such as account number and PIN numbers. These details are then used to withdraw funds from the intercepted accounts. Denial of Service Attacks: This involves the use of computers in multiple locations to attack servers with a view of shutting them down. Spam: Sending unauthorized emails. These emails usually contain advertisements.
What is Ethical Hacking? Ethical Hacking is identifying weakness in computer systems and/or computer networks and coming with countermeasures that protect the weaknesses. Ethical hackers must abide by the following rules. Get written permission from the owner of the computer system and/or computer network before hacking. Protect the privacy of the organization been hacked. Transparently report all the identified weaknesses in the computer system to the organization. Inform hardware and software vendors of the identified weaknesses . Why Ethical Hacking? Information is one of the most valuable assets of an organization. Keeping information secure can protect an organization’s image and save an organization a lot of money. Fake hacking can lead to loss of business for organizations that deal in finance such as PayPal. Ethical hacking puts them a step ahead of the cyber criminals who would otherwise lead to loss of business. Legality of Ethical Hacking Ethical Hacking is legal if the hacker abides by the rules stipulated in the above section on the definition of ethical hacking . The International Council of E-Commerce Consultants (EC-Council) provides a certification program that tests individual’s skills. Those who pass the examination are awarded with certificates. The certificates are supposed to be renewed after some time. Summary Hacking is identifying and exploiting weaknesses in computer systems and/or computer networks. Cybercrime is committing a crime with the aid of computers and information technology infrastructure. Ethical Hacking is about improving the security of computer systems and/or computer networks. Ethical Hacking is legal.
What Devices Are Most Vulnerable to Hackers? Many different devices are vulnerable to cyber hackers, but some of the most common include: Computers – Common computer systems like laptops and PCs are prime targets for hackers due to the vast amount of personal and sensitive information they contain, such as financial data, login credentials, and personal documents. Computer systems are particular targets of cyber attacks on a commercial and enterprise level, given the value of assets associated with them. Mobile Devices – Mobile devices such as smartphones and tablets are also at risk of being hacked, as they often store sensitive information, including personal photos, messages, and emails. They can be particularly susceptible to hackers when using public Wi-Fi and shared networks. Internet of Things (IoT) Devices – IoT devices such as smart home appliances, security cameras, and even medical devices are common targets for hackers. These devices are often poorly secured and typically hacked to gain access to personal information or even to control the device remotely. Network Routers – Network routers, responsible for distributing Wi-Fi signals, are often targeted by hackers. Hacked routers provide a means to gain access to entire networks of devices, enabling hackers to access sensitive data and valuable digital assets. ATM Machines – Bank ATMs are also vulnerable targets to hackers motivated by financial incentives, as many ATMs often operate on outdated software and may be connected to an unsecured network. Flaws in card reader technology can also be used as a means of cyber hacking. Additional devices vulnerable to cyber hackers that are often overlooked are things like internet-connected security cameras and IP cameras, smart TVs and smart appliances, and even baby monitors . It's critical to acknowledge that any device connected to the Internet is potentially susceptible to hacking, so it's important to take necessary precautions to ensure your technology is protected with whatever means possible. Effects and Impact of Hackers Hackers can have significant effects and consequential impacts on individuals, businesses, and even entire countries, regions, and municipalities. Here are some of the most common effects of hacking at large. Financial Loss – Hackers that breach bank accounts can steal money or commit fraud, leading to substantial financial loss for individuals or businesses. The damages hackers introduce to computer systems can also result in costly repairs.
Identity Theft – Hackers have been known to hijack sensitive personal information, such as birth dates, Social Security numbers, addresses, and credit card numbers, to maliciously commit various cyber crimes that fall under the category of identity theft. Data Breaches – Data breaches are one of the most detrimental forms of hacking, especially when data gets leaked to malicious parties. With these attacks, hackers can gain unauthorized access to confidential or sensitive data, like financial records, medical records, or intellectual property. Disruption of Services – In a hacked computer or network, the immediate outcome disrupts the normal function of websites, computer systems, or entire networks. Not only does this disrupt standard operations, but it can damage critical infrastructure. Cyber Espionage – Hackers can steal valuable information, such as government data, confidential information, or sensitive trade secrets, to gain a competitive advantage with political interests and foreign affairs or by putting national security at risk. Spread of Malware – The creation and distribution of malware, such as viruses or ransomware, are common ways for hackers to infect and damage computer systems, steal data, or demand ransom payments from organizations or individuals. The impact of hackers can range from minor inconveniences to major disruptions. That's why individuals and organizations must take steps to prevent and mitigate the effects of hacking. All-Time Historic Hacks Although the sheer volume of hacking cases reaches the tens of thousands annually, a few monumental hacks stand out in history as the most damaging and impactful. PlayStation Network Hack Sony PlayStation's gaming network was hacked in 2011, resulting in an epic case that impacted 77 million consoles and almost a month-long shutdown on the gaming system's network. Although they never identified the hacker responsible for the data breach, Sony estimated $171 million in financial losses from the incident. DoD and NASA Hacks In 1999, a teenager hacked into NASA's computer networks and the Department of Defense (DoD). The hacker downloaded software from NASA
that was valued at $1.7 million. While this historic hack against two of the most prominent U.S. governmental organizations had little damaging impact overall, the teenager's actions resulted in NASA's networks shutting down for three weeks. Yahoo Data Breach In 2013, Yahoo encountered two hacking incidents that resulted in one of the largest data breaches in history, impacting over 3 billion user accounts. The breach was executed by four Russian agents that were recruited through a hacker-for-hire scheme. While the breach affected billions of accounts, the biggest concern involved targeted attacks on high-profile U.S. Intelligence officials, opening the door to potential cyber espionage. How to Prevent Hackers There are many ways that individuals and organizations can effectively protect their digital assets from hackers. For individuals looking to prevent hackers from hacking personal computers and devices, several cybersecurity best practices can be employed. Maintain strong, complex passwords – According to UC Santa Barbara Information Technology , the longer a password is, the better. Whenever possible, use at least 16 characters. Set up multifactor authentication – In addition to a strong password, include a layer of security protection using two-factor or multifactor authentication . Install antivirus and anti-malware software – Software programs that detect and remove viruses and malware are essential in protecting your computer system and ensuring your data is safe. Stay alert about suspicious emails – Avoid clicking questionable links or opening attachments to emails you don't recognize. Minimize your online footprint – While not always applicable to certain individuals, reducing the amount of information available about you online can make you less of a target to hackers. Avoid public Wi-Fi networks for personal or financial data Never use public Wi-Fi to access sensitive personal accounts, like bank accounts, online wallets, or trade accounts where financial exchanges occur. Backup your computer – Backing up your data is critical to quickly recovering in the instance hackers do succeed in hacking your computer. Properly dispose of electronic devices – Make sure to properly erase and dispose of old computers and devices that may have contained personal information and login credentials.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help