Sunday, December 8, 2019
Essay About Hacking Computer Example For Students
Essay About Hacking Computer o Hacking in it self is not a crime. It is otherwise known as unauthorised access. o There are clubs devoted to hacking. In Germany, Holland etc, discuss techniques etc. o Much of hacking is treated as intellectual training. Costs us a lot of expenses to protect our computers. Companies spend millions of pounds protecting themselves. o A lot of hacking done by past employees seeing as they have passwords etc. insiders knowledge. o At one level the motive for the doing is the challenge. o Software comes with default user names and passwords which make it easy for the hacker to access. o FRAUD. Large companies employ hackers to access enemys hackers and to test companies system. o Electronic crime is low risk high yield. The banks are not keen on publishing they have been fucked. o Credit cards stolen then used for hackers own use. (Fraudulent purchase) o Theft of data. Industrial espionage. Breaking into factory and seeing how things are made. Plans for future products, contact lists etc. IDENTITY THEFT, a criminal can take over someone elses identity. This can cause a lot of damage. Someone has passed themselves off as David Blunkett, blind MP. o data can be stolen by illegally hacking into a computer and downloading data and or by stealing an actual computer (laptop) dont access someones password from their computer, take out the hardisk and plug it into your computer. The files on the CIAs computers are encrypted. o When accessing the net, you download files that you know nothing about, paedophilia etc. o FRAUD ON THE INTERNET, one of the weaknesses of the net is the lack of control; it is not controlled by any one person. o Goods can be offered for sale but never delivered, fraud. o Offers downloads, pays for it and never gets the goods. o There are certain schemes which provide some assurance. o Sites that you hand out your credit card number should have SSL Secure Socket Layer. This encrypts data at my end and at the other so that no nosey hackers can access it. The URL also starts with http, and a closed padlock at the bottom of the screen, which shows the site is secure. o In the UK, reputable web-sites may have the Which (consumer service) logo on the site. o VIRUS, now can spread much faster than in previous years. The biggest distributor of viruses is email not floppy anymore. ORIGINATION programmer creates programme to cause mischief and or distress. TRANSMISSION often the virus is attached to a normal program. It then copies itself to other software on the hard disk. You can in theory track down the origin of the virus, IP address etc. INFECTION there are virus that are bollocks and others that completely mess up your computer. BIOS chip can be erased, therefore causing you to buy a new motherboard. The worst ones cause subtle destruction. Over a period of months the virus messs up your work and can cause of bankruptcy. This can also affect hospitals and anywhere that uses a computer system. o LOGIC BOMBS similar to a virus, may be delivered by a virus. o Can be written to destroy, or even subtly alter the contents of a computer system. o May require a further signal for activation o May require a further signal to prevent activation, as in case of extortion o Sometime may cause companies to hand over money. o Many organisations would not want to have the shitty security exposed. For example banks etc, however secret service etc doesnt give a monkeys and will expose the hacker. o DIGITAL CRIMES computer misuse act of 1990: o 1. unauthorised access to computer programs or data o 2. unauthorised access with a further criminal intent o Software copyrights. Covered by copyright designs and patents act of 1988 o It is illegal to run pirated software. It is illegal to create a copy blalbalbalbala. .u7340c52af06d5647ac707b28cc65b43c , .u7340c52af06d5647ac707b28cc65b43c .postImageUrl , .u7340c52af06d5647ac707b28cc65b43c .centered-text-area { min-height: 80px; position: relative; } .u7340c52af06d5647ac707b28cc65b43c , .u7340c52af06d5647ac707b28cc65b43c:hover , .u7340c52af06d5647ac707b28cc65b43c:visited , .u7340c52af06d5647ac707b28cc65b43c:active { border:0!important; } .u7340c52af06d5647ac707b28cc65b43c .clearfix:after { content: ""; display: table; clear: both; } .u7340c52af06d5647ac707b28cc65b43c { display: block; transition: background-color 250ms; webkit-transition: background-color 250ms; width: 100%; opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #95A5A6; } .u7340c52af06d5647ac707b28cc65b43c:active , .u7340c52af06d5647ac707b28cc65b43c:hover { opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #2C3E50; } .u7340c52af06d5647ac707b28cc65b43c .centered-text-area { width: 100%; position: relative ; } .u7340c52af06d5647ac707b28cc65b43c .ctaText { border-bottom: 0 solid #fff; color: #2980B9; font-size: 16px; font-weight: bold; margin: 0; padding: 0; text-decoration: underline; } .u7340c52af06d5647ac707b28cc65b43c .postTitle { color: #FFFFFF; font-size: 16px; font-weight: 600; margin: 0; padding: 0; width: 100%; } .u7340c52af06d5647ac707b28cc65b43c .ctaButton { background-color: #7F8C8D!important; color: #2980B9; border: none; border-radius: 3px; box-shadow: none; font-size: 14px; font-weight: bold; line-height: 26px; moz-border-radius: 3px; text-align: center; text-decoration: none; text-shadow: none; width: 80px; min-height: 80px; background: url(https://artscolumbia.org/wp-content/plugins/intelly-related-posts/assets/images/simple-arrow.png)no-repeat; position: absolute; right: 0; top: 0; } .u7340c52af06d5647ac707b28cc65b43c:hover .ctaButton { background-color: #34495E!important; } .u7340c52af06d5647ac707b28cc65b43c .centered-text { display: table; height: 80px; padding-left : 18px; top: 0; } .u7340c52af06d5647ac707b28cc65b43c .u7340c52af06d5647ac707b28cc65b43c-content { display: table-cell; margin: 0; padding: 0; padding-right: 108px; position: relative; vertical-align: middle; width: 100%; } .u7340c52af06d5647ac707b28cc65b43c:after { content: ""; display: block; clear: both; } READ: Into The Depths Of A Black Hole Essay Summary o
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.