preview

Computer Memory Hacking Essay

Decent Essays

Computer Memory Hacking

Computer Memory Hacking
Rebecca M. Shepherd
CIS 106 Intoduction to Information Technology
Professor Dima Salman
Stayer University
November 23, 2014

Computer Memory Hacking

Hacking of memory or hacking of RAM describes when a person or person(s) gains unauthorized access to the RAM (random access memory) of a computer system. There a couple of reasons that one might participate in hacking the memory of a computer system. One reason that a person may attempt to gain unauthorized access to a computer is simply to demonstrate that they are capable of doing so. By demonstrating this skill, the hacker (the person gaining unauthorized access) has shown that the security …show more content…

Trojan horse programs are often referred to as the “back door” to computer systems. They are usually installed into the

Computer Memory Hacking

computer system by the owners in belief that they are something else such as a game, application, or video. Once installed this gives the hacker access to the computer system.
Another method not previously mentioned is RAM scraping. This method of hacking uses a form of malware inside a POS (point of sale) system. The most recent and quite popular hacking attacks were using this method. Both Home Depot and Target stores were businesses that were subjected to this kind of hacking.
There are several things that individuals and business can do to protect themselves from being vulnerable to hackers. Authentication, authorization, encryption, and auditing can be used individually or layered to create protection for a computer system. By applying multilevel authentications, it makes it more difficult for a hacker to get into the system. Setting different authorizations based on roles and responsibilities will limit the access to different parts of the system. All data should be encrypted before being copied or stored to help deter hacking. By reviewing logs regularly, accountability for access to the system can be enforced and any breaches detected. User can also protect information by installing/updating virus protection, verifying web addresses when visiting websites, and never providing login information to

Get Access