The internet has become the important part of the world; from instant messages through communicating, and emails, banking, travelling, studying and shopping, internet has touched every aspect of life. With the increasing use of the internet by people, protecting essential information has become a necessity. A computer that is not having appropriate security controls can be affected with malicious logic and thus any type of information can be accessed in moments. Number of affected Web Pages and malicious websites can be seen every day that affects the computer and allow hackers to gain illegal access to other computer systems.
Hacking of personal important data, network outages, computer viruses and other cyber related threats affect our lives that range from minor inconvenience to serious incidents. Cyber threats can be caused due to negligence and vulnerabilities, or unintentional accidents. Nevertheless, they can also be planned or intentional, like hacking or access by unauthorized users. The main objectives of such type of system attackers or hackers are to steal confidential information, to make illegal monetary transactions, to destroy or to change data and the like. System attackers can be terrorists, crackers or recreational hackers. They have a variety of tools that can harm or infect the computer; usually they use malicious logic or virus to gain unauthorized access to a computer. Opening email attachments that carry the virus, clicking malicious links or
Each year there are many attempts to illegal gain entry into networks by attackers to steal information. Some attacks are designed to steal information while other may be to attack a system to cause damage or disrupt services. Attack can happen from anywhere in the world due to the internet and networks. A person from China can hack into an American network or such Stuxnet virus attack on Iran nuclear power plan which thought to be from Israel or United States but it is unsure where the virus originated from. According to Merkow & Breithaupt (2006), viruses caused the greatest financial loss over other computer crimes, (p 142). Worm is a type of virus which replicates and can easily infect a machine and then spread out across the network by using transport features of the computer or network.
The article "The Internet: A Clear and Present Danger?" written by Cathleen Cleaver is a clear claim of the necessity of government regulation to control what is being shown on the Internet. To support her claim, Cleaver gives the pornographic web sites as an example. She argues that the regulations used to control the selling of pornography applied to porn stores, magazines, and television should also be applied to the Internet. The reason for such necessity is that it is impossible to control who is actually accessing such web sites. Following this reason, Cleaver's main claim in the article is that children can access pornographic web sites on the Internet. This claim is clearly stated by
New types of Internet-related crimes have emerged. threats to individuals, also called personal cyber-crime, is to illegally obtain the identity of electronic individuals, such as their e-mail and password, and also extend to e-impersonation. For example, dragging images and important files from the victim's device to threaten them and subject them to orders. Also, threat to Property This type of crime targets government, private and personal entities. For instance, destruction of important files or proprietary software, through malicious programs transmitted to the user's device in several ways, notably e-mails. Likewise, there are threats that target governments - hacker attacks on official government websites and network systems. To eliminate or destroy the infrastructure of the site or network system, these attacks are often politically targeted.in addition to that, Political threats that focus on targeting the military positions of some countries to steal information related to state security. To emphasize, Spyware by sending programs to the computer to obtain confidential military
The purpose of this paper is to touch on the issue of Hacking. It will go into detail about the history, evolution, future and prevention of Hacking. In addition, this paper will discuss different types of hackers and their motivation behind hacking. This paper examines the major impact caused by malicious hackers and give modern examples of such attacks. To conclude, it will predict how hacking will be in the near future and give the precautionary measures Information Security professionals can take to mitigate the risk of being victimized.
Linton (2011, p.44) stated that hacking of network of common users and attacking their personal computers is one of the most threatening problems at present. It is happening in every second that results in a loss in several ways like loss of credentials, personal information etcetera. Although the use of personal computers and the internet has been increased rapidly, numbers of users who are the expert and have good knowledge to tackle the matters are very rare. In addition, time, as well as required equipment to protect hacking, is also very.
There are many threats today that can compromise the security of a network. Network security is now more important as ever as attacks on networks that hold valuable information are being breached, even with security measures put in place. One of the biggest threats to a network is data theft. Outside hackers pose the greatest threat. These thieves target a company’s network and steal information through vulnerabilities that they have found in their networks. They usually gain access through the use of a Trojan horse, which is a program that looks legitimate but can be used by others to gain access to the network. They may also use a virus or worm, which can infiltrate a network with malicious code and replicate itself in a network. Others try to gain entry by attempting to crack the network passwords or user accounts.
Abstract — We have studied 4 security incidences which highlight the issue of computer security by providing information about the vulnerabilities in these incidences and what should be done to prevent such attacks. All these security incidences are based on the concepts and techniques we learnt during the Computer Security course which increased our understanding and eagerness to explore more on these topics.
Prevalent to the current trend now is the dependency of the society on Information technology and communication systems. Every aspect of human life is one way or the other linked and controlled by information technology tools. The importance of information technology cannot be over emphasized as its unavailability could lead to a form of disaster or the other. Pivotal infrastructures like finance, healthcare, education and security are driven by information technology. However, information technology and its benefits are accompanied by vulnerabilities and risks that can be exploited by people with the necessary technical skills. Individuals like ‘Hackers’ and ‘Cyber Terrorist’ can cause disruption to information systems, commit financial fraud and also attack computers and networks. These attacks and disruptions could result to violence against people and properties. In some cases, death, serious injuries and severe economic loss could occur as a result of these attacks.
The Internet is a technology that has negative impacts on our daily lives. It has changed aspects of our life for the last 50 years, and it has demonstrated the considerable influence on people’s lives. Almost 3.2 billion people in the world use the internet. The Internet has gained acceptance across the globe, and it has also become a reason behind the critical changes in the modern society. Some of the changes are social isolation, health disorder, lack of privacy and internet addiction.
The internet is a medium that is becoming progressively important as it makes information available in a quick and easy manner. It has transformed communications and acts as a global network that allows people to communicate and interact without being limited by time, boarders and distance. However, the infrastructure is vulnerable to hackers who use the system to commit cyber crime. To accomplish this, they make use of innovative stealth techniques for their malicious purposes in the internet.
Computer crime which can be also referred to as a cybercrime, e – crime or a hi-tech crime. Computer crime can be termed as an event which is dome by a computer user who is sometimes referred to as a hacker. The hacker is mainly involved in some sort of activity which can be termed as an illogical activity by means of which browsing or stealing the information of the private company or individual are obtained with the intention of personal benefits which can be obtained from the prospective of the hacker (Ezeano et al., 2017). In some cases, it can be seen that the group of people or individual may be malicious and destroy or to be precise corrupt the computer and the files which are stored in the system. There is different type of crimes which are performed on a variety of platform which impact a varied sectors and a varied audience. The main way to conduct the crime is the use of a network and a computer system. In some cases, it has been noted that the use of computers has been used to commit the crime, and on other cases it is seen that the main target of the attack is the computer of the user (Mazurczyk, Holt & Szczypiorski, 2016).
Internet safety has been an extensive issue for children and adolescents since accuse to the Internet has become readily available in homes. With Internet use increasing at such rapid rates and a large proportion of adolescents using the Internet daily, the awareness of Internet safety should be addressed. The term Internet safety can be defined as “the knowledge of maximizing an individuals safety to private information, and self protection from using the Internet”. The impact and influence that the Internet has on adolescent life is far-reaching and research findings by Norris (2007) indicate that one-quarter of the American youth that go online at home, do so in the privacy of their rooms. Additionally, with the recent trend of wireless connections there has been a profound expansion in private Internet usage. The diverse means by which adolescents are using the Internet has become coupled with inherent risks of unsupervised and uneducated use.
In today's Internet world, Internet security seems to be considered an outdated idea. Instead of making security a priority, technology companies see it as an added way, not as a security measure. This can be referred to now there are many unsound places in the construction of Internet security. But at the same time, some technology companies and the government set special legal restrictions on them, but also can reflect its sound aspects.
The popularity of internet and its technologies increase day by day and so are the threats to the security of our information transmitted through the internet. The unauthorized or illegal access of the data or tampering of data is very high. In order to provide security of data being accessed by unauthorized people, information security is required [1].
Hacking in the world of Information and Communication Technology (ICT) is defined as the process of getting unauthorized access to the technical details of a computer such as, programs, applications or the entire computer system. Hacking is performed to improve the system capabilities or to manipulate its normal functions. People who are engaged in this practice are known as “Hackers” (777, 777, 888, 888).