logo

Hacking and Unauthorised Access

   

Added on  2021-06-17

5 Pages1343 Words68 Views
Running Header: HACKING AND UNAUTHORIZED ENTRYName Institution Date
Hacking and Unauthorised Access_1
HACKING AND UNAUTHORIZED ENTRY2Hacking and Unauthorized entryHacking or unauthorized entry is considered as unsanctioned endeavor to circumvent the security mechanisms of a network or information system. This takes place when an attacker gains access of controlled computer without the permission of the owner of the computer. Hacking is considered illegal since it has been regarded as a form of entering and breaking when done by “black hats hacker.” In most of the jurisdictions across the world, consider hacking as anoffence if they use unlawful entry to get access into private data files in personal computers (Wagenknecht, & Korn, 2016). Law on conviction punishes one when found guilty of hacking. The penalty of hacking varies from minor case to more extreme financial hacking cases with a bigger sentence. The consequences of hacking can be severe similar to the victim of the attack can be severe since it comprises theft of identity, fraud and invasion of privacy. However, hacking can be prevented or contained by putting the following measures in place Installing firewall to prevent intrusion Deployment of IDS to detect intrusion when about to happen Update of software as companies keeps improving by removing their vulnerability Two blog entries on the aspect of hacking and unauthorized entry. Blog entry one Computers are transformed into zombies by hackers by use of small applications that exploit operating systems (OS) vulnerabilities. One may tend to think that these hackers are sophisticated cybercrimes masterminds, however, in reality knowledge to software development or experience. Mostly people refer these hackers as script kiddies since they show no proficiencyand are young in writing codes or scripts (Ienca, & Haselager, 2016). Researchers who track botnets argues that these hackers utilize poorly and primitive applications. Regardless of ham-handed strategy, these soft wares do what hackers plans to do and turn computers into zombies. Hackers first installs the program into the victim in order to infect a computer. There are various methods that an attacker can achieve this and it can be through peer to peer networks email or through a normal website. Mostly, attackers disguise their malicious software with either a name or file extension that the victim may think is getting something which is entirely different. Attacker’s device new ways to deliver new program as users become perceptive regarding internet attacks (Taylor, Fritsch, & Lieder Bach, 2014). For instance, sometimes attackers uses “No Thanks” button. It is advisable not to click on these buttons since they are mostly decoys. Rather than dismissing these annoying pop-up ads, they activate download of malicious programs. Blog entry twoAuthorized intrusion of computer networks is referred as hacking. Hackers are the persons who are involved in hacking. Hacker alters security features or system to accomplish a
Hacking and Unauthorised Access_2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Computer Crime: Definition, Correlation, and Criminal Activity
|6
|1263
|88

IS Security and Risk Management Assignment PDF
|10
|3410
|84

Understanding SQL Injection, Insider Attacks, and Malware Threats for Enhanced Cybersecurity
|7
|2711
|157

Security Concerns of Ransomware
|13
|2895
|140

Ethical Hacking and Defence - TCP Port Scanning with Nmap
|14
|3439
|108

Wireless Network Technology and Preventive Techniques
|12
|2757
|322