logo

Information Security and System Analysis 2022

   

Added on  2022-10-11

6 Pages1283 Words12 Views
Running head: INFORMATION SECURITY AND SYSTEMS
INFORMATION SECURITY AND SYSTEMS
Name of the Student:
Name of the University:
Author Note:

INFORMATION SECURITY AND SYSTEMS1
Table of Contents
Analysis of the motivations behind hacking..............................................................................2
Analysis of hacking techniques..................................................................................................2
Analysis of evolution of hacking...............................................................................................3
Evaluation of Malware cycle.....................................................................................................3
Evaluation of moral issues faced by the white hackers..............................................................4
References..................................................................................................................................5

INFORMATION SECURITY AND SYSTEMS2
Analysis of the motivations behind hacking
In reference to the digital world, along with the rise of technological innovations as
well as the internet of things, the hackers are highly being motivated by the following main
reason (Ablon & Libicki, 2015). The reasons behind the motivation of hackers are,
i) Curiosity- some hackers may opt for the techniques of hacking in order to feed
their curious behavior regarding the working of the as well as the understanding of
a specific device along with the working of a specific network.
ii) Bragging- some of the amateur hackers may opt for the techniques of hacking in
order to hold a higher reputation among their group of friends in regard to such a
deed.
iii) Financial gain- taking help from the techniques of hacking, can get the specific
hacker with some sort of financial gain from that particular organization or
company.
Analysis of hacking techniques
In the past decade, the various methods of ethical hacking along with the procedure of
penetration testing by selective experts working within this field dealing with that of cyber
security (Cayubit et al., 2017). Some of the newly utilized techniques of hacking are,
i) Phishing- referred to one of the most dangerous hacking techniques, which utilizes
a similar looking website where the user puts the credentials and in turn gets
hacked by the hacker.
ii) Malicious code or virus- hackers consist of the potential to crawl right into any
website and leave by affecting the database of the same website with viruses that
affect the sensitive information directly linked with that of the website.

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Information and System Security Assignment 2022
|10
|2522
|12

Cybercrime: Motivations, Consequences, and Current Defence
|9
|3137
|159

Hacktivism: A New Form of Hacking with Political Motives
|9
|2963
|30

Cyber Security: Vulnerabilities, Exploitation, and Security Controls
|10
|2384
|453

Report on Information Security Counter Measures and Solutions
|14
|4978
|51

Cyber security : Assignment PDF
|5
|1139
|160