Tuesday, June 4, 2019

The Problems And Solution Of Hacking Computer Science Essay

The Problems And Solution Of Hacking Computer Science EssayIts crystal swooning that hacking is one of the famous topics that the daily 80 million user of the World Wide Web search for, as whenever you type the word hacking on or so(prenominal)(prenominal) search engine about 165,000,000 results appear only in a about 0.08 of a second. The English word hacking means re-configuring of a system to run away in ways not served by the possessor, which is probably illegal. Hacking doesnt only break away on hacking another calculator, or someones account on social networks, however it eject be hacking banks, websites, companies, etc.. . The biggest problem is that the great unwashed do and cant be stopped by either government or IT companies is that people hack softw be and things without them knowing as a lot of people daily download software, music, movies, and games for free from random websites and its now considered a normal thing to do. On the other hand, what people dont kn ow is that NOTHING FOR FREE, although these random websites give the people software and music for free, but when you click DOWNLOAD the owner of the website provide easily know your IP Address and based on it he can hack your computer check your private files, take software, photos and a lot of things which will beget for the owner of the personal computer a lot of problems in the future. Simply hack writers seek to gain unauthorized access to computers to steal what we have stored on our computers, such as credit card numbers, bank account details, address books or other personal, financial or business selective information. The problem is how to book people stop hacking? criterion B The IT background of HackingHacking is a very complicated method of accessing someones personal computer in an illegal method. There are 4 types to access those computer first Port Scanners second Malicious Programs third Vulnerability Scanners last but not least(prenominal) Password cracking. Computer cracking can inculpate port scanners. Port scans have some uses, as they test your firewall security and they scan random blocks of internet addresses once they find unprotected one. the malicious hacker may decide to enter your PC. Hackers use viruses such as Trojan horses and root kits, viruses, and worms to invade systems. Trojan horses they are designed to appear as a game or video but while downloading videos or games it automatically download Trojans which allow the hacker to gain access of the computer. A rootkit is a trance of software that can be installed in a similar way to a Trojan and hidden on the computer without the knowledge of the owner. Attackers may be able to access information, monitor the actions of the owner, modify programs, or perform other functions on the computer without being detected. A virus is a program that unceasingly makes a lot of viruses and spreads copies of itself to all the programs and software and the computers in the same networ k. A worm is also a self-replicating program, it can spread copies of itself to other computers. It may extend random viruses as Trojans and much more, which allows the hacker to ruin the security of the computer and the anti-virus so he can enter the pc easily. The hacker will make note of the site, return at a later time, and hack into the network to search for vulnerabilities. A password cracking program guesses users passwords, whereas a sniffer program watches information passing through the Internet. The aim of using these computer hacking programs is to obtain usernames and passwords for unauthorized access.Criterion C The impact of HackingHacking effects can be categorized into collar types effects on individuals, organizations, economy and effects on countries. The most important issue to recognize is that victims are the only ones who feel the threat and effects of hacking attacks, and our responsibility is to inform other people about the danger of hacking to be cautio us and alert which helps in preventing hacking attacks from happening. Based on some banks they state that there some people whom their individual information was sold and was used for bad purposes, and when they focused on the psychology of those people after they are hacked, they found out that they will always have the fear of being watched when they accesses internet , as their privacy has been penetrated. According to researches credit card details and passwords can be stolen causing financial damage to individuals added to that computer systems can be hacked causing the machine to stop working which will make people stop using e-banking. Companies and organizations arent safe to a fault as Hacking caused and still causing till the moment bankruptcy to plenty of companies, thats because companies are being hacked plenty of times which leads to the loss of customer confidence or belief in the security capabilities of the comp some(prenominal). One of the big problems is that so me companies hire hackers to hack competitor systems to steal precious information. Last but not least, some countries train hackers to hack other countries systems to damage their economy or to know their security news.Criterion D Solution to the problem arising from HackingHow to make people stop hacking? This is the first thing comes to anyones mind when he thinks of solutions for people to stop hacking. First countries should be role models for their citizens by stopping hacking other countries systems or at least dont make it so clear that they do it. Then they can make advertisements everywhere to encourage people to put Firewalls to prevent access to their computer from the outside, so that only those that they give permission to can connect to their system from the Internet. Effective and secure firewalls also ensure outbound control, watching for and preventing a Trojan, spyware or any other program from communicating out of their computer, unless they provide permission. G overnments should encourage people to counter password cracking or sniffing, change Use complex passwords and make sure to change them on a regular basis, and operating system and other software should be patched as soon as updates are released. Maintaining the most new-fangled versions of software and operating systems will help block hackers from getting through any vulnerability. All their computers should be running the most recent version of an anti-virus program. The program should be set for automatic updates to ensure the latest virus, worm and Trojan definitions. After doing so some hackers will give up so at least 60% will stop and the rest will be threatened by serious legal punishments.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.