Hacking and Prevention
Essay Preview: Hacking and Prevention
Report this essay
Hacking and PreventionZachery B. LivelyLone Star College-KingwoodEnglish 1302ABSTRACTThis essay is about the hacking crimes that are happening in today society and how we are working to make reasonable solutions to stop these things from happening. Hacking crimes are happening around the world, but more importantly they are happening right in your friendly coffee shop, grocery store, even outside of your house. Anywhere there is a Wi-Fi connection (which everyone canât seem to live without) there is a way for the hacker to get into your personal information. There are many way to prevent these types of thing from happening. You can make sure your phone doesnât have its Wi-Fi on, password protect your accounts, as well as many other options. As time goes on so do the intelligence of the hackers. Now a days all the hacker needs to do is walk by you with a special machine and he or she can steal your credit card info without even touching you. In todayâs world hacking has become somewhat of a big problem. Back in the day these âhackersâ didnât have the tools that they have today. People have devoted their life to hacking, some have even gone as far as to join groups such as the vast group called âAnonymousâ. Calling themselves âHacktivistsâ because they are trying to get people to see the flaws of government. When really all they are doing is violating laws and taking information that isnât for them to see. These hackers have come so far as to use a common Wi-Fi source to hack anyoneâs computer that uses the same free Wi-Fi. Not only do they hack your computer but some in some cases people have been found in airports stealing credit card info just by walking close to you. They can use a machine to magnetically steal the info right from your card. There are many ways people have tried to stop hackers from getting in to their system, but the best way to stop hackers is to use a strong Fire wall.        Even though there have been improvements on securing information there are still a few problems that hackers exploit. One of the many ways to exploit the computer is to use and method called âDDoSâ. DDoS is a type of DOS attack where multiple compromised systems, which are often infected with a Trojan, are used to target a single system causing a Denial of Service (DoS) attack. âMany observers think of DDoS attacks as requiring major bandwidth resources, in the hands of âBlack Hatâ (malicious) hackers, in order to mount. However, as Anonymous has proved with LOIC, several hundred usersâ minor bandwidth can be married together to stage a wide-band DdoS attackâ(Gold, 2013). Basically what gold is saying is that the hackers have found a way to do more with less. They can make a big cyber-attack off smaller bandwidthâ when everyone thought they would need a very large one. Another problem a hacker can exploit is the fact that a computer cannot think. âone way is to âtrickâ a computer by using someone elseâs code, leading the computer to give access to the unauthorized userâ(Sharaby Oct 2011). That is a major way that they can get into information that they arenât supposed to. They basically tell the computer to give them the passwords they need to get into where they need to be. The last major way that hackers get into our systems is by placing Trojans onto our computers threw ads on the internet. Basically what a Trojans does is it get through your system by acting as something it is not. Most of the time these Trojans will appear on you internet web page as an Ad, and it can be an Ad for anything as long as you click on it the Trojan will get into your system. How can they do this? It is a technique called Cross-Site Scripting and it âis a vulnerability in a web application that occurs when input is taken from a user and not properly sanitized before it is processed by the userâs browserâ(Bowles, 2012). All of these are many of the ways hackers can get into your computer, whether itâs from exploiting the internet or its DDoS, and can steal your information.        Again there are many solutions to stop hacking, but the main way to do so is to use what is called a Firewall. Basically a Firewall is a program or device that acts as a defense to keep malicious elements out of a network or specific computer. Firewalls are developed in hardware and software with specific criteria to block or prevent unauthorized access to a network. This is the thing that is going to make it harder for the hacker to penetrate your computers defense. He or she will not be able to put the Trojan into your computer because the Firewall will notice that there is something wrong with the code in that Trojan and will alert you that it tried to get in and will also deny the malicious virus access to the computer. âThese profilers are used to train the statistical models, so that they can recognize unusual behavior when it occursâ (Tarran, 2014). These profilers Tarran is referring to are within the Firewall. These are the things that point out the bad code trying to get in. Basically without a Firewall your computer and or systems are very susceptible to being hacked.
Essay About Hacking Crimes And Wi-Fi Connection
Essay, Pages 1 (928 words)
Latest Update: July 5, 2021
//= get_the_date(); ?>
Views: 101
//= gt_get_post_view(); ?>
Hacking Crimes And Wi-Fi Connection. (July 5, 2021). Retrieved from https://www.freeessays.education/hacking-crimes-and-wi-fi-connection-essay/