write an essay on Social Media Hacking and ways to prevent it.
Answers
Explanation:
Different kind of hacking attacks are considered as computer crimes. The following is the list of crimes which are committed frequently:
Password Hacking.
Hackers find a way to illegally hack into the passwords of users of federal bureau, banks in order to gain benefits from them.
Network intrusions.
Malicious Trojan, worms and viruses to gain access into the information systems.
Cheat.
Illegal use of people identities such as credit card details.
Software piracy.
Illegal copying and use of software
Viruses.
Viruses, Trojan horses and worm cause the computers to become more vulnerable and susceptible to hardware damage.
IP address spoofing.
Disguising the IP address and using that to gain illegal access into countries most confidential files.
Money Laundering
Illegally acquiring funds through the manipulation and falsification of financial statements and illegal transactions.
Data-modification.
The modifying all the data.
Smuggling of files.
Gain illegal access of confidential files including bodies like military/government networks, communication systems, power grids, and the financial community
Pipkin lists a number of hacking attacks that are most commonly used in breaking system and causing disruption and damage for services. These attacks can be summarized as following [10]:
Software piracy is a criminal offense. Many hackers have indulged in making copies of software and selling them to gain profits on their own. The companies who develop these software will have to bare all the losses only because of someone who is illegally misusing software. Stealing confidential files through illegal access of the companies most confidential files. Hackers have many such motives, few of them like denial of services to the user and to make hardware conflict, making unwanted popup, causing trouble, terrorism.
Answser :
In today the internet and Web technologies have been highly honored. Perhaps there still seems to be a dark side of the internet world that has emerged and bedeviled this technological era. This importantly involves spam, malware, hacking, phishing, attacks, click fraud and so on and so forth. The responses to these effects of the internet have included technologies and various legislation, public awareness efforts etc. Thus in this report we intend to discover the major threat of environment, the taxonomies of the major causes and costs involved in attacks and their responses to it. We would as well try to discover the possible prevention methods of these attacks.
INTRODUCTION
In this era internet and web technologies have transformed the world completely. The world of internet has three basic concept that is compared to human life: the good, bad and ugly. The good in the world of internet are all of the benefits of the internet and the maximum use of it in people’s life. The bad associated with technology is damage to a business or institution and others using it. These includes spam, viruses, hacking and others that majorly damage the computer and corrupt all the files and documents stored in the systems. The worst that is ugly is considered to be something that is outside the box of law, privacy violation and things linked to online behavior. It should be observed that much of things associated with dark side of the internet and technology are all illegal and unethical. The dark side must be dealt with appropriately so that the world can change for good. The only to prevent the online systems is to be much more careful about contents received and make it tolerable as this cannot be avoided completely. This prevention methods can be bifurcated into two parts one being technology-centric and the other being non-technology centric. These non-technologic centric is related to rules, regulation, legislation, civic action and etc. It has been observed that not much research has been done considering the dark side of technology and the security systems.
Understanding hacking is refers mainly to break into others computers. It seems to be very simple to be used but once our computer has been hacked our life becomes difficult as our privacy gets violated. The technology has grown to an extend were people can now very easily break into our computer or systems without any physical access or opportunity given to them to the target computer. The people involved in hacking are called as hackers and there are few hackers who just hack as it being their hobby or to show off their skills in relation to technology. There are few hackers who hack in order to gain access to sensitive data’s and eventually destroy them causing major loss for the company or business.
Prevention of Threats
It is understood that there are two ways of successful attacks one of which is delivery of malware and the other one is hidden execution of malware. These are generally the attacks that we have covered, but it is as well important for us to understand how hacking is done.
As stated earlier it is impossible to prevent hacking but definitely can try to our level best to maintain privacy. It is ideally important to monitor threat quite frequently and analyze the risk. This is one such way of preventing -environmental attacks.
Secondly enhancement of security awareness must be created and updated. This also includes website protection, monitoring of threat and as well as application for security testing. These would help prevent the delivery of attacks and be more cautious towards protecting data’s.
Lastly one of the effective method found is to be host and network anomaly detection, as well as a program of incident response.
How is hacking done?
This question arises in every individuals mind. How is hacking done. As said previously people who hack are highly intellectual in technical background. They often work towards weak authentication or defects in famous software’s in order to break into computer systems. The software’s include windows operating systems, SQL based database systems and others. They also master in methods like cracking passwords, phishing and malware in order to hunt for the password.
Weak authentication is one of greatest advantage for an hacker as it allows you to unlimitedly log in unlike the ones that does not allow us to attempt more than three times. Secondly the other advantage for hackers seems to be short passwords. This allows the hackers to easily guess the username and passwords to break into computer systems.
pls mark me as brainlist....