Preview

Computer Hacking Problems and Solutions

Good Essays
Open Document
Open Document
521 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Computer Hacking Problems and Solutions
Imagine yourself going into the bank to get money out of your account for your rent or other important bill, and the account is dry and you just got paid the day before..or going to pay a bill with your credit card and card after card is maxed out then you find out that someone has stolen all your information and used all of your resources to live and pay bills. If this happened to me my heart would be beating so fast in panic id probably pass out considering I have so many kids to provide for. Well it happens everyday to people everywhere all over the world. One of the major problems causing this is called hacking which is defined by the company who created the website the free dictonary dot com, Houghton mifflin company, as to gain access to a computer file or network illegally or without authorization. It is a big problem not just here but in other countries as well.One incident id like to mention is the playstation store being hacked into

Now I would like to move on to some stastistics. According to the internet crime complaint center also know as the IC3 a partnership with the federal beauro of investigation, the national white collar crime center and the bearo of justice assistance. The percentage of people hacked within the last year has increased 22 from last year.

next I am going to go over some solutions to a couple possible goals of the hacker that I have researched on ic3 to help prevent or reduce the chance of the hacker meeting those goals. The first one is called internet extortion to help prevent or reduce the chance of being hacked for this security needs to be doubled up so the intruder or hacker needs to basically get thru many obsticles to achieve the goal, also ensure security is installed at every possible entry point of your system, identify wherher your internet provider is utilyzing any ports that have been known to represent insecurities, ensure you are utilyzing the most up to date patch or fixes for your software.

The next

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Cybercrime is on the rise. As companies try to protect their customers PII, criminals are trying to get it. Ponemon Institute did a survey of how the information was affecting larger companies (Institute, 2014). Unfortunately the hackers are using the information to ruin their credit. Russian hackers obtained 1.2 billion usernames and passwords (Institute, 2014).…

    • 276 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Take a trip down memory lane with these top cyber films. Designed for computer buffs, these movies range from spy thrillers to cyber crime movies. They were selected based on their excellent plot lines and portrayals of technology. Unlike typical movies, these films use computers the way they are actually used in real life with a few exceptions.…

    • 598 Words
    • 3 Pages
    Good Essays
  • Better Essays

    There has been an increase in global technology over the past few years. The increase in technology allows us to have access to many things from almost anywhere, such as the Internet. People can find information right at their fingertips faster and easier than ever before. However, with this increase in technology comes an increase in cybercrime.…

    • 780 Words
    • 3 Pages
    Better Essays
  • Powerful Essays

    In presenting this project, in partial fulfillment of the requirements for graduate degree from the University of Central Arkansas, I agree that the Library of this University shall make it freely available for inspections. I further agree that permission for extensive copying for scholarly purposes may be granted by the professor who supervised my thesis work, or, in the professors absence, by the Chair of the Department or the Dean of the Graduate School. It is understood, that due recognition shall be given to me and to the University of Central Arkansas in any scholarly use which may be made of any material in my project.…

    • 5250 Words
    • 21 Pages
    Powerful Essays
  • Better Essays

    Dougherty, C., Householder, A., & Houle, K. (2002). Computer attack trends challenge Internet security. Computer, 35(4), 0005-7.…

    • 1278 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Final English 122

    • 1481 Words
    • 6 Pages

    Protecting your personal information both on your personal computer and in other places such as your bank, or your job, has become more difficult with the massive growth of the internet and the expertise of some unsavory characters called hackers, crackers, and phreakers. Whatever they choose to call themselves, they are all thieves, plan and simple. Some people still question whether or not hacking should be illegal. It’s obvious that what hackers do is illegal. A personal computer is personal, and the information on it private. When a hacker invades that privacy, he is trespassing, and when they take your personal information, their committing a form of thievery. In addition to hackers, we now have marketers invading our privacy through the use of cookies.…

    • 1481 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Digital Crime

    • 5203 Words
    • 21 Pages

    References: Butterworth, C, & Bresson, P. (2010, March 12). Ic3 2009 annual report on internet crime released. Retrieved from http://www.ic3.gov/media/2010/100312.aspx…

    • 5203 Words
    • 21 Pages
    Powerful Essays
  • Good Essays

    Causes Of Identity Theft

    • 1108 Words
    • 5 Pages

    Hackers are people who hack into other people’s computers or electronic devices so they can take control over their things. A book titled Net Crimes and Misdemeanors written by J. A. Hitchcock takes us through many different aspects of how people take and control our things. She explains to us “When you’re connected to the internet, your computer is part of a worldwide network and anyone can try to connect to your system. The best way to describe it is by contrasting it to your television, a one-way communication mechanism” (Hitchcock 237). Hackers can reach any personal information located on an individual’s computer. Any accounts or credit card numbers in the system, they can get ahold of. We use many internet softwares today that can help prevent hackers, but not all the time. Hackers are extremely knowledgeable with computers and can find their way in. Hitchcock also gives us a little background information on when many viruses and softwares were introduced. She states, “…there was a good enough market for a security suite that included a personal firewall and antivirus capability. They were right. When NIS was introduced in December 1999, the U.S. retail market for internet security software grew more than 140 percent” (Hitchcock 236). Throughout the years, many software updates came out to help protect people and their information. The problem is that the more…

    • 1108 Words
    • 5 Pages
    Good Essays
  • Best Essays

    5. Goessl, L. (2012). Op-Ed: Nissan recently hacked, corporate hacking a growing issue. Available: http://digitaljournal.com/article/323723. Last accessed 30th July 2013.…

    • 1963 Words
    • 8 Pages
    Best Essays
  • Good Essays

    Computer hackers are always using new technologies in today’s world although it was started after the establishment of computer. While it is considered as an ethical, but study of internet checking trends, most hackers are motivated by profit when they attack computer network and files. Forty two percent of hackers were trying to steal sensitive information, such as personal records, which could be sold or exploited for profit. The hackers do not just crack down, they also put much pressure on software developments and internet based businesses to improve and their security procedures and make their product less vulnerable to hacking. It seems that hacking is a reasonable because it helps to developed the technology and stay people alert on security purpose.…

    • 1042 Words
    • 5 Pages
    Good Essays
  • Better Essays

    Computer Hacking

    • 2149 Words
    • 9 Pages

    Computer hacking is one of the biggest crimes in all over the world today. Hacking began in the sixties when MIT students gained control of the school’s mainframe and over the central processing unit and deleted programs. They also used hacking in wars to hack into predator’s machine and change things like times (Harmless Hacking, 2006). When hackers learned about flaws in security systems and found that they could hack into big cooperation’s accounts and bank systems and take money hacking kept growing from there (Bavisi, J 2006). Every day all over the world hacking continues to increase…

    • 2149 Words
    • 9 Pages
    Better Essays
  • Powerful Essays

    Ethical Hacking

    • 2861 Words
    • 12 Pages

    The explosive growth of the Internet has brought many good things: electronic commerce, easy access to vast stores of reference material, collaborative computing, e-mail, and new avenues for advertising and information distribution, to name a few. As with most technological advances, there is also a dark side: criminal hackers. Governments, companies, and private citizens around the world are anxious to be a part of this revolution, but they are afraid that some hacker will break into their Web server and replace their logo with pornography, read their e-mail, steal their credit card number from an on-line shopping site, or implant software that will secretly transmit their organization's secrets to the open Internet. With these concerns and others, the ethical hacker can help.…

    • 2861 Words
    • 12 Pages
    Powerful Essays
  • Satisfactory Essays

    The Basics of Hacking

    • 390 Words
    • 2 Pages

    http://images.templatemonster.com/screenshots/7000/7045.html) then paste it to your browser... easy eh? wait! dont be to excited... erase the .html and change it to swf then press enter then you'll see the flash movie again icon_smile.gif.…

    • 390 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    In today’s society, technology plays an important role in our everyday lives. Technology has made many lives easier, but with this ease, comes with many risks. People are becoming savvier about how to break into computer systems and access personal information. For many people, this is considered a breach of security. According to wisegeek.com, a security breach is “an incursion into a computer or network of computers, usually by hackers or malicious software that compromises sensitive data or causes damage to computers or network function.”1 Most of the time these so-called “computer hackers” find ways to evade security systems to steal important personal information such as social security numbers, home addresses and banking information. These hackers can be either a young person experimenting with information technology or an advanced computer programmer. Some will take this information and engage in illegal behavior such as leasing a car or opening a credit card or applying for a home loan. Many times this violation of security can lead to devastating consequences for the victim. On occasion, a computer security breach can be caused by only one person or a group of people. Other times, it can be caused by “malicious software, viruses, or other programs [which] are inserted into a system with the aim of destroying data or damaging the ability of a computer or network to operate.” 1 There are several types of security breach, all of which can be detrimental. “In a network-based breach, a malicious user gains access to a computer through any open network connections the computer may be using, such as a LAN connection or a wireless network connection.” 2 Another form of security breach is called malware. It is a type of “malicious software that can compromise a computer 's security…a user may unknowingly install malware by downloading a file off of the Internet or by visiting a website that automatically downloads software via the Internet…

    • 814 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    this blog is disign to for beginer who want to be a hacker ........ & also we trying to solve general computer related problem.. i.e we want to create new era of computer hacking basics & much more…

    • 11363 Words
    • 54 Pages
    Powerful Essays