Computer Memory Hacking
Rebecca M. Shepherd
CIS 106 Intoduction to Information Technology
Professor Dima Salman
Stayer University
November 23, 2014
Computer Memory Hacking
Hacking of memory or hacking of RAM describes when a person or person(s) gains unauthorized access to the RAM (random access memory) of a computer system. There a couple of reasons that one might participate in hacking the memory of a computer system. One reason that a person may attempt to gain unauthorized access to a computer is simply to demonstrate that they are capable of doing so. By demonstrating this skill, the hacker (the person gaining unauthorized access) has shown that the security of the computer system can be penetrated. This is often useful when the owner of the computer system wants to ensure its security is optimal.
Another reason a person or person(s) would want to access a computer systems RAM without the owners permission would be to gain information from that computer system. That information may or may not include personal data such as names, addresses, telephone numbers, email addresses, credit card information, account numbers, and other pertinent information that thieves could use to gain financially.
Hackers use many tools and techniques to penetrate the security of the computer system that they choose to attack. Some techniques can include dns spoofing, packet sniffers, social engineering, and trojan horses. DNS spoofing occurs when the hacker changes the DNS entry on a server and redirects the browser to an alternate site. This method is often used to steal usernames, passwords, or other personal information. Packet sniffers were originally designed for administrators to debug their systems. They are devices that intercept and interpret packets of information crossing a network. Social engineering is the method of obtaining personal information and network information through
References: Best Practices for Employees to Protect the Company From Hackers. (n.d.). Retrieved from http://www.entrepreneur.com/article/237174 Best Practices for Protecting Critical Business Data. (n.d.). Retrieved from http://www.ittoday.info/Articles/Protecting_Critical_Business_Data.htm Target Breach: 8 Facts On MemoryScraping Malware. (n.d.). Retrieved from http://www.darkreading.com/attacksandbreaches/targetbreach8factsonmemoryscrapingm alware/d/did/1113440 Who Are Hackers A Hacker 's Tools Of The Trade | Hackers | FRONTLINE | PBS. (n.d.). Retrieved from http://www.pbs.org/wgbh/pages/frontline/shows/hackers/whoare/tools.html