Preview

Computer Memory Hacking

Good Essays
Open Document
Open Document
820 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Computer Memory Hacking
Computer Memory Hacking

Computer Memory Hacking
Rebecca M. Shepherd
CIS 106 Intoduction to Information Technology
Professor Dima Salman
Stayer University
November 23, 2014

Computer Memory Hacking

Hacking of memory or hacking of RAM describes when a person or person(s) gains unauthorized access to the RAM (random access memory) of a computer system. There a couple of reasons that one might participate in hacking the memory of a computer system. One reason that a person may attempt to gain unauthorized access to a computer is simply to demonstrate that they are capable of doing so. By demonstrating this skill, the hacker (the person gaining unauthorized access) has shown that the security of the computer system can be penetrated. This is often useful when the owner of the computer system wants to ensure its security is optimal.
Another reason a person or person(s) would want to access a computer systems RAM without the owners permission would be to gain information from that computer system. That information may or may not include personal data such as names, addresses, telephone numbers, email addresses, credit card information, account numbers, and other pertinent information that thieves could use to gain financially.
Hackers use many tools and techniques to penetrate the security of the computer system that they choose to attack. Some techniques can include dns spoofing, packet sniffers, social engineering, and trojan horses. DNS spoofing occurs when the hacker changes the DNS entry on a server and redirects the browser to an alternate site. This method is often used to steal usernames, passwords, or other personal information. Packet sniffers were originally designed for administrators to debug their systems. They are devices that intercept and interpret packets of information crossing a network. Social engineering is the method of obtaining personal information and network information through



References: Best Practices for Employees to Protect the Company From Hackers. (n.d.). Retrieved from  http://www.entrepreneur.com/article/237174  Best Practices for Protecting Critical Business Data. (n.d.). Retrieved from  http://www.ittoday.info/Articles/Protecting_Critical_Business_Data.htm  Target Breach: 8 Facts On Memory­Scraping Malware. (n.d.). Retrieved from  http://www.darkreading.com/attacks­and­breaches/target­breach­8­facts­on­memory­scraping­m alware/d/d­id/1113440  Who Are Hackers ­ A Hacker 's Tools Of The Trade | Hackers | FRONTLINE | PBS. (n.d.).  Retrieved from http://www.pbs.org/wgbh/pages/frontline/shows/hackers/whoare/tools.html

You May Also Find These Documents Helpful

  • Good Essays

    Stealing or hacking of personal devices, malware or virus, eavesdropping, sniffing through endpoints, web Session Hijacking…

    • 1000 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Nt1310 Final Exam

    • 393 Words
    • 2 Pages

    Computer Hacking in 1960’s up to 1970’s – an individual working with computers who were technically gifted and skilled it was defined by computer ethicist Duncan Langford (1995).…

    • 393 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Hacking of random access memory (RAM) is a very basic idea. Hacking itself is defined as using a computer to gain unauthorized access to data within a system. Another way of defining hacking is the crashing a computer system. Following below is some information of how hacking RAM is useful as well as commonly used programs used by so-called ethical hackers.…

    • 838 Words
    • 4 Pages
    Better Essays
  • Good Essays

    In order to prevent this, websites could set up web application firewalls or encode their data by adding in special characters only they would know of. For example, in order to avoid being hacked on Facebook, a person could change their password to a password that is hard to guess or set up a firewall to avoid being hacked. When creating or changing a password for Facebook, Gmail, Twitter or any other social networking site, it makes sure the password is…

    • 769 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Crt 205 Final Project

    • 2361 Words
    • 10 Pages

    | |author. If none exist, explain how you |However, hacking is a process use be Information Technology (IT) |…

    • 2361 Words
    • 10 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Tim J. Watts goes more into the dark side of the “hacker” community by bringing up the constant back in forth between computer security officers and the so called hackers. This article, being written this year is able to reflect on the events of September 11, 2001 and new homeland security measures. He represents this viewpoint of a dangerous hacker in his definition: “While some hackers are harmless, others break into systems with the intent to steal information or to do destruction to the system. Hackers performing the latter pose a serious threat to the economic future of the United States” (Watts). Tim Watt outright blames the hacker community of accessing information that should be private. Only looking and reflecting on the serious threat…

    • 154 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Final Exam Paper

    • 491 Words
    • 2 Pages

    ____ are hackers of limited skill who use expertly written software to attack a system…

    • 491 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Display any information which enables others to gain unauthorised access to computer material including instructions for gaining access, computer codes or other devices which assist hacking.…

    • 1135 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Computer Misuse Act

    • 277 Words
    • 2 Pages

    Gaining access to a computer with someone else's username or password which you do not have permission to use, modify files or data without the authorization of the creator, or commit illegal acts such as fraud while using the stolen username or password.…

    • 277 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Hackers: A hacker is someone who finds weaknesses in a computer or computer network, enters, and modifies or/and steals data this could slow down performance very much or even completely halt it.…

    • 555 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    Of the provisions of the following; unauthorized access to a computer system, Theft of computer…

    • 2776 Words
    • 12 Pages
    Better Essays
  • Powerful Essays

    Cyber Espionage

    • 3589 Words
    • 15 Pages

    | involves the unauthorized probing to test a target computer’s configuration or evaluate its system defenses, or the unauthorized viewing and copying of data files.…

    • 3589 Words
    • 15 Pages
    Powerful Essays
  • Good Essays

    Hacking

    • 4142 Words
    • 17 Pages

    their pursuit of information, so are we. The thrill of the hack is not in…

    • 4142 Words
    • 17 Pages
    Good Essays
  • Satisfactory Essays

    Unauthorized access

    • 279 Words
    • 2 Pages

    Unauthorized access is defined as gaining access to a computer, network, file or other resource without permission. This act can be committed by an inside or outside source. Unauthorized access and use is considered a form of cybercrime. Nicola Baird wrote an article, Cybercrime: 'I felt I was reading my own obituary', pertaining to email hacking. Baird calls it a “smash-and-grab raid” as the hackers merely want to access the data, valuable information or programs in the computer. It was said that cybercrime has caused Britain $27 billion. The article contains an incident where Nicola, the writer, was targeted by a hacker. She discovered that over 2500 of her contacts we emailed asking for financial aid. To protect against online theft, fraud and other unauthorized access and use, ethical decision has to be kept in mind. Not giving out personal information such as an individual's social security number or their mother's maiden name; never giving out sensitive information via text message or email because it can be easily forwarded or hacked into; shredding information containing credit card numbers and sensitive data would eliminate any possibility that a person going through the trash finds that information; keeping an eye on bills and credit report to detect identity theft early. Hackers try using the default passwords such as no password, root, or admin. Changing passwords often that include letters numbers and other characters to make it a stronger password.Installing a software firewall will help protect from unauthorized incoming and outgoing information. Running system scan to check for vulnerabilities to threats or issues that a person's computer might have that will allow unauthorized access to their computer by users.…

    • 279 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    ISM Workshop

    • 1008 Words
    • 5 Pages

    Computer security refers to the methods and practises that are employed by employees to protect private resources in a computer system from being accessed, modified or deleted (Gollmann 2010). Many industries implement strict computer security measures. This may include installing physical locks on doors, security cameras, security guards, and emergency protocols in the occurrence of a flood or fire. Firewalls, varying levels of access privileges, and data encryption prevent the interference of data that is stored or accessed on a computer. The United States’ Computer Security Act of 1987 requires federal departments to provide training to employees to teach knowledge workers these skills, as the emergence of communications devices and technologies has made most industries vulnerable (Whitman 2010, 194). Schell discusses how a lack of computer security in US Government programs has led to the exposure of sensitive military communications and strategies (2013). This is in contrast to Information security, which encompasses computer security in addition to physical, operations, communications and network security in an information system (Whitman 2010, 4). The CNSS security model provides a framework of desirable attributes of a secure information system, which includes confidentiality, integrity and availability (Whitman 2010, 4).…

    • 1008 Words
    • 5 Pages
    Better Essays