Preview

Computer Security and Ethical Hacking

Powerful Essays
Open Document
Open Document
5250 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Computer Security and Ethical Hacking
HACKEDIFICATION

by

MANI KRISHNA MUDIGANTI

PROJECT

Presented to the Department of Computer Science and the Graduate School of

The University of Central Arkansas

in Partial Fulfillment

of the Requirements for the Degree of

Master of Science

in

Applied Computing

Conway, Arkansas

May 2015

TO THE OFFICE OF GRADUATE STUDIES:

The members of the Committee approve the project of

Mani Krishna Mudiganti presented on 30th April; 2015.

Dr. Vamsi Paruchuri, Committee Chairperson

Dr. Chenyi Hu, Committee Member

Dr. Yu Sun, Committee Member

PERMISSION

Title Hackedification

Department Computer Science

Degree Master of Science

In presenting this project, in partial fulfillment of the requirements for graduate degree from the University of Central Arkansas, I agree that the Library of this University shall make it freely available for inspections. I further agree that permission for extensive copying for scholarly purposes may be granted by the professor who supervised my thesis work, or, in the professors absence, by the Chair of the Department or the Dean of the Graduate School. It is understood, that due recognition shall be given to me and to the University of Central Arkansas in any scholarly use which may be made of any material in my project.

Mani Krishna Mudiganti

April 30th; 2015

Acknowledgements

I would never have been able to finish my project without the guidance of my committee members and friends. I would like to express my deepest gratitude to my advisor, Dr. Vamsi Paruchuri for his excellent guidance, patience, ideas and for providing me the resources required to conclude my project. I would like to thank Dr. Chenyi Hu, for his tremendous academic support and the way he has helped me to craft my report. Similar profound gratitude goes to Dr. Yu sun for serving on my thesis committee member and for her constant support and faith in me all the time.

Finally I would like to thank

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Lab 7 Ethical Hacking

    • 293 Words
    • 2 Pages

    In this lab, you used AVG AntiVirus Business Edition to identify the viruses, worms, Trojans,…

    • 293 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Take a trip down memory lane with these top cyber films. Designed for computer buffs, these movies range from spy thrillers to cyber crime movies. They were selected based on their excellent plot lines and portrayals of technology. Unlike typical movies, these films use computers the way they are actually used in real life with a few exceptions.…

    • 598 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Annotated Bibliography

    • 1066 Words
    • 5 Pages

    Finally I would like to thank my family members and my friends for helping me and supporting me in making of this report.…

    • 1066 Words
    • 5 Pages
    Satisfactory Essays
  • Powerful Essays

    Cybercrime: Hacking

    • 1198 Words
    • 4 Pages

    With everything in society advancing rapidly, it should be of no surprise that technology is now used to commit crimes against other people. Those crimes include identity theft, stealing money, illegal gambling, and cyberstalking. This paper will review cybercrime and the differences there are from traditional crime and it will review the purpose of hackers. There will also be three cases reviewed to help bring light to what kind of cybercrimes are being committed around the world.…

    • 1198 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    Ethics of Hacking

    • 275 Words
    • 2 Pages

    Cracking is the correct concept for deconstructing/sabotaging in the cyberspace/Internet, e.g. by circumventing the security of a website and posting your own (critical) stuff on their site or spreading viruses in the Internet. Hacking, on the other hand, is about using and reconstructing the computer or other machines/systems in a new and (by the "owners" and "inventors") unintended way. Hacking is about reclaiming the system, manipulating it and using it, not destroying it. Both terms define people who can break into computer systems and rewrite programs, but hackers do not use their knowledge offensively or illegally. Crackers use their skills for illegal use: distributing pirated materials, stealing money and identities, etc.…

    • 275 Words
    • 2 Pages
    Good Essays
  • Good Essays

    "Computer Hacking." Issues & Controversies On File: n. pag. Issues & Controversies. Facts On File News Services, 18 July 2005. Web. 24 June 2013.…

    • 1042 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    When we hear the word hacker we think of a person who has gained access to a system they do not have permission to access. “The first generation of hackers who emerged in the 1960s was individuals who would be called technology enthusiasts today. These early hackers would go on to create the foundation for technologies and the Internet such as the ARPANET” (Oriyano and Michael 2). They also initiated many early software development movements that led to what is known today as open source. Hacking was motivated by intellectual curiosity; causing damage or stealing information was against the rules for this small number of people. In the 1980s, hackers started gaining more of the negative connotations by which the public now identifies them. Movies such as War Games and media attention started altering the image of a hacker from a technology enthusiast to a computer criminal (“Hacking History”). During this time period, hackers engaged in activities such as theft of service by breaking into phone systems to make free phone calls. In many respects, the 1980s formed the basis for what a hacker is today. “Over the past two decades, the definition of what a hacker is has evolved dramatically from what was accepted in the 1980s and even the 1990s” (Oriyano and Michael 3). Hacker has become such a universal term. However, there are experience hackers who never break the law, and who define hacking as producing an outcome the system designer never anticipated. Some act with good intentions, others with bad intentions, and yet others with a mixture of both. No matter what the intentions were, the outcomes of their actions affected the world in some way. When popular organizations such as Microsoft and Apple were founded, they open a new and free attitude towards software development evolved (“Hacking History”). However the good came along with the bad. Some hackers were more interested in their own personal gain and strived to circumvent…

    • 2845 Words
    • 12 Pages
    Powerful Essays
  • Good Essays

    Computer Hacking

    • 1438 Words
    • 6 Pages

    Computer hacking is most common among teenagers and young adults, although there are many older hackers as well. Many hackers are true technology buffs who enjoy learning more about how computers work and consider computer hacking an “art” form. They often enjoy programming and have expert-level skills in one particular program. For these individuals, computer hacking is a real life application of their problem-solving skills. It’s a chance to demonstrate their abilities, not an opportunity to harm others.…

    • 1438 Words
    • 6 Pages
    Good Essays
  • Better Essays

    Computer Hacking

    • 2149 Words
    • 9 Pages

    Computer hacking is one of the biggest crimes in all over the world today. Hacking began in the sixties when MIT students gained control of the school’s mainframe and over the central processing unit and deleted programs. They also used hacking in wars to hack into predator’s machine and change things like times (Harmless Hacking, 2006). When hackers learned about flaws in security systems and found that they could hack into big cooperation’s accounts and bank systems and take money hacking kept growing from there (Bavisi, J 2006). Every day all over the world hacking continues to increase…

    • 2149 Words
    • 9 Pages
    Better Essays
  • Good Essays

    List a pair of design metrics that may compete with one another, providing an intuitive…

    • 14869 Words
    • 60 Pages
    Good Essays
  • Satisfactory Essays

    This Chapter will present the Background of the Study`, Objectives, Scope and Delimitation, Significance of the Study, and Statement of the Problem.…

    • 581 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Finally I would like to thank all those who encouraged me in the completion of my project report.…

    • 347 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    ETHICAL HACKING

    • 263 Words
    • 5 Pages

    ETHICAL HACKING WORKSHOP PRESENTED BY mail us @ techhackiter@soauniversity.ac.in soa.techhackclub@gmail.com WARNING ALL INFORMATION PROVIDED IS ONLY FOR EDUCATIONAL PURPOSE. USE IT AT YOUR OWN RISK .…

    • 263 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    I express my sincere thanks to my research report guide Prof. Sachin Rai , Lecturer for his generous support, constant direction and mentoring at all stages of project.…

    • 7497 Words
    • 30 Pages
    Good Essays
  • Satisfactory Essays

    My Research Includes

    • 406 Words
    • 2 Pages

    1. A Framework for Error Reduction in Software Cost Estimation [Thesis I, 30min] Aqsa Ijaz, Kashif Zafar, Ghulam Ahmad Farukkh, Waqas Zyad 2. Software Factory Model [Thesis I, 30min] Asma Naz, Kashif Zafar, Fakhar Lodhi 3. Encapsulation and Relational Databases [Thesis II, 30min] Marriam Daud, Fakhar Lodhi, Kashif Zafar…

    • 406 Words
    • 2 Pages
    Satisfactory Essays

Related Topics