Preview

Facebook Hacking

Good Essays
Open Document
Open Document
686 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Facebook Hacking
“HACKING ADDICTIONS”

An Undergraduate Thesis
Presented to the Department of CS/IT
Of ABE International Business College
Lucena City

In Partial Fulfilment of the Requirements
For the Degree
Bachelor of Science in Information Technology

By:
Vela, Merry Grace B.
Palillo, Raniel
Matabang, Carlos Pocholo

Date
Febuary 2013

ABSTRACT
Title :Facebook Hacking

Proponent :Vela, Merry Grace B. Palillo, Raniel Matabang, Carlos Pocholo

Type of Document :Thesis

Name of Institution : ABE International Business College Lucena

Degree Conferred :Bachelor of Science in Information Technology

Year Completed : 2013

Facebook has grown to become a massive social networking website. With numerous users,

Facebook is an ideal source of information of hackers. In this analysis and expose ' of Facebook

hackers, security, ethical, and legal issues have arisen. The resources for hackers to penetrate

Facebook has grown exponentially, where Malware and unsecure emails are capable of stealing a

user 's entire personal profile. The security of users is lost, causing users to lose not only personal

information but also can result in financial theft. The ethical argument of Facebook hacking was

debated, where Facebook hacking could be considered ethical because hacking would show the

company the weaknesses of Facebook security, but can also be argued as unethical and illegal

because it infringes on the Identity Theft and Assumption Deterrence Act. With many

vulnerabilities in Facebook security, users use anti-virus and anti-spyware software to defend

themselves from Facebook hackers.

Table of Contents
CHAPTER I



Bibliography: coworkers, Facebook has become an ideal medium. Today, Facebook has 955 million users (Associated Press, 2012) having his or her personal information stolen by hackers. Hackers can be identified as numerous things, each with special skills (Sergey, Anna & Michael, 2010) Background of the Study 955 million people use Facebook today (Associated Press, 2012) networking website where users are able to put up their emails, pictures, home and work addresses, cell phone numbers, and relationship statuses (Bumgarner, 2007) Facebook log in” than it is to actually type out one’s email account and password (Facebook, 2012). personal information through scams (Sukhai, 2012). By law, cybercrime is: “attaining unauthorized access, damaging someone else’s data or programs, sabotage to hinder the function of a computer system or network, unauthorized interception of data to, from and within a system or network, and computer espionage“ (Sukhai, 2012) is breaking the law (Identity Theft and Assumption Deterrence Act, 1998). Hackers purposefully break the Identity Theft and assumption Deterrence Act for personal gains.

You May Also Find These Documents Helpful

  • Good Essays

    Stealing or hacking of personal devices, malware or virus, eavesdropping, sniffing through endpoints, web Session Hijacking…

    • 1000 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Week 5 you decide

    • 928 Words
    • 4 Pages

    Social engineering attacks are another concern for our company. People tend to use sites like Facebook in order to communicate with other employees, family, and friends. It is in our best interest to have strict policies constantly in place to validate the uniqueness of the user prior to a password reset being made.…

    • 928 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Computer Memory Hacking

    • 820 Words
    • 2 Pages

    unauthorized access) has shown that the security of the computer system can be penetrated. This…

    • 820 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    In, People of the State of California (Plaintiff) v. George Samuel Bronk (Defendant), the defendant used various software, tools, and methods to commit the felonies for which he was charged. He initially used a computer with access to the Internet to take over the email accounts of individuals who he located using the popular social media website, Facebook. Mr. Bronk located his victims by searching random Facebook profiles that had personal email addresses available to the public. Once he had the email addresses he tried to access emails accounts, by attempting to reset the passwords for said email accounts, by guessing at the security questions. Once he was able to gain access to the emails accounts, he went back to the Facebook profiles and took over the Facebook profiles as well.…

    • 455 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The word 'privacy' means different things to different people, it affect both personal and business. As individuals, we need some amount of privacy to succeed. As a person we need to protect our thoughts from intruders because if others new our must intimate thoughts they could use that information to manipulate our decision making process. Business, need to protect their trade secret and information they collect from their customer to succeed. My objectives for this week e-activity consist of, evaluating the circumstances that contributed to the privacy violation, the consequence to the company to the breach, and management’s response to the breach, indicating the appropriateness of the response. Facebook is an online social network that allows users to create detailed online profiles and connect with other users, with an emphasis on social relationships such as friendship. This network let users share information with other approved users, such as one’s gender, age, interests, educational background and employment, as well as files and links to music, photos and videos. As concerns about online privacy grow, users of social media sites are increasingly looking for new way to improve their social media experience by posting more personal information and intimate picture about themselves. A class action…

    • 820 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Annotated Bibliography

    • 943 Words
    • 3 Pages

    Facebook has more than five hundred million users and fifty percent are logged on every day, because of this it makes it a large target for online hackers. Many applications on social networking sites can access a user’s personal information. An increasing number of Facebook users are adding “friends” on their Facebook that they do not know and because they accept the friend request, it is not abuse since the friend request was accepted. Spambots send informal messages to users which contain a link which once opened can contain any type of computer virus. Cyber attackers are also using natural disasters as a way to gain credit card information. They will start a group titled “Help Haiti Rebuild” or something similar with a link to insert credit card information to send money to those affected. Some hackers also take part in “phishing” which is a way to gain login names and passwords by presenting a fake login page. an excessive amount of spam was sent by a using account from which the passwords were phished and post a link to the malware.…

    • 943 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Believe Murillo Meaning

    • 468 Words
    • 2 Pages

    Believe” Analysis Throughout the song, the artist, Daniel Murillo, uses his past experiences as an inspiration to write these lyrics, along with the help of fellow band members, Jorel Decker and George Ragan. Taking Mr. Murillo’s past into consideration, I found connections in the song as I went deeper into his past life. Not much was revealed on his social media pages, surprisingly, but I found most of my information from interviews and/or articles about these talented men. Mr. Decker’s past was very easy to find, but as I continued to search, I found some things that he doesn’t talk about.…

    • 468 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Pop Culture Analysis Paper

    • 1367 Words
    • 6 Pages

    The prospectus that Facebook filed to the U.S. Securities and Exchange Commission on Wednesday Feb. 1st included a list of the company’s potential risks, inside financial details and statistics on the website’s growth. The IPO filing is optimistic but there are some issues Facebook shows concern with: the merchandising of user information. If they disclose personal information in an improper way or if hackers access their database, Facebook will face problems. They could also take a hit if its users get overly concerned about the privacy policies, an issue which was mentioned 35 times in the filing. Therefore, Facebook wrote they must avoid having policies related to sharing data which are perceived in a negative way by their users.…

    • 1367 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    Computer Misuse Act

    • 277 Words
    • 2 Pages

    An example of computer misuse is the when a group of hackers hacked Apple taking peoples usernames and passwords taking control of their accounts. This group is called Anonymous can be able to hack into any site or company to promote the companies flaws. But this can be fatal to taking people’s money if they use Apples costumer’s usernames and passwords to corrupt and take money out of their accounts causing money loss to Apple and their customers.…

    • 277 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Annotated Bib

    • 335 Words
    • 2 Pages

    In this article, John Swartz explains how owners of Facebook fare more concerned with profits than protecting people’s privacy. He also explains the dangers associated with lack of privacy. This article contributes greatly to the argument that smart phones and computers have an overall negative effect on society.…

    • 335 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    For this assignment on moral reasoning I will be discussing the ethics behind the new trend of potential employers asking for Facebook passwords and or current employers. Is it unethical to give access to such accounts, do we have a right to protect certain things that we put on the internet or is it for public view even if you’re account is set to private. If we become employees of an organization are we then giving up all rights to a private life via the Internet?…

    • 2264 Words
    • 10 Pages
    Powerful Essays
  • Better Essays

    Nearly 500 million people worldwide live their lives —? or versions of them —? on Facebook. Is there a limit to how much we'll share? CEO Mark Zuckerberg is betting there isn't…

    • 1368 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Social Media

    • 618 Words
    • 3 Pages

    While Facebook can be fun to use; a person must be careful of the information he or…

    • 618 Words
    • 3 Pages
    Good Essays
  • Good Essays

    “A simple definition of cyber-crime would be unlawful acts wherein the computer is either a tool or a target or both.”1…

    • 819 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Facebook is the largest social networking site in the world so it is moving commerce to the internet and Web. In this e-commerce case, the basic construct of ecommerce are illustrated, use of the internet and Web to transact business; digitally enabled transactions. Moreover, this case includes unique features of ecommerce: richness, interactivity, information density, and personalization/customization.…

    • 679 Words
    • 3 Pages
    Satisfactory Essays

Related Topics