StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Hackers Tools and Techniques - Research Proposal Example

Cite this document
Summary
The research proposal "Hackers Tools and Techniques" proposes to conduct a study into the hacking tools used by the hackers in the banking and financial services industry, with a focus on PayPal. The study would also look into the security strategy employed by the sector and particularly by PayPal…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93.4% of users find it useful
Hackers Tools and Techniques
Read Text Preview

Extract of sample "Hackers Tools and Techniques"

The banking and financial services industry has been a target of cyber attacks and individual online accounts have become pervasive (Acohido, 2010). Hackers gain access to vulnerabilities through tools such as malware and locate the backup of the system. PayPal is a web-based application which provides secure transfer of funds between members. It uses advanced fraud prevention technologies to enhance the security of the transactions (SearchSoa, 2005). Nevertheless, the members do receive spoof mails and unless the members are aware of such mails, they become easy prey to such hacking techniques.

While it has become essential to keep a tab on the professional hackers, the banks are facing huge losses due to constant evolvement of the hacking tools and techniques. The malicious hacker will use whatever information available to them. The security professionals, in turn, need to keep abreast of the latest hacking tools by monitoring certain websites of researchers (Skoudis, 2003). It is hence proposed to conduct a study into the hacking tools used by the hackers in the banking and financial services industry, with a focus on PayPal.

The study would also look into the security strategy employed by the sector and particularly by PayPal.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Hackers Tools and Techniques Research Proposal Example | Topics and Well Written Essays - 345 words, n.d.)
Hackers Tools and Techniques Research Proposal Example | Topics and Well Written Essays - 345 words. Retrieved from https://studentshare.org/information-technology/1569909-hackers-tools-and-techniques
(Hackers Tools and Techniques Research Proposal Example | Topics and Well Written Essays - 345 Words)
Hackers Tools and Techniques Research Proposal Example | Topics and Well Written Essays - 345 Words. https://studentshare.org/information-technology/1569909-hackers-tools-and-techniques.
“Hackers Tools and Techniques Research Proposal Example | Topics and Well Written Essays - 345 Words”, n.d. https://studentshare.org/information-technology/1569909-hackers-tools-and-techniques.
  • Cited: 0 times

CHECK THESE SAMPLES OF Hackers Tools and Techniques

Computer Hacking

Due to lack of awareness amongst the users, hackers can easily access the information from one's system, but a set of solutions for preventing this enormity is present.... TABLE OF CONTENTS Executive Summary 2 TABLE OF CONTENTS 2 INTRODUCTION 3 History of hacking 5 Famous stories of Hacking 6 COMMON MYTHS ABOUT HACKING AND hackers 8 DIFFERENCES IN TYPES OF HACKING 10 Ethical- Cyber security 10 Unethical-Computer Crimes 10 DEFENDING AND SAFEGUARDING NETWORKS 11 Home Network 12 Office Network 13 WHY hackers ARE SUCCESSFUL - VULNERABILITIES THEY EXPLOIT 14 CONCLUSION 15 REFERENCES 15 INTRODUCTION The twentieth century that is the scientific era has totally revolutionized man's life....
15 Pages (3750 words) Research Paper

Thinking Like a Hacker to Protect Your Network

In addition to understanding how a hacker's mind operates, there is a need to know the tools the hacker uses to compromise the security of a network.... hellip; Despite the tight security measures put in place to ensure information security, hackers develop more advanced means and methods to compromise the security of a network and manage to access unauthorized information and resources.... In order to achieve a watertight network security understanding how hackers operate and the methods used to attack and exploit vulnerabilities in the system is imperative....
8 Pages (2000 words) Literature review

Hackers Tools and Techniques: PayPal

PayPal has been the target for phishing… Spoof mails, extracting data through public chat rooms and phishing are the main techniques that hackers use.... hackers also attempt to extract data through PayPal's partners, as in the They also used malware to extract personal data.... This has also made it a very attractive target for hackers.... Most often hackers are notorious high school children who are always at their computers and find newer ways to attack computer systems (Shimonski, 2002)....
7 Pages (1750 words) Term Paper

Anti hacking techniuqes

This report "Anti-Hacking techniques" discusses the security of a system as dependent on the users and the ISP.... This resulted in the rivalry of hacking whereby hackers competed against each other in the determination of the best hacker.... The growth of hacking became enormous and as a result, the hackers gained more skills making them skillful, knowledgeable, and expertise in victimizing and exploiting others [2].... n recent times, hacking is not only used to victimize and exploit others but also, hackers indulge in hacking cybercrime to utilize their knowledge to gain quick benefits....
7 Pages (1750 words) Report

Computer Memory Hacking

According to Ciampa (2009), a hacker is a person who uses advanced programming skills and techniques to break into any specific computer system.... According to Ciampa (2009), a hacker is a person who uses advanced programming skills and techniques to break into any specific computer system (p.... One of those common tools or techniques is inception.... Some of the easiest and most effective security measures include setting difficult passwords, regularly changing the login passwords, downloading a personal firewall, using cryptographic techniques, using authorization technique, setting encryption standards, and installing up to date antivirus software....
2 Pages (500 words) Assignment

The Impact of Hacking in Todays Firms

This paper will define hacking, discuss the types and techniques of hacking, and give examples of companies that have been hacked.... It is evidently clear from the discussion that people who constantly perform the acts of testing and manipulating computer systems and programs are known as hackers.... hackers can be employed by organizations to protect the organization from harmful attacks from other hackers.... hackers are known to perform cyber crime....
6 Pages (1500 words) Term Paper

Timeliness, Bandwidth and Other Factors Essential When Performing Scans or Enumeration

In most cases, the white hat hacker will employ the use of similar hacking techniques as the malicious hacker to test the security strength of a system.... All these techniques form part of the penetration testing means of accessing an organizations information system and identify any existing and potential vulnerabilities (Allsopp, 2017).... Scanning and enumeration form part of the penetration testing techniques employed by an ethical hacker when accessing the system....
12 Pages (3000 words) Term Paper

The Societys Response on Internet Hackers

This is because; as long as there is the development of the security tools, more development of sophisticated attacks of hacking has also been invented.... … The paper " The Society's Response on Internet hackers" is a good example of a term paper on information technology.... The paper " The Society's Response on Internet hackers" is a good example of a term paper on information technology.... Such criminals are known as hackers and they normally possess the knowledge of stealing or damaging vital information on the internet either from the top-secret government files or even in personal bank accounts....
12 Pages (3000 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us