StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Methods Employed by Organization to Discourage Hackers - Assignment Example

Cite this document
Summary
The paper "Methods Employed by Organization to Discourage Hackers" discusses that the most thrilling trends of the early 21st century have been the outburst of hacker culture worldwide. Hackers have two meanings. The first meaning is the individual who poses a safety threat to a computer network…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.6% of users find it useful
Methods Employed by Organization to Discourage Hackers
Read Text Preview

Extract of sample "Methods Employed by Organization to Discourage Hackers"

Hacker Culture and Mitigation Introduction 3 Hacker’s culture 3 Mitigation/ measures 4 Past incidents in cyber crime 5 Identity theft 5 Online stalking 5 Third party involvement. 6 Methods employed by organization to discourage hackers. 6 Conclusion 7 References 9 Hacker Culture and Mitigation Table of Contents Introduction 3 Hacker’s culture 3 Mitigation/ measures 4 Past incidents in cyber crime 5 Identity theft 5 Online stalking 5 Third party involvement. 6 Methods employed by organization to discourage hackers. 6 Conclusion 7 References 9 Introduction The most thrilling trends of the early 21st century have been the outburst of hacker culture around the world. Hackers have two meanings. The first meaning is the individual who pose safety threat to computer network and the second meaning is simply a person or people who use technology to create useful products. Hacker’s culture The hacker civilization is actually a loosely related collection of subcultures that is yet conscious of some significant shared experiences, shared ancestry and communal principles. It has its own myths, heroes, and villains, in jokes, taboos and dreams. Since hackers as a collection are chiefly creative, people who describe themselves in part by rejection of normal values and operational habits, it has unusually rich and conscious tradition for global cultures (Gertz, 2012). The basis of hacker culture was born in the computer lab as a result of computer programmers doing all in their authority to request, scrounge or steel computing property. They spend hours working on a computer program while neglecting everything else. Computer network gives them a way to associate with other people with their same interest. Before the introduction of computers, hackers’ world set up and visited bullet board system, where an individual could host a bullet board system on his or her computer and let citizens dial into the organization to send message, share data among others (Pino, 2013). Not all hackers try to investigate prohibited computer systems. A number of users use their talents and knowledge to make better software and safety measures. In fact, numerous hackers who once used their power to smash into systems now put that information and cleverness to use by creating more comprehensive security events. In a way, the Internet is a combat zone among kinds of hackers. The bad guys or black hottest go through systems or multiply virus and the good guys boost defense systems and expand potent virus defense software (Holt, 2010). Hackers on both sides over powering open source software programs in which the basic code is accessible for anybody to study, share out and inform. With open course software, hackers can learn from other hackers experiences and assist each other to make programs function much in good health than they did before the introduction of the internet. Software might range from easy applications to more complex application system. Mitigation/ measures Mitigation refers to the attempt to decrease loss of life and possessions by lessening the effect of a disaster. It is also taking action to ensure that the software acquired should be as safe as possible to protect it against hackers who may have bad intention towards the internet or computer software (Ralph, 2013). Social Security Administration Is an independent agency of the United States of the federal government that administers social safety, a social indemnity agenda consisting of retirement, disability and survivor’s benefits. This organization over time has faced cybercrime hence raising insecurity of its normal day-to-day functions. Past incidents in cyber crime The Social Security Administration has faced cybercrimes in many forms. This include online individuality theft, economic deception, pestering harassment, hacking, emails spoofing, and information piracy among others. This crime has resulted to financial ruins and potentially threatens a victim’s reputation and personal safety. Identity theft This has become the common cybercrime to the organization especially online accounts. The organizations at many times has been faced with online identity theft of the financial account of the organization and many a times pirating the resources of the organization. Apart from the identity theft, other past incidents which the organization faced are social security fraud, on which the social security number of the organization is pirated by hackers and copies similar to the social security are being processed (Pino, 2013). Online stalking This has also been one of the incidents the social security administration is facing. Online staking has made hackers to invent the organization by making and saving communication of the organization for example emails and threatening messages. This is via social media and so on. This has resulted to a risky threat to the social security administration since the vital information can be hacked. Motivation of the threat Many motivations have been put in place to ensure that the crimes and people involved in the act of cybercrime are put to justice. The organization has placed thorough measures to ensure that the problems traced in the past incident are deled with. They include for instance, identity theft where it makes sure passwords for online account are frequently changed in that, it should be long enough and a mixture of uppercase and lowercase, easy to remember but difficulty to access. The organization has ensured closing any unauthorized or compromised or charged account by ensuring each credit card has a new number to inform the organization that someone may be using another person’s identity card. This will make easy tracking of the individual and bring him/her to justice (Holt, 2010). Apart from that, machines should be kept clean in that it should have the latest software, web browsers and operating systems to defend the organization’s vital information from attack from the virus malware and other online threats. Third party involvement. Apart from the motivations of the company, there are other third party motivations that are ensuring proper protection of hardware by thieves. This includes local laws enforcement. They have detectives that other organizations can focus specifically on the cybercrime. A part from local law enforcement, internet complaint center, which thoroughly review and evaluate the complaints related cybercrime refer it to the appropriate federal state or local international laws enforcement that has jurisdictions over the matter. The internet crime complaint center is also in corporation with the federal Bureau of Investigation, which also has played a big impact to eradicating social security administration cybercrime (Goldstein, 2009) Methods employed by organization to discourage hackers. Several methods that the organization has employed to discourage hackers or intruders are; defining deployment setting, for instance, clients offer a range of security and privacy option, setting password standards, providing user guidance among others. From this method, management, policy or technological control have been put in place against similar attacks and these are; defense against strategies to reduce advanced persistent threats, shore up detection capabilities to counter advanced persistent threats, and security awareness among employees for instance human firewall. (Goldstein, E. 2009) The organization should also chooce a good source of information to obtain data concerning the safety measures to prevent hackers and also good motivation for proper security of the data and information. The organization chosen should have the right materials needed for the organization and should be able to identify hackers invanding the program or the hackers invading restricted information of data and information of the organization. (Ralph Stair, G. R. 2013). The social security adminstration has also empolyed eavesdropping. This is a method where the surreptitously listening to private conversation, typically between host on a network. They have used programms such as carnivore and narusight to eavesdrop on the system of internet service providers such that each manchine can be eavesdropped electronically upon monitoring the faint electro-magnetic transmission generated by the hardware. This has managed easy secured data and tracking of the hackers who for instance have bad intention of tracking data of the organization. Conclusion In conclusion, hackers have brought more harm to the industry of technology among them being virus and hacking of the vital information of the organization. Despite of that, the hackers have also brought a positive impact in the field of technology. The main improvement being introduction and invitation of useful programs invented by the hackers and has improved technology advancement. References Goldstein, E. (2009). The Best of 2600, Collectors Edition: A Hacker Odyssey. John Wiley & Sons. Holt, T. (2010). Cybercrime: Oxford Bibliographies Online Research Guide. Oxford University Press. Michael Gertz, E. G. (2012). Integrity, Internal Control and Security in Information Systems: Connecting Governance and Technology. Springer. Pino, R. E. Network Science and Cybersecurity. 2013: Springer Science & Business. Ralph Stair, G. R. (2013). Principles of Information Systems. Cengage Learning. S. Ozeren, I. G.-B. (2009). Understanding Terrorism: Analysis of Sociological and Psychological Aspects. IOS Press. Thomas, D. (2011). Hacker Culture. U of Minnesota Press. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Hacker Culture and Mitigation Assignment Example | Topics and Well Written Essays - 1250 words”, n.d.)
Hacker Culture and Mitigation Assignment Example | Topics and Well Written Essays - 1250 words. Retrieved from https://studentshare.org/information-technology/1637590-hacker-culture-and-mitigation
(Hacker Culture and Mitigation Assignment Example | Topics and Well Written Essays - 1250 Words)
Hacker Culture and Mitigation Assignment Example | Topics and Well Written Essays - 1250 Words. https://studentshare.org/information-technology/1637590-hacker-culture-and-mitigation.
“Hacker Culture and Mitigation Assignment Example | Topics and Well Written Essays - 1250 Words”, n.d. https://studentshare.org/information-technology/1637590-hacker-culture-and-mitigation.
  • Cited: 0 times

CHECK THESE SAMPLES OF Methods Employed by Organization to Discourage Hackers

Regardless of Computer or Network Security

The focus of this paper "Regardless of Computer or Network Security" is on the driving forces behind most hackers' actions.... The internet has further made it easy for hackers to go beyond borders with Chinese hackers gaining access to the American government or security information.... Possible security vulnerabilities exist and hackers are always on the lookout.... Black hat hackers are the most daring because they use their knowledge to obtain information and data for their own personal gains or to disrupt network systems....
12 Pages (3000 words) Assignment

Information Technology: Cyber Security and Information Assurance

ome of the threats involved are more serious, although this is subject to the ability of the organization to deal with them (McDowell & Householder, 2009).... In spite of these measures, hackers and crackers still have their ways of accessing private information without authorization from legitimate owners.... Potential hackers and their motives hackers have varied reasons for hacking into a cyber network.... The leading cyber threat involves the financial sector, in which case the hackers engage in a number of ways....
6 Pages (1500 words) Research Paper

Hacker Culture

This paper ''Hacker Culture'' discusses that to prevent and the discourage hackers, a person should: use of a 2 way firewall, updating an operating system regularly, Avoid questionable websites, Safe email protocol, Not opening suspicious emails etc.... For example, in the case of Wisconsin department of revenue, hackers try to change some figures on revenue by finding access to information hence giving false information to public (Jerome, 1990).... hackers may also block the public from logging in to the site hence the revenue details would be inaccessible....
11 Pages (2750 words) Research Paper

Types and Categories of Threats to IT Systems

The paper "Types and Categories of Threats to IT Systems" states that CISM is an internationally recognized certification.... This certification was specifically designed for information security professionals who work is to oversee the day to day running of the system.... ... ... ... CSSLP is the newest type of certification that ensures security is maintained throughout the software lifecycle....
7 Pages (1750 words) Essay

Despite the Rhetoric of Employee Engagement, Organisations Still Want To Exert Tighter Control

The methods of service delivery are the most important areas that would require changes occasioned by the emerging trend.... Generally, the paper "Despite the Rhetoric of Employee Engagement, Organisations Still Want To Exert Tighter Control" is a perfect example of a management essay....
8 Pages (2000 words) Essay

Knowledge and Information Security Plan

.... ... ...
15 Pages (3750 words) Essay

Analysis of Hacktivism on Social Change

These protestors (hacktivists) are essentially hackers who use similar tools and techniques to disrupt online services so as to bring attention to their political cause (Li, 2013).... The paper "Analysis of Hacktivism on Social Change" tells that WikiLeaks had to switch its website-hosting provider and sourced bandwidth from Amazon....
9 Pages (2250 words) Term Paper

The Concept of Password Management

Additionally, due to the vast usage of passwords for online authentication services at the workplace, there is an increasing threat about the vulnerability of these passwords, which pose a security threat to the employee/worker, and the organization.... This time could have been spent productively in doing vital organization tasks.... The problems emanating from password management, as stated above, compromise employee and organization security, lead to lost productivity as a result of time wastage, and expensive delays....
9 Pages (2250 words) Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us