StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Computer Memory Hacking - Assignment Example

Cite this document
Summary
This essay analyzes hacking, that has become so common in today’s world that almost every person who uses computer and internet can be a victim of hackers. According to Ciampa (2009), a hacker is a person who uses advanced programming skills and techniques to break into any specific computer system…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.6% of users find it useful
Computer Memory Hacking
Read Text Preview

Extract of sample "Computer Memory Hacking"

Computer Memory HackingHacking has become so common in today’s world that almost every person who uses computer and internet can be a victim of hackers. According to Ciampa (2009), a hacker is a person who uses advanced programming skills and techniques to break into any specific computer system (p. 16). Hackers can gain control of computer memory or RAM to commit theft of information or to steal private information. There are many important files that a person stores in the computer memory.

Hackers gain control of the system’s memory to access those files and manipulate them according to their needs. There exist some common tools that hackers normally use to intrude into the memory of computer systems. One of those common tools or techniques is inception. Using this technique, hackers present a serial bus protocol-2 using firewire interface to the machine of the targeted person. The operating system of the targeted computer connects the bus to the firewire port taking it as a SBP-2 device.

The targeted device lowers its protection level because of the use of Direct Memory Access by the hacker. This helps the hackers to gain read/write access to the RAM of the targeted computer system. Another common tool used by hackers is Memory Hacking Software. Hackers can use this software to gain access to the memory of the computer systems. There are such software programs available on the internet that hackers can download to intrude into the computer systems. There is a huge significance of hacking in organizations and modern society.

Hacking sometimes proves to be very disastrous because it provides access of files to the strangers who can use the information for illegal purposes. Therefore, organizations and individuals need to ensure the highest level of protection to their computer systems. Some of the easiest and most effective security measures include setting difficult passwords, regularly changing the login passwords, downloading a personal firewall, using cryptographic techniques, using authorization technique, setting encryption standards, and installing up to date antivirus software.

Three best practices that one should use to protect their computer(s) from being hacked include installation of antivirus applications, use of firewalls, and use of Wifi Protected Access (WPA) as access control system. Let us put some light on all of these three practices.Antivirus ApplicationsAntivirus applications are the most commonly used mechanisms for ensuring computer safety. “A virus is nothing but a malicious computer program written to muck up the workings of your computer by corrupting your hard disc and data files” (Ryan, 2011, p. 1). Antivirus applications scan the systems for malware and viruses, thus, making them safe and secure.

Firewalls Firewalls are able to judge all sorts of unauthorized access and protect the system from unauthorized attempts. “Firewall will prevent unauthorized access to your computer from any external source, and the settings can be varied from low security to high” (Ryan, 2011, p. 1). Firewalls not only prevent unauthorized attempts of hacking but also generate a log file that includes details of all connections that attempts to access the system.Wifi Protected AccessWPA and WPA2 are effective techniques for stopping unauthorized attempts.

WPA continuously keeps on changing the key as the result of which data becomes more secure. Wired Equivalent Privacy (WEP) was also a good technique earlier but it used to generate a single key that hackers and network attackers can easily crack. WPA2 uses Advanced Encryption Standard (AES) for encryption due to which it becomes secure than RC4-based WEP.ReferencesCiampa, M. (2009). Security+ Guide to Network Security Fundamentals (3rd ed.). Boston, MA: Cengage Learning.Ryan, J. (2011). Best Internet Security.

Retrieved from http://ezinearticles.com/?Best-Internet-Security&id=5899605

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Computer Memory Hacking Assignment Example | Topics and Well Written Essays - 500 words”, n.d.)
Computer Memory Hacking Assignment Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/information-technology/1667447-assignment-1-computer-memory-hacking
(Computer Memory Hacking Assignment Example | Topics and Well Written Essays - 500 Words)
Computer Memory Hacking Assignment Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/information-technology/1667447-assignment-1-computer-memory-hacking.
“Computer Memory Hacking Assignment Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/information-technology/1667447-assignment-1-computer-memory-hacking.
  • Cited: 0 times

CHECK THESE SAMPLES OF Computer Memory Hacking

Developing a Partial Risk and Mitigation Plan

2 hacking The ICT students may hack the schools' accounts, which would lead to loss of information and money.... Malware such as viruses, bugs and other destructive programs find their way into computers and other memory storage devices.... This results from the various memory storage devices that the students insert into the computers for instance the flash disks, memory cards, diskettes, external hard drives and hard disks....
3 Pages (750 words) Assignment

A Formulaic and Algorithmic Problem

When your computer gets too busy it may not complete the buffer loop in time to deliver its samples to the mixing bus, which, in turn, has to deliver to the driver/soundcard.... In the paper “A Formulaic and Algorithmic Problem” the author examines the algorithmic problem, which is a step-by-step problem-solving procedure that is completed in a finite number of steps and the formulaic problem is a set of symbols used in any procedure or algorithmic problems....
6 Pages (1500 words) Essay

COMPUTER RESEARCH PAPER (YOU PICK TOPIC)

It is fascinating that although a majority of people are familiar with computers, the concepts behind how they actually work have not been duly given emphasis, especially on how computer memory works.... (1990), “memory is the part of the computer that holds data and instructions for processing.... Although closely associated with the central processing unit, memory is separate from it.... memory stores program instructions or data for only as long as the program they pertain to is in operation....
5 Pages (1250 words) Research Paper

Computer Attacks and Their Counter Measures

The paper "Computer Attacks and Their Counter Measures" describes that to be able to mitigate the issues presented by the hacking of a wireless network, it would be necessary to use all the accessible tools in the router.... This article will analyze some of these modern computer attacks, how they happen and ways of mitigating them.... Through re-routing the communication to go through his computer, he can communicate with the different machines simultaneously....
6 Pages (1500 words) Essay

Specification for Directors PC Request

A standard office PC may not be up Having considered the requirements of the Director, it is proposed to buy high end computers that have separate graphics and memory cards from the motherboard.... Standard office computer utilizes the embedded GPU and RAM which is not adequate to perform video and graphics editing.... If the company however is strapped on cash, it can assemble its own computer by buying the parts that can perform the tasks required by the Director....
3 Pages (750 words) Essay

Data and Information in a Company - Essential Facilities That Should Be Properly Maintained and Protected

These viruses replicate themselves in the computers in the company's network corrupting important documents leading to their loss and if not checked, they attack the memory of the computer leading to total failure of the machines.... Teleworking or telecommuting is a terminology used to define the aspect of working from a remote location using a personal computer or a work station connected to the company's network than sending the information through the network (Fisher 2005 p 5)....
8 Pages (2000 words) Essay

How the Present Day Data Centers Are Turning to Virtual Data Centers

Hyper-V contains dynamic memory.... Virtualization centers on segregating the computer resources into several execution languages with the use of partition concepts.... Hyper-V allows the virtual machine used to run several operating systems together, starting and ending at the same time on a solo physical computer.... Virtual machines have gained popularity in the computer environment.... Such websites may steal information from the downloading computer and wreak havoc on the computers' processing time and processing output quality....
8 Pages (2000 words) Literature review

Evolution of Computer Technology

According to Cocke and Markstein (2000), memory system management refers to the allocation and security of portions of computer memory to different programs.... The paper "Evolution of Computer Technology" analyzes the revolution of computer technology, where the main factors that should be analyzed are interrelated and include Reduced Instruction Set Computers (RISC), pipelining, virtual, and cache memory.... The main stages of pipelining include fetching the instruction, decoding, execution, memory access, and write back (Cocke and Markstein, 2000)....
5 Pages (1250 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us