Computer Memory Hacking - Assignment Example

Comments (0) Cite this document
This essay analyzes hacking, that has become so common in today’s world that almost every person who uses computer and internet can be a victim of hackers. According to Ciampa (2009), a hacker is a person who uses advanced programming skills and techniques to break into any specific computer system…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER97.2% of users find it useful
Computer Memory Hacking
Read TextPreview

Extract of sample "Computer Memory Hacking"

Computer Memory Hacking
Hacking has become so common in today’s world that almost every person who uses computer and internet can be a victim of hackers. According to Ciampa (2009), a hacker is a person who uses advanced programming skills and techniques to break into any specific computer system (p. 16). Hackers can gain control of computer memory or RAM to commit theft of information or to steal private information. There are many important files that a person stores in the computer memory. Hackers gain control of the system’s memory to access those files and manipulate them according to their needs.
There exist some common tools that hackers normally use to intrude into the memory of computer systems. One of those common tools or techniques is inception. Using this technique, hackers present a serial bus protocol-2 using firewire interface to the machine of the targeted person. The operating system of the targeted computer connects the bus to the firewire port taking it as a SBP-2 device. The targeted device lowers its protection level because of the use of Direct Memory Access by the hacker. This helps the hackers to gain read/write access to the RAM of the targeted computer system. Another common tool used by hackers is Memory Hacking Software. Hackers can use this software to gain access to the memory of the computer systems. There are such software programs available on the internet that hackers can download to intrude into the computer systems.
There is a huge significance of hacking in organizations and modern society. Hacking sometimes proves to be very disastrous because it provides access of files to the strangers who can use the information for illegal purposes. Therefore, organizations and individuals need to ensure the highest level of protection to their computer systems. Some of the easiest and most effective security measures include setting difficult passwords, regularly changing the login passwords, downloading a personal firewall, using cryptographic techniques, using authorization technique, setting encryption standards, and installing up to date antivirus software.
Three best practices that one should use to protect their computer(s) from being hacked include installation of antivirus applications, use of firewalls, and use of Wifi Protected Access (WPA) as access control system. Let us put some light on all of these three practices.
Antivirus Applications
Antivirus applications are the most commonly used mechanisms for ensuring computer safety. “A virus is nothing but a malicious computer program written to muck up the workings of your computer by corrupting your hard disc and data files” (Ryan, 2011, p. 1). Antivirus applications scan the systems for malware and viruses, thus, making them safe and secure.
Firewalls are able to judge all sorts of unauthorized access and protect the system from unauthorized attempts. “Firewall will prevent unauthorized access to your computer from any external source, and the settings can be varied from low security to high” (Ryan, 2011, p. 1). Firewalls not only prevent unauthorized attempts of hacking but also generate a log file that includes details of all connections that attempts to access the system.
Wifi Protected Access
WPA and WPA2 are effective techniques for stopping unauthorized attempts. WPA continuously keeps on changing the key as the result of which data becomes more secure. Wired Equivalent Privacy (WEP) was also a good technique earlier but it used to generate a single key that hackers and network attackers can easily crack. WPA2 uses Advanced Encryption Standard (AES) for encryption due to which it becomes secure than RC4-based WEP.
Ciampa, M. (2009). Security+ Guide to Network Security Fundamentals (3rd ed.). Boston, MA: Cengage Learning.
Ryan, J. (2011). Best Internet Security. Retrieved from Read More
Cite this document
  • APA
  • MLA
(“Computer Memory Hacking Assignment Example | Topics and Well Written Essays - 500 words”, n.d.)
Computer Memory Hacking Assignment Example | Topics and Well Written Essays - 500 words. Retrieved from
(Computer Memory Hacking Assignment Example | Topics and Well Written Essays - 500 Words)
Computer Memory Hacking Assignment Example | Topics and Well Written Essays - 500 Words.
“Computer Memory Hacking Assignment Example | Topics and Well Written Essays - 500 Words”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Computer Memory Hacking

Ethical Hacking

...Ethical Hacking 1. Threats There have been many cyber attacks in the past that have weighed heavily on the shoulders of the victims. Three of the many examples are described here. Black Hat Crackers worked to take advantage of computer systems, and Jonathan James has been a big name among black hat crackers. He was sentenced at the age of sixteen and told the press that all he did was for fun. One instance of his great hacking is installing a backdoor into a Defense Threat Reduction Agency server and hacking sensitive information and employees’ data. In June 2005, the computer specialist, Michael Haephrati and his wife Ruth, who belonged to London,...
5 Pages(1250 words)Research Paper

Email Hacking

...are in the position to not only subjugate the rights of others but also offend their rights. The technology-savvy people can easy use the Internet to hack into the computer systems so that they can steal money, infect others’ computers with viruses, and change information in their private profiles. Emails are frequently used for business transactions these days. People use email to share vital information with one another. Hacking of an email account can yield disastrous results for the account owner and not many people are quite technically skilled enough to recover their email accounts after they have been hacked. This paper discusses several ways in...
9 Pages(2250 words)Essay

Ethical Hacking

...ETHICAL HACKING Ethical Hacking According to Raymond, the term 'Hacker' has a dual usage in the computer world. Originally, the term was defined as: HACKER noun 1.A person who enjoys learning the details of computer systems and how to stretch their capabilities-as opposed to most users of computers, who prefer to learn only the minimum amount necessary. 2. One who programs enthusiastically or who enjoys programming rather than just theorizing about programming (Raymond, 1991). From the above definition it is clear that, the original idea behind hacking has nothing malicious in its intent. According to me hacking is...
2 Pages(500 words)Essay


...Topic: External stimuli performance Approximate word count: 600. Memory can be defined as the capa of an organism to remember and recall objects, items, events, individuals, etc. Although, memory, generally, is associated with brain and nervous system of an organism; immunological memory defined as the capability of an organism's immune system to recognize a pathogen on subsequent encounters, may not have anything to do with brain or the nervous system. Human beings represent the highest point of evolution with regard to all types of memory; memory has also been demonstrated in almost all animals irrespective of whether they are vertebrate or...
2 Pages(500 words)Essay


...Memory is a process of storing and retention of information sent by sensory organs which is then interpreted as per the requirements of the events. It is one of the main functions of the brain which is used on a daily basis and the more it is used and manipulated, the stronger it becomes in terms of retention of information for a longer time and comprehension of the same. The following three types of memories are discussed as below: Episodic Memory This type of memory is closely linked to the events and object reality of association and therefore, contextual in nature. It is for these reasons that some places and things look familiar and may trigger a sequence of...
2 Pages(500 words)Research Paper

Hacking Exposed

...Hacking Exposed Hacking Exposed In an article en d Jonathan James – 15 Year-Old Cybercriminal Who Hacked NASA published in the website What’s the latest? on June 20, 2010 revealed the criminal escapade involving hacking. The US Legal define computer hacking as “intentionally accesses a computer without authorization or exceeds authorized access” (US Legal, 2010, par. 1). Jonathan James, then 15 years of age, hacked the following organizations: NASA, Defense Department, and the Marshall Space Flight Center. The resulting damages were: $1.7 million software stolen from NASA; viewing the Defense Threat Reduction Agency server, the agency of the Department of Defense; and “downloaded the proprietary environmental control software... for the...
2 Pages(500 words)Essay

Ethical Hacking

.... It can be used to protect an organization against an attack because it spots out and potentially prevents intrusions that breach the system’s firewalls or those that occur behind the local area network (LAN) or the firewall (IATAC, 2009, p.3). Thus, IDS can provide organizations real-time or near-real-time monitoring of a host or a network and defend them from hacking. IDS and Detection of Footprinting stages IDS cannot always detect footprinting stages. The wrong results in an IDS are categorized into two kinds: false positives and false negatives (IATAC, 2009, p.4). False positives happen when an IDS wrongly sees a problem with benign traffic (IATAC, 2009, p.4). False negatives take place when malicious traffic is...
2 Pages(500 words)Essay


...IT infrastructures within their business premises for gaining competitive edge in the business market. As all the companies have started utilizing the latest IT systems, the computer hacking has become the biggest threat for the computer and Internet users. The word ‘hacker’ was coined by John Nash in 1980s who was a famous mathematician on the international level. In 1972, the first technology for hacks was determined; a single whistle from the box ‘Cap n’ Crunch’ was being used for making long distance phone calls free of any charge (Himma, 2007). In 1981, Ian Murphy hacked data of AT&T and changed the clocks so that people could avail late night...
12 Pages(3000 words)Essay

Ethical hacking

... Press. McLaughlin, S., Podkuiko, D., Miadzvezhanka, S., Delozier, A., & McDaniel, P. (2010, December). Multi-vendor penetration testing in the advanced metering infrastructure. In Proceedings of the 26th Annual Computer Security Applications Conference (pp. 107- 116). ACM. Wilhelm, T. (2013). Professional Penetration Testing: Creating and Learning in a Hacking Lab (Vol. 1). Newnes.... [Penetration testing documentation] By Introduction The Xen show of virtual machines offered our understudies serverautonomy giving every learner control of a neighborhood arrangement and of a remarkable IP address on the "virtual" system for each one server so that people could work in groups, incorporating in separation taking in circumstances, and...
8 Pages(2000 words)Essay

Computer Hacking

...Computer Hacking Introduction Ever since its commencement during the late 90s, the internet has been triumphant in inclining a gigantic number of computer users in different parts of the globe. Additionally, from the day one until today, the internet has now become a journey; starting from a single network to an environment of millions of computers connecting with each other through various sources (Erickson, pp. 23-25). Users are now using dial-ups, gateways, ISPs, etc to connect to the internet for various educational, social, political, and personal reasons. In other words, internet has now become a global village that only requires a computer and a...
14 Pages(3500 words)Dissertation
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Assignment on topic Computer Memory Hacking for FREE!

Contact Us