StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Nobody downloaded yet

Analysis of Hacking Attacks - Coursework Example

Comments (0) Cite this document
Summary
The paper "Analysis of Hacking Attacks" states that Stuxnet has been proved to be able to control communication between PLC and Siemens programming station. It hides changes made to PLC and it is rated as one of the most sophisticated engineered worms…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER94.6% of users find it useful
Analysis of Hacking Attacks
Read TextPreview

Extract of sample "Analysis of Hacking Attacks"

Download file to see previous pages Hacker, as a subgroup, is classified depending on the intention and what leads an individual to indulge in it (Post, 1996). To be able to become a good hacker, one must acquire certain skills, make good acquaintance with the computer, networks and be of a high technological level (Howard, 1997). Hacking is not just carried out, but the attack is thoroughly planned with smaller details (Goldstein, 1997). This shows that the hackers are normally aware of committing the act and they select well the system to be hacked prior to the attack (Howard, 1997).
Computer attackers can generally be classified into three major types, namely: (a) unsophisticated ‘’script kiddies’’; these carry out the junk of the cyber intrusions, (b) crackers; these carry out cyberattacks for self-interest or malicious reasons, and (c) hackers; these are In more smart attackers who are guided more by their curiosity rather than being malicious. The three groups put their skilled expertise into vigorous practice in order to be able to suggest and identify ways to make the system better and destroy any lead that can be exploited. This entire act they do without the system owner’s authority. In just one cyberattack, different actors may be involved with different ambitions they intend to achieve. This is not only possible with a single category of attackers (Harris, 2012).
This term is normally used to describe the type of hackers who do not express the seriousness and lack the ethics in principals as practiced by professional hackers. Professional hackers do so with lots of knowledge, respect for skills and a sense of self-mentorship. On the contrary, the script kiddies hackers like shortcuts in most of their hacking practice in order to get their hacking skills to go through (Harris, 2012). To gain access to computers, these hackers put into practice programs that were developed by different individuals which they have less idea about how they function. ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Analysis of Hacking Attacks Coursework Example | Topics and Well Written Essays - 6000 words, n.d.)
Analysis of Hacking Attacks Coursework Example | Topics and Well Written Essays - 6000 words. https://studentshare.org/information-technology/1802695-review
(Analysis of Hacking Attacks Coursework Example | Topics and Well Written Essays - 6000 Words)
Analysis of Hacking Attacks Coursework Example | Topics and Well Written Essays - 6000 Words. https://studentshare.org/information-technology/1802695-review.
“Analysis of Hacking Attacks Coursework Example | Topics and Well Written Essays - 6000 Words”. https://studentshare.org/information-technology/1802695-review.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Analysis of Hacking Attacks

Ethical Hacking

...Analysis of Hacking Attacks... Analysis of Hacking Attacks... Hacking 1. Threats There have been many cyber attacks in the past that have weighed heavily on the shoulders of the victims. Three of the many examples are described here. Black Hat Crackers worked to take advantage of computer systems, and Jonathan James has been a big name among black hat crackers. He was sentenced at the age of sixteen and told the press that all he did was for fun. One instance of his great hacking is installing a backdoor into a Defense Threat Reduction Agency server and hacking sensitive information and employees’ data. In June 2005, the computer specialist, Michael Haephrati and his wife Ruth, who belonged to London, were caught sending Trojan horse softwares ...
5 Pages(1250 words)Research Paper

Hacking Exposed

...Analysis of Hacking Attacks... Analysis of Hacking Attacks... Hacking Exposed (College Hacking Exposed Adrian Lamo Adrian Lamo is a green hat hacker who hacked a seriesof high-profile computer networks including those of The New York Times, Microsoft, and Yahoo. However, his most notorious computer crime was committed against The New York Times in 2002 when he unauthorizedly accessed into its Times’ private intranet. According to Poulsen (2002), by this hacking, he got unauthorized access mainly into paper’s social security numbers, customers’ order details, and “WireWatch” keywords. The most notable element of Lamo’s hacking activity was that he could access a database of 3000 contributors. Similarly, he could acquire social security numbers of...
2 Pages(500 words)Essay

Ethical hacking

...Analysis of Hacking Attacks... Analysis of Hacking Attacks... 245CT: Ethical Hacking Word Count: 2,000 (8 pages) 245CT Ethical Hacking Lab Book work) Session 11 - Semester 2 Sur First Name: SID: Lab Day: Wednesday Lab Time: Lab: 11.00 – 13.00 AS236 & ASG22 This lab book constitutes 50% of your overall module mark for 245CT, so it is VERY IMPORTANT! Index 245CT: Ethical Hacking 1 1 245CT 2 Ethical Hacking 1 2 Lab Book (Coursework) 2 This lab book constitutes 50% of your overall module mark for 245CT, so it is VERY IMPORTANT! 2 Index 3 Coursework 4 Lab 2 - Essential TCP/IP tools 5 Note: Use right-click/Update Field/Update Entire Table/OK to refresh the index above when you have added a new lab to the lab book. This note will self-destruct after you ...
8 Pages(2000 words)Coursework

Ethical Hacking

...Analysis of Hacking Attacks... Analysis of Hacking Attacks... Ethical Hacking Ethical issues have been raised concerning the use of hackers to secure the network systems of companies, from other hackers with malicious intent. Some have argued that the ethical issues concerned are not related to the hacking itself but vary according to what the different members of the society may think. It is a situation where ethics are judged, not by the universal definitions concerning hacking, but according to the society within which the use of ethical hackers has become commonplace. Introduction Ethical hacking describes the procedure where individuals are employed by companies to attack the companies’ computer systems so that their vulnerabilities can be...
5 Pages(1250 words)Research Paper

Ethical Hacking

...Analysis of Hacking Attacks... Analysis of Hacking Attacks... HACKING Ethical Hacking According to Raymond, the term 'Hacker' has a dual usage in the computer world. Originally, the term was defined as: HACKER noun 1.A person who enjoys learning the details of computer systems and how to stretch their capabilities-as opposed to most users of computers, who prefer to learn only the minimum amount necessary. 2. One who programs enthusiastically or who enjoys programming rather than just theorizing about programming (Raymond, 1991). From the above definition it is clear that, the original idea behind hacking has nothing malicious in its intent. According to me hacking is justified, provided the intent behind performing a hack is not destructive. To...
2 Pages(500 words)Essay

Hacking Attacks on Websites and Mobile Commerce (M-commerce) Crime

...Analysis of Hacking Attacks... Analysis of Hacking Attacks... Hacking Attacks on Websites and M-Commerce Crime Emerging cybercrimes have brought intense website hacking which is a major threat for the e-commerce business owners. The plethora of internet use and vulnerable computer networks has invited internet masters to hack all the personal websites and top rated portals. Topic ONE: Hacking Attacks on Websites Due to a large number of cybercrimes it has become mandatory that system administrators and website owners should develop a complete protection system which can become shields for their pages from hacking groups. Website threats are often deceptive like malwares or exploited websites, which exhibit companies’ online networks. Malwares can ...
1 Pages(250 words)Essay

Hacking

...Analysis of Hacking Attacks... Analysis of Hacking Attacks... Security “Hacking” AFFILIATION: Table of Contents Table of Contents 2 Internet Security“Hacking” 3 Brief Introduction of Hacking 3 Motivating factors for hackers 4 Characteristics of hackers 5 Impact of hacking on society / Security on Internet 6 Security issues in electronic transactions 7 Number of Visa users worldwide 8 Facts and figures about electronic crimes worldwide 9 Real life examples of hacking 10 Protection measures against hacking 10 Conclusion 12 References 13 Appendix - Vocabulary 15 Internet Security “Hacking” Brief Introduction of Hacking With the advent of time and development in the technological world, everything has become dependent on Information Technology (IT) a...
12 Pages(3000 words)Essay

A Forensic Investigative Response Approach for Suspected Security Breach

...Analysis of Hacking Attacks... Analysis of Hacking Attacks... forensic investigative response approach for suspected security breach: Of late, wide scale cyber-attacks have buttressed that security and safety safeguards of ICT (information and communication technology) in many essential infrastructures are obviously not adequate as the aimed attacks perused by talented individuals or organizations. One can witness huge economic losses if there is attack on ICT systems used by the industries. For instance, the Stuxnet malware that eventually destabilized about 1000 numbers of enrichment of Uranium centrifuges in Natanz in Iran which is most famous reported illustration of ICT attack affecting ICS (Industrial Control System). Stuxnet attack exposes ...
6 Pages(1500 words)Case Study

Computer Hacking

...Analysis of Hacking Attacks... Analysis of Hacking Attacks... Computer Hacking Introduction Ever since its commencement during the late 90s, the internet has been triumphant in inclining a gigantic number of computer users in different parts of the globe. Additionally, from the day one until today, the internet has now become a journey; starting from a single network to an environment of millions of computers connecting with each other through various sources (Erickson, pp. 23-25). Users are now using dial-ups, gateways, ISPs, etc to connect to the internet for various educational, social, political, and personal reasons. In other words, internet has now become a global village that only requires a computer and a connection as its requisites and...
14 Pages(3500 words)Dissertation

How Hacking and Cyber-Attacks Compromise on Sensitive Information

...Analysis of Hacking Attacks... Analysis of Hacking Attacks... A critical review on 3 journal papers A critical review on 3 journal papers It is undoubtedly certain that with new technological innovations in the IT sector, cases of hacking and rising issues concerning cyber security have equally been on the rise. These three articles take us through the various forms of vulnerabilities that companies face from potential hackers and give us an overview on the steps companies can take to improve security. Fundamentally, the articles address the major issue of prevalent cyber-attacks on small business as they are less vigilant in putting strong security on their data. This issue is important since hacking and cyber-attacks compromise on sensitive info...
10 Pages(2500 words)Annotated Bibliography
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Coursework on topic Analysis of Hacking Attacks for FREE!

Contact Us