StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Analysis of Hacking Attacks - Coursework Example

Cite this document
Summary
The paper "Analysis of Hacking Attacks" states that Stuxnet has been proved to be able to control communication between PLC and Siemens programming station. It hides changes made to PLC and it is rated as one of the most sophisticated engineered worms…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95.5% of users find it useful
Analysis of Hacking Attacks
Read Text Preview

Extract of sample "Analysis of Hacking Attacks"

Download file to see previous pages

Hacker, as a subgroup, is classified depending on the intention and what leads an individual to indulge in it (Post, 1996). To be able to become a good hacker, one must acquire certain skills, make good acquaintance with the computer, networks and be of a high technological level (Howard, 1997). Hacking is not just carried out, but the attack is thoroughly planned with smaller details (Goldstein, 1997). This shows that the hackers are normally aware of committing the act and they select well the system to be hacked prior to the attack (Howard, 1997).

Computer attackers can generally be classified into three major types, namely: (a) unsophisticated ‘’script kiddies’’; these carry out the junk of the cyber intrusions, (b) crackers; these carry out cyberattacks for self-interest or malicious reasons, and (c) hackers; these are In more smart attackers who are guided more by their curiosity rather than being malicious. The three groups put their skilled expertise into vigorous practice in order to be able to suggest and identify ways to make the system better and destroy any lead that can be exploited.

This entire act they do without the system owner’s authority. In just one cyberattack, different actors may be involved with different ambitions they intend to achieve. This is not only possible with a single category of attackers (Harris, 2012).This term is normally used to describe the type of hackers who do not express the seriousness and lack the ethics in principals as practiced by professional hackers. Professional hackers do so with lots of knowledge, respect for skills and a sense of self-mentorship.

On the contrary, the script kiddies hackers like shortcuts in most of their hacking practice in order to get their hacking skills to go through (Harris, 2012). To gain access to computers, these hackers put into practice programs that were developed by different individuals which they have less idea about how they function.

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Analysis of Hacking Attacks Coursework Example | Topics and Well Written Essays - 6000 words, n.d.)
Analysis of Hacking Attacks Coursework Example | Topics and Well Written Essays - 6000 words. https://studentshare.org/information-technology/1802695-review
(Analysis of Hacking Attacks Coursework Example | Topics and Well Written Essays - 6000 Words)
Analysis of Hacking Attacks Coursework Example | Topics and Well Written Essays - 6000 Words. https://studentshare.org/information-technology/1802695-review.
“Analysis of Hacking Attacks Coursework Example | Topics and Well Written Essays - 6000 Words”. https://studentshare.org/information-technology/1802695-review.
  • Cited: 0 times

CHECK THESE SAMPLES OF Analysis of Hacking Attacks

IS Security and the Operating Systems

Security in both operating systems and applications is extremely crucial due to the increased threat of outside or inside attack.... An exploit of the operating system or application allows hackers to access operating systems and steal data or worse still destroy the hardware or software.... … IS Security Name: Tutor: Course: Date: University: IS Security Introduction Security in both operating 1systems and applications is extremely crucial due to the increased threat of outside or inside attack....
6 Pages (1500 words) Essay

Information Management Systems

hellip; Botnets have been used to for negative functions across the internet such as sending spam e-mails and participating in DDos attacks.... Botnets have been used to for negative functions across the internet such as sending spam e-mails and participating in DDos attacks.... This can lead to direct attacks by exploiting vulnerabilities such as password access through cracking.... Man in the middle attacks involves third parties on the internet making connections and sharing messages with other user on the network....
4 Pages (1000 words) Essay

Discriminating Can Save Lives

In terms of human rights case, racial profiling is basically a violation of human rights of any state or community within a state.... hellip; There are two schools of thoughts in United States when we discuss racial profiling.... Supporters of racial profiling conclude racial profiling is the best way to reduce the s of suspicion and criminal activities that are more likely to happen while on the other hand, critics of racial profiling rejects the idea of racial profiling as an activity of violating human rights and greatly humiliates the race which has many drawbacks....
4 Pages (1000 words) Essay

Importance of a PC Security

This report presents a detailed analysis of some of the important PC security management applications.... This report presents a detailed analysis of some of the important PC security management applications.... For this report I have selected three McAfee PC security management utilities for the overall analysis of PC security.... For effective tracking and detection of possible issues regarding virus and Trojan Horse attacks High quality and fast detection processI have used for my system security scanning....
3 Pages (750 words) Essay

Man in the middle and secrity in multichannel

)Works CitedAl-Fairuz, M and Renaud, K 2010, Multi-channel, Multi-level Authentication for More Secure eBanking 2010, Viewed 9 March 2012, Christianson, B and Li, J 2012, Multi-channel Key Agreement using Encrypted Public Key Exchange 2012, Viewed 9 March 2012, Diaz, J et al 2012, Formal security analysis of registration protocols for interactive systems: a methodology and a case of study2012, Viewed 9 March 2012, Lin, P 2010, IP ADDRESS SECURE MULTI-CHANNEL AUTHENTICATION FOR ONLINE TRANSACTIONS 2010, Viewed 9 March 2012, OWASP 2009, Man-in-the-middle attack 2009, Viewed 9 March 2012, Search Security 2012, man in the middle attack (fire brigade attack) 2012, Viewed 9 March 2012, < http://searchsecurity....
2 Pages (500 words) Essay

Web Application Security

The paper critically discusses the dangers of SQL injection in terms of website attacks that affects most individuals and organizations.... The incorrectly filtered escape characters are some of the methods that render the websites of the organizations vulnerable to attacks.... analysis Vulnerability and common scenarios Several forms of attack by the SQL injection are used by most attackers to access the database of the targeted websites....
6 Pages (1500 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us