. Hacking in it self is not a crime. It is otherwise known asunauthorised access.
. There are clubs devoted to hacking. In Germany, Holland etc, discusstechniques etc.
. Much of hacking is treated as intellectual training. Costs us a lot ofexpenses to protect our computers. Companies spend millions of poundsprotecting themselves.
. A lot of hacking done by past employees seeing as they have passwordsetc. insiders knowledge.
. At one level the motive for the doing is the challenge.
. Software comes with default user names and passwords which make iteasy for the hacker to access.
. FRAUD. Large companies employ hackers to access enemy’s hackers and totest companies system.
. Electronic crime is low risk high yield. The banks are not keen onpublishing they have been fucked.
. Credit cards stolen then used for hackers own use. (Fraudulentpurchase) . Theft of data. Industrial espionage. Breaking into factory and seeinghow things are made. Plans for future products, contact lists etc.
IDENTITY THEFT, a criminal can take over someone else’s identity.
Thiscan cause a lot of damage. Someone has passed themselves off as DavidBlunkett, blind MP.
. data can be stolen by illegally hacking into a computer anddownloading data and or by stealing an actual computer (laptop) don’taccess someone’s password from their computer, take out the hardiskand plug it into your computer. The files on the CIA’s computers areencrypted.
. When accessing the net, you download files that you know nothingabout, paedophilia etc.
. FRAUD ON THE INTERNET, one of the weaknesses of the net is the lack ofcontrol; it is not controlled by any one person.
. Goods can be offered for sale but never delivered, fraud.
. Offers downloads, pays for it and never gets the goods.
. There are certain schemes which provide some assurance.
. Sites that you hand out your credit card number should have SSL -Secure Socket Layer. This encrypts data at my end and at the other sothat no nosey hackers can access it. The URL also starts with http,and a closed padlock at the bottom of the screen, which shows the siteis secure.
. In the UK, reputable web-sites may have the ‘Which’ (consumer service)logo on the site.
. VIRUS’, now can spread much faster than in previous years. The biggestdistributor of viruses is email not floppy anymore. ORIGINATION -programmer creates programme to cause mischief and or distress.
TRANSMISSION – often the virus is attached to a normal program. Itthen copies itself to other software on the hard disk. You can intheory track down the origin of the virus, IP address etc. INFECTION -there are virus’ that are bollocks and others that completely mess upyour computer. BIOS chip can be erased, therefore causing you to buy anew motherboard. The worst ones cause subtle destruction. Over aperiod of months the virus mess’s up your work and can cause ofbankruptcy. This can also affect hospitals and anywhere that uses acomputer system.
. LOGIC BOMBS – similar to a virus, may be delivered by a virus.
. Can be written to destroy, or even subtly alter the contents of acomputer system.
. May require a further signal for activation . May require a further signal to prevent activation, as in case ofextortion . Sometime may cause companies to hand over money.
. Many organisations would not want to have the shitty security exposed.
For example banks etc, however secret service etc doesn’t give amonkeys and will expose the hacker.
. DIGITAL CRIMES – computer misuse act of 1990: . 1. unauthorised access to computer programs or data . 2. unauthorised access with a further criminal intent . Software copyrights. Covered by – copyright designs and patents act of1988 . It is illegal to run pirated software. It is illegal to create a copyblalbalbalbala.
Cite this HACKING Essay
HACKING Essay. (2019, May 10). Retrieved from https://graduateway.com/hacking/