• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

What motivates hackers?

Extracts from this document...


Hacking is defined as unauthorised access to data held on a computer system. The extent of hacking is extremely difficult to establish as it is only discovered by accident, with only about two percent of security breaches discovered as a result of positive action on the part of security staff. What motivates hackers In the past, hackers mostly went after servers this is because historically servers tended to have the most interesting data and, of course, the best connectivity to the rest of the Net. Servers are also more vulnerable. A machine that isn't listening on any ports can't easily be infiltrated. Nowadays hacking is often perpetrated by employees of a company who have acquired inside knowledge knowledge of particular user ID's and passwords. ...read more.


The important thing is having two network cards or MAC addresses, forcing network traffic through the proxy software. Another solution is a stand alone firewall device between your computer, or network and the Internet. these devices have drastically dropped in price recently and can be purchased for under $200.00. What You Can Do For the moment, at least, home firewalls aren't the answer. There are already packages on the market that claim to shield your PC from attacks. Some ISPs are putting in filters of their own to guard the most vulnerable areas, notably Windows file system sharing. Special software can be installed on a computer system which will maintain an 'audit trail' for who has logged on, from which terminal and for how long. This will enable any unusaual activity to be spotted and investigations be made. Some common forms of hacking... ...read more.


Trojans horse programs are "back doors" into a computer system. A hacker may disguise a trojan as another program, video, or game, in order to trick a user into installing it on their system. Once a Trojan is installed, a hacker could have access to all the files on a hard drive, a system's email, or even to create messages that pop up on the screen. Trojans are often used to enable even more serious attacks. By hiding programs to be run later, hackers might gain access to other networks. The simplest Trojan horse replaces the messages shown when a login is requested. Users think they are logging into the system, so they provide their usernames and passwords to a program that records the information for use by the hacker. The most famous Trojan horse to date is probably Back Orifice, once installed, this program gives the user access and control over any computer running a Windows 95/98 operating system or later. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Peer reviewed

    Principles of Computer Networks

    3 star(s)

    The standard 802.3 can be related to this topic because CSMA/CD monitors traffic on the line at transmitting stations. If there is no transmission then simply the station wanting to transmit will transmit and if there is a second station transmitting as well then this causes a collision and this is detected by all the station wanting to transmit.

  2. Firewall Protection

    Some Windows operating systems, especially those which are not meant for home uses, offer other public services by default, such as RPC. A firewall can identify communication efforts to them, and block them. Since such services listen to remote communications, there is a potential risk when there are efforts to

  1. Smart Card System

    only store and a little hardware that prevent the stores data being used by other unauthorized people unless there are password or pins are input correctly. * Shared-key cards - This card allows communication with any device that have the same keys.

  2. Flexible Architectures in Communication Security Application

    each application of the cipher kernel, the number of rounds executed within the cipher kernel, the author of the algorithm, and popular applications that use the cipher. Cipher algorithms typically have three operational parameters: key size, block size, and number of rounds.

  1. Investigating Visual Programs

    * Variables declared in a procedure (or undeclared and just used) are "local" to the procedure. * Variables declared in the declarations section of a module are "module", available to all procedures in the module/form. * Variables declared as Public in a module are "global", can be used by all procedures in the program.

  2. CP3 - Proposed Solution to a Realistic Problem - Apartment Administration software

    If the user of the system makes a mistake then it is likely they do not know about it. This could affect the usability of the system. * Confusing - There are so many parts to the system it can becoming confusing to use.

  1. Trojan horse

    Then when you open the zips a message will come up. Then the worm can go though all the files on your computer and delete or damage them whenever they want to. The worm can be deleted by.... Removal Instructions of the worm Symantec Security Response has provided a small

  2. The Von Neumann Machine

    � Registers � Memory Management Unit (MMU) These are interconnected by an internal bus system. The control unit provides the necessary timing and control signals to all the operations in the microcomputer. It controls the flow of data between the microprocessor and memory and peripherals. The control unit controls the rest of the processor by generating appropriate control signals.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work