• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Hacking today.

Extracts from this document...

Introduction

HACKING As given in the dictionary, hacking means to break into or use a computer network or use a system without authorization, as a hacker might do. Personal computers came into this world about 25 years back and revolutionised the world. It led to modernization and paved the path for greater human advancement,even in the space. They help us in almost every way but nowadays they are also in danger. Danger from humans. Hacking is the word.some people for various ways cause destruction to ones computer by either spying on it by hacking the system servers or logging on to someone's pc ust for fun which is awfully wrong and shouldnt be done.Privacy has become the thing of the past. ...read more.

Middle

The best targets are the biggest companies which have huge branches with turnovers of several crores.Governments of the world should start recognizing it has a worldwide problem which needs to care of as fast as possible. Even an individual should protect himself from the dark and dungy place called internet where all the 'stuff' takes place. The best way is by using a firewall and other security sofwares avaible.Even anti-virus companies provide such software. First and foremost way government can help is that ,they can track the hackers and arrest them as quickly as possible but it is not easy when there are millions and millions of hackers around the world! ...read more.

Conclusion

Where can a hacker find such tools? On the Internet, of course. Sites containing dozens of free, relatively easy-to-use hacking tools available for download are easy to find on the Net. While understanding how these tools work is not always easy, many files include homegrown documentation written in hacker shoptalk. Among the programs available are scanning utilities that reveal the vulnerabilities on a computer or network and sniffing programs that let hackers spy on data passing between machines. Hence, it is a problem which can only be solved with the help of online community and using the ways the hackers so. Turning the tables against their own tools is the only way out of this mess. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Information Systems and Communication section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Here's what a star student thought of this essay

3 star(s)

Response to the question

In summary, the report shows a basic understanding of 'hackers'. However their opinion on how 'easy' this is, is invalid and false. It's clearly shown that there haven't undertake the appropriate background research. The report mentions how hacking could be ...

Read full review

Response to the question

In summary, the report shows a basic understanding of 'hackers'. However their opinion on how 'easy' this is, is invalid and false. It's clearly shown that there haven't undertake the appropriate background research. The report mentions how hacking could be achieved by those with little skill. This is simply false, and is in-correct. A successful 'hack' is usually from a person who has studied a Computer Science degree at University. Hacking is quite difficult, and is deponent on the attack. The report states how governments should arrest hackers. However this shows a clear misunderstanding of how hackers are dealt with. As there are a number of police services which try and track hackers, however as there are trying to seek a hacker, the hacker will usually undertake the process of 'mask'. This means that the hacker will hide their identify, making this almost an impossible task.

Level of analysis

The report states that large companies and governments are being attacked by hackers. However the report doesn't mention the reason being this. The report could mention something on the lines of 'Hackers will target those websites which has sensitive data, along with sites which has a large quantity of data. Thus, this means that hackers often target government websites and large companies'.

Quality of writing

Some of the grammar is in-correct, as the report states 'word.some'. This should be re-placed to 'word. Some'. The misuse of grammar is though-out the report, and the student will need to re-read the report and correct were appropriate. The report mentions the term 'Firewall', however doesn't explain this or doesn't even describe what this term is. This term is useless within the report, unless it's explained.


Did you find this review helpful? Join our team of reviewers and help other students learn

Reviewed by danielbeal 23/02/2012

Read less
Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Information Systems and Communication essays

  1. Marked by a teacher

    Database Coursework on a Vehicle Rental System: Analysis

    5 star(s)

    This feasibility report will be taking five factors into consideration: technical feasibility, economic feasibility, legal feasibility, operational feasibility and schedule feasibility. If the results of my feasibility report demonstrate that the business would benefit from a new information system, and that such a system is able to be developed given

  2. Marked by a teacher

    Application Software

    Drawing lines of various thicknesses 2. Smudging 3. Spray painting 4. Collage layers 5. Altering brightness 6. Colour levels Web Authoring Examples include Macromedia Dreamweaver, KompoZer and Microsoft Front Page. Ten years ago anybody wanting to create a webpage had to write the HTML code manually.

  1. transmission of care values

    (Chambers Online, 2007) Maslow (1970) thought that human needs were on five levels, and set these out in a pyramid as below. Barriers to communication might block human need. (tutor2u Online, 2007) Physiological Needs - Stress can be caused by ineffective communication, and stress can cause physical health to suffer.

  2. Assignment 1 unit 7 Security Assessment Report (.coursework.info)

    Staff should also be trained in data management. This is keeping your files in a structured and organised fashion, having sensible file names and folder names, knowing what should and should not be deleted, knowing how to achieve deleted items, and knowing what to do when other office programmes crash and knowing where you can get the autosave files from.

  1. Threats to Data

    can be damaged or lost, or just as easily stolen and used for I.D fraud. Overall and adverse situations or damages that can occur happen to customers' data can cause a transactional website, to loose control over the management of every aspect of the business at the controlling end.

  2. A2 ICT CouseWork

    What can be done to reduce these Problems? An online website works like a large promotion for the Business; it promotes what we do, (we sell different services) and where we are (business Details). Meaning that customers now have many more ways of contacting us and finding out about our

  1. ict as level coursework

    I will create a system where the employee will fill out details of the client whilst on the phone to them. Input Processing Output Title Drop down list Mr, Mrs, Ms, Miss, Dr Forename Text box-validation check Forename Surname Text box-validation check Surname Address 1 Text box-validation check House number

  2. Definition of communication

    A clear voice in speaking and or presentation is required for sender to assure that recipient understand the message as what he believes. Example: A stutter person would not fit a position in which he should present a data or information.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work