Words of Wisdom:

"isn't it wierd when u dream your eating chocolate pudding and u wake up with a spoon in your ass" - Graeffsgirl

Hackers and Computer Security, Are You Protected?

  • Date Submitted: 05/27/2010 12:48 PM
  • Flesch-Kincaid Score: 50.4 
  • Words: 522
  • Essay Grade: no grades
  • Report this Essay
Running head: ENG105 HACKING AND COMPUTER SECURITY

ENG105 Hackers and Computer Security
Dr. Lynn Moore
By Leslie Johnson
ENG105-1002B-20, IP-2

Hacking and Computer Security
2. Evaluate sources
Hacking in to the mind of a hacker – Material to use
  * Hackers in general, and computer criminals in particular, love the power of control
  * Hackers compromise databases, and products to find holes in the security
      * They do these things to find ways to better the security
      * Hackers are normally the ones working for a company to find these flaws
  * Many companies let hackers get away with it
      * 50% are not reported
      * Companies fear bad publicity
  * Any business with a W
  * Web site is a target
  * They cause the most damage with theft and fraud
      * Break ins and virus attacks ballooned in 2003 to 138000 from 82000 prev. year
  * Total annual loss of $70.1 million due to theft, $65.6 million due to denial of service, compared to $27.3 from viruses – says a survey form the FBI(503 respondents)
How to become a better hacker – Material to use
  * You will need a basic thrill form solving problems, sharpening your skills, and exercising your intelligence (pg4)
  * No problem should be solved twice
  * Boredom and drudgery is evil – you should love what you do and solve new problems (pg5)
  * Freedom is good
      * Don’t like to get ordered around
      * Anti-authoritarian
  * Attitude is no substitute for competence
      * Especially for competencyat hacking
      * Competene at demanding skills that few can master is especially good (pg6)
  * Hackers are the good guys and “crackers” are the ones who give hackers the bad name
      * They are the ones who steal and break in to systems “UNWANTED”
ID thieves targeting universities
  * In 2006 hackers (crackers) breached a database of some major universities
  * Stole 173,000 records alone at Ohio University
  * Obtain personal information...

Comments

Express your owns thoughts and ideas on this essay by writing a grade and/or critique.

  1. No comments