Question
Hackers have a number of reasons for breaking through network security. Some do it just for the challenge, others for information, some for fame and
Hackers have a number of reasons for breaking through network security. Some do it just for the challenge, others for information, some for fame and some for honing their programming skills. Whatever the reason, hacking causes damage to the computing devices of individuals and businesses, sometimes resulting in millions of dollars lost.
Financial Losses
Every year, reports of hacked businesses reveal staggering financial losses as a result. In 2011, Sony lost $170 million due to a hack of their PlayStation system. Also in 2011, CitiGroup lost $2.7 million and AT&Tlost $2 million as a result of hackers. The cost of patching the holes in security, repaying customer losses, addressing lawsuits and weathering shutdowns of their systems contributed to those huge numbers. Even for an individual who loses his credit card information to a hacker, however, the cost of repairing damage and tracking down the culprit can be significant.
Loss of Information
Hacking often results in a loss of data due to files being deleted or changed. Customer information and order information can be stolen and deleted, or a leak of top secret information could cause real-world security issues. Servers at the Pentagon, FBI, Interpol and NASA have all been compromised at various points in the past ten years. Sometimes, these hackers even post information from these governmental organizations online, which could in theory cause unrest between countries.
Decreased Privacy
When hackers gain access to your computer, they can see everything. Since much of the personal, professional and financial parts of our lives have moved online, we risk losing much more than money or information. Because of the Internet, privacy is limited, usually by choice. A hacker with access to your email, social networking accounts and personal photos can very quickly destroy that privacy.
Damaged Reputation
Companies that get hacked have a bigger problem than just paying for the initial damage costs and lawsuits. Reputation damage can be devastating to a company's fortunes. If a bank has been compromised multiple times, customers are less likely to give them their personal information. The same goes for retailers who lose information to hackers. These companies lose business over time because of damaged or weakened reputations. Individuals with stolen identities as a result of hacking have a similar reputation problem when it comes to their credit ratings.
What are hackers?
Hackers are people who try to gain unauthorised access to your computer. This is normally done through the use of a 'backdoor' program installed on your machine. You can protect yourself from these by using a firewall and a good up-to-date anti-virus program. You would normally get such a backdoor program by opening an E-mail attachment containing the backdoor program. It is normal for such a backdoor program to send out more copies of itself to everyone in your address book, so it is possible for someone you know to unintentionally send you a malicious program. A few backdoor programs can work with any e-mail program by sitting in memory and watching for a connection to a mail server, rather than actually running from within a specific mail program. These programs automatically attach themselves to any e-mail you send, causing you to unintentionally send out malicious programs to your friends and associates.
Why do hackers hack?
To a hacker, breaking into someones computer is simply a challenge. They may not specifically intend to do damage to the computer. The thrill of simply gaining access is often enough. Hackers often try to show off their skills to the world by hacking into government computers, or as revenge against another user or agency. Hackers are indeed as the stereotype depicts them as; young males with a thirst for knowledge. Despite rumours, all hackers do not wear nerdy glasses.
What damage can a hacker do?
This depends upon what backdoor program(s) are hiding on your PC. Different programs can do different amounts of damage. However, most allow a hacker to smuggle another program onto your PC. This means that if a hacker can't do something using the backdoor program, he can easily put something else onto your computer that can. Hackers can see everything you are doing, and can access any file on your disk. Hackers can write new files, delete files, edit files, and do practically anything to a file that could be done to a file. A hacker could install several programs on to your system without your knowledge. Such programs could also be used to steal personal information such as passwords and credit card information. Some backdoor programs even allow a hacker to listen in on your conversations using your computer's microphone if one is attached!
Types of hackers
Hackers often can be characterized by their motives. The following are the more common types of hackers and the motives they cite:
Pranksters: These hackers are the mischief-makers of the bunch whose intention is merely to be a nuisance. They are the equivalent of individuals who pull fire alarms or make phony bomb threats. Copycat hackers would also fall into this category.
Fame seekers: This group hacks seeking attention or notoriety. Using a code name, these individuals target high-profile sites such as Yahoo!, eBay, or NASA to achieve bragging rights among their peers.
Educational: Students justify hacking into systems by saying that they are honing their programming skills.
Criminals: When bank robber Willie Sutton was asked why he robbed banks, he replied: "That is where the money is." Stored data or "data at rest" is more profitable to steal than data moving over the Internet. Why steal one credit card number at a time when you can steal tens of thousands to millions with one break-in? This happened to CDUniverse and RealNames. Pacific Bell had to have more than 60,000 customers change their passwords after hackers stole them.
|
Based on this article ,write complete synposis o in your own words and atleast 2 page
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started