When speaking of computer sabotage we are referring to the disruption, or destruction, of a system by malware. However, unlike electronic break-ins, where hackers gain unauthorized access to a system, computer sabotage almost always occurs due to an “operator error” as the user unknowingly welcomes malware to their own system. Computer sabotage often targets the weakest points of entry into a system and relies on the ignorance of a user to mount an attack, therefore proper training of users and the constant debugging and testing of security measures should be stressed to ensure the highest level of defense from malicious attack. Firstly, when discussing computer sabotage it is important to follow the actions that led to the incident in order to determine key areas that might be improved. One such incident is the relatively new crypto locker virus, which practically takes a user’s entire system ransom until a sum of money has been paid.
This occurs when the perpetrator steals the victim’s personal information by using fake emails, which commonly ask for personal details (Baltzan, 2013, p. 294). Unknowingly, victims often think these emails are legitimate, and reply with personal information. Once they have replied, the perpetrator has captured their personal information. The second way identity thieves capture information wanted is by pharming (Baltzan, 2013). This method reroutes victims from legitimate websites to false websites (Baltzan, 2013, p. 296).
On the other hand hackers are an essential help when we are in trouble and someone needs to find info inside a cellphone to try and help if someone is missing. There are two kinds of hackers; the most familiar is described as a criminal, dangerous and devious. The other kind is not as familiar and behaves in more ethical ways. Background A hacker is defined as a computer enthusiast or a microcomputer user who attempts to gain unauthorized access to proprietary computer systems (dictionary.com). Another definition found Criminal Hacking Criminal Hackers terrorize the world using their computer skills to make viruses that can damage a computer.
According to Wikipedia (2013b), hacker is someone who attack and seek into a computer system or network. They may motivated by different kinds of reason such as profit, to protest, to challenge a system, to grab information, etc. There are 3 types of hacker which can be classified into white hat, black hat, and grey hat. White hat hacker breaks the computer security for non-malicious reasons where they are actually to test their own security system. Black hat hacker violates the computer ethics and hacks system for their personal profit.
Operation Aurora was first publicly disclosed by Google on January 12, 2010. The attack began in mid-2009 and continued through De... ... middle of paper ... ...same time, these attacks are so sophisticated that it becomes hard for even a seasoned security professional to understand whether a link is a good one or a bad one. Many companies looked at their policies and procedures, and they realized that education is one component. References Aurora' Attacks Still Under Way, Investigators Closing In On Malware Creators". Dark Reading (TechWeb).
Identity Theft Research and Statistics - ITAC Victim Database - Surveys of Identity Theft Victims. Identity Theft Assistance Center, 2013. Web. 05 Dec. 2013. "Investor Alert - "Phishing" and Other Online Identity Theft Scams: Don't Take the Bait - FINRA."
A port scan is a series of messages sent by a hacker that is attempting to break into a computer to learn which computer network services have an open port. Usually when hackers have a plan to hack a company’s network they usually use port scan or sometimes ping sweeps because it’s a very great tool to use in a hacking process. Ping sweeps and port scans are very dangerous but can be preventable for most companies. Also port scan and ping sweep can impact a company in a negative way that can cause personal information to be given out to the public. If this happen to a company this can cause emergency shutdown and possible shutting down the company until the hackers are identify.
Viruses reproduce themselves by executing a binary code, also called computer coding, and attach to the memory side of the computer. Viruses can attach themselves to program files that are legitimate program files installed on the computer. When a person launches a program that has been infected, the virus springs into action. The virus is very stealthy and ... ... middle of paper ... ...rint Gil, Paul. “Spyware - Malware 101: Understanding the Secret Digital War of the Internet How Spyware Software Hurts Us All.” About.com.
Rashid, F. (2011). Anonymous Claims Network Breach of FBI Security Contractor ManTech. Retrieved February 1, 2014 from http://www.eweek.com/c/a/Security/Anonymous-Claims-Network-Breach-of-FBI-Security-Contractor-ManTech-693504/ Wiseman, P. (n.d.). Cracking the 'Great Firewall' of China's Web censorship. Retrieved February 9, 2014 from http://abcnews.go.com/Technology/story?id=4707107&page=1&singlePage=true