Hacking Presentation Form 4

  • Uploaded by: pesa09
  • 0
  • 0
  • April 2020
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Hacking Presentation Form 4 as PDF for free.

More details

  • Words: 321
  • Pages: 6
WHAT IS HACKING? •In reference to a system’s security, hacking is usually defined as the act of illegally entering a computer system, and making unauthorized changes to the files and data contain within (Winegarden, November 2003). •Hacker is a programming specialist who has the expertise to enter a computer or network without proper authorization (CyberAngels, November 2003)

HISTORY OF HACKING • The History Hacking has been around for more than a century. In the 1870s, several teenagers were flung off the country’s brand new phone system by enraged authorities.

WHAT TO DO IF BEEN HACKED?  

 

 Shut Down Internet Connection The most important step to consider if you suspect your system’s security has been compromised is to shut off all connections to the internet. Although this temporarily detains us from the ability to trace the PC responsible for the attack, it does enable us to first protect our information, which is probably your primary concern.  Install Firewalls Luckily, if you were followed any of the advice you have a firewall installed on our system. Many firewalls, Zonealarm for one, possess the ability of maintaining a detailed description of attempted intrusion. If your firewall does alert you to possible invasion, it probably has the capability of providing the IP address as well.

CONLUSIONS • The idea of testing the security of a system by trying to break into it is not new. Whether an automobile company is crash-testing car, or an individual is testing his or her skill at martial arts by sparring with a partner, evaluation by testing under attack from a real adversary is widely accepted as prudent. It is, however, not sufficient by itself. As Roger Schell observed nearly 30 years ago:  From a practical standpoint the security problem will remain as long as manufacturers remain committed to current system architectures, produced without a firm requirement for security.

REFERENCES • http://www.bama.ua.edu/~wilso098/project/hacking.html • http://www.research.ibm.com/journal/sj/403/palmer.html

Related Documents

Presentation Hacking
December 2019 5
Presentation Form
May 2020 4
Hacking
November 2019 35

More Documents from ""