By demonstrating this skill, the hacker (the errors gaining unauthorized access) has shown that the security of the computer system can be penetrated. This is often useful when the owner of the computer system wants to ensure its SE security is optimal. Another reason a person or person(s) would want to access a computer system ms RAM without the owners permission would be to gain information from that computer cyst me.
That information may or may not include personal data such as names, addresses, telephone numbers, email addresses, credit card information, account numbers, and other pertinent t information that thieves could use to gain financially. Hackers use many tools and techniques to penetrate the security of the come utter system that they choose to attack. Some techniques can include DNS spoofing, packet snifters, social engineering, and Trojan horses. DNS spoofing occurs when the hacker change s the DNS entry on a server and redirects the browser to an alternate site.
This method is often u seed to steal surnames, passwords, or other personal information. Packet snifters were o originally designed for administrators to debug their systems. They are devices that intercept and interpret packets of information crossing a network. Social engineering is the method of obtaining personal information and network information through deception or manipulation. For example, pretending to be an employee who forgot their surname/ password. Trojan horse programs are often referred to as the “back door’ to computer systems.
They are usually ins tattled into the computer system by the owners in belief that they are something else such as a game, application, or video. Once installed this gives the hacker access to the comps ere system. Another method not previously mentioned is RAM scraping. This method of h caking uses a form of mallard inside a POS (point of sale) system. The most recent and quite pop popular hacking attacks were using this method. Both Home Depot and Target stores were buy shinnies that were subjected to this kind of hacking. There are several things that individuals and business can do to protect them selves from being vulnerable to hackers.
Authentication, authorization, encryption, and AU dining can be used individually or layered to create protection for a computer system. By applying g multilevel authentications, it makes it more difficult for a hacker to get into the system. Setting different authorizations based on roles and responsibilities will limit the access to differ rent parts of the system. All data should be encrypted before being copied or stored to help De term hacking. By reviewing logs regularly, accountability for access to the system can be enforce De and any breaches detected. Seer can also protect information by installing/ updating virus protection, verifying web addresses when visiting websites, and never providing login info rumination to anyone that they cannot verify to have access. Hacking and being able to prevent such activities are of great significance in o our society today. Today’s society is becoming more and more dependent on technology and computer based systems. We use computers and smartness in our every day lives. M aging our information more vulnerable to those who wish to steal and misuse such info rumination. We use our smartness for more things than just talking.