Monday, March 18, 2019
Essay examples --
Hacking has been around for more than a century. Members of the public check had their individualised reading stolen and passed all over the internet. A hacker is a person who uses electronic computers to gain unauthorized access to data. Like for an example in October 2011 Sony the confederation that owns PlayStation was hacked by some intruders. The intruders staged a massive act to access user accounts on its PlayStation Network and other online assumetainment operate (Hosaka,2011). this is also an example of port discern. Port s stooges and pick apart sweep, is very insidious for companies because it will allow people to hack your interlocking or personal information and create viruses that could do a locoweed of damage to your computer or network.Port scan is a very popular wight that many hackers use to get unauthorized access to a lot of networks across the world. A port scan is a series of messages move by a hacker that is attempting to break into a computer t o check over which computer network services stick an open port. Usually when hackers have a plan to hack a companys network they usually use port scan or sometimes ping sweeps because its a very great tool to use in a hacking process. Ping sweeps and port scans are very dangerous that can be preventable for most companies. Also port scan and ping sweep can impact a company in a negative way that can cause personal information to be given out to the public. If this happen to a company this can cause emergency shutdown and possible shutting down the company until the hackers are identify. (younger Pyles,n.d.). In the late 1980s Kevin Mitnick a 25 days old veteran hacker secretly monitors the emails of MCI and Digital Equipment security officials. Kevin Mitnick successfully did this by using the port scan to fi... ...st couple of years. In tell apart to prevent intruders from using port scans or ping sweep to enter a network, companies must have an antivirus software that fights off any intruders commands or entrance attempts because if companies do then they wouldnt have a caper with hackers trying to hack their network system.ReferencesHosaka, T. (2011, October 12). Sony hack october. Retrieved from http//www.huffingtonpost.com/2011/10/12/sony-hack-october-2011-playstation-network_n_1006661.htmlJr. Pyles, G. (n.d.). Ping sweeps and port scans. Retrieved from http//gregorympyles.wordpress.com/information-systems/case-studies/ping-sweeps-and-port-scans/Ward, M. (2011, June 9). A brief history of hacking . Retrieved from http//www.bbc.co.uk/news/technology-13686141A history of hacking. (n.d.). Retrieved from http//www.sptimes.com/Hackers/history.hacking.html
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment