Tuesday, February 5, 2019
Essay examples --
Hacking has been around for more than a century. Members of the public have had their personal tuition stolen and passed all over the internet. A hack oner is a person who social functions computers to gather unauthorized access to data. Like for an showcase in October 2011 Sony the company that owns PlayStation was hacked by some intruders. The intruders staged a massive attempt to access lend oneselfr accounts on its PlayStation Network and other online entertainment services (Hosaka,2011). this is also an example of air scan. interface scans and ping cover, is very dangerous for companies because it will set aside people to hack your vane or personal information and form viruses that could do a lot of damage to your computer or network.Port scan is a very popular tool that many hackers use to get unauthorized access to a lot of networks across the world. A port scan is a series of messages sent by a hacker that is attempting to break into a computer to learn which com puter network services have an open port. Usually when hackers have a end to hack a companys network they usually use port scan or sometimes ping sweeps because its a very great tool to use in a hacking process. run into sweeps and port scans are very dangerous but can be preventable for most companies. Also port scan and ping sweep can impact a company in a interdict way that can cause personal information to be given over out to the public. If this happen to a company this can cause indispensability shutdown and possible shutting down the company until the hackers are identify. (Jr. Pyles,n.d.). In the late 1980s Kevin Mitnick a 25 years old old geezer hacker secretly monitors the emails of MCI and Digital Equipment security officials. Kevin Mitnick successfully did this by utilise the port scan to fi... ...st couple of years. In order to prevent intruders from employ port scans or ping sweep to enter a network, companies must have an antivirus software that fights off a ny intruders commands or entrance attempts because if companies do then they wouldnt have a problem with hackers trying to hack their network system.ReferencesHosaka, T. (2011, October 12). Sony hack october. Retrieved from http//www.huffingtonpost.com/2011/10/12/sony-hack-october-2011-playstation-network_n_1006661.htmlJr. Pyles, G. (n.d.). Ping sweeps and port scans. Retrieved from http//gregorympyles.wordpress.com/information-systems/case-studies/ping-sweeps-and-port-scans/Ward, M. (2011, June 9). A brief history of hacking . Retrieved from http//www.bbc.co.uk/news/technology-13686141A history of hacking. (n.d.). Retrieved from http//www.sptimes.com/Hackers/history.hacking.html
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment