Hackers Portfolio And Its Impact On Society

Terrance Sanchez, Dr. Adnan Omar

Abstract


Currently, a hacker is defined as aperson using computers to explore a network to which he or she did not belong.  Hackers find new ways to harass people,defraud corporations, steal information and maybe even destroy valuable information by infiltrating private and non-private organizations.According to recent research, bad hackers make up only a small minority of thehacker community. In today’s society, we depend on more technology than everand that increases the likelihood of hackers having more control overcyberspace. Hackerswork by collecting information on the intended target, figuring out the bestplan of attack and then exploiting vulnerabilities in the system. Programs suchas Trojan horses and Flame viruses are designed and usedby hackers to get access to computer networks. This paper described how hackerbehavior is aimed at information security and what measures are being taken tocombat them.

Keywords


Types of Hacker, Security, Technology, Cyberspace

Full Text:

PDF

References


Axmith, B. (2011). “Israel's computers crash after hacker group vows retaliation†Digital Journal. Retrieved from: http://digitaljournal.com/article/314013#ixzz2Nj73bBgK

Buller, A. (2013). “The Coming of Cyber War I†Retrieved from: http://gulfbusiness.com/2013/03/the-coming-of-cyber-world-war-i/

Callwood, K. (2013). “How to Reduce Hacking†eHow.com Retrieved from:

http://www.ehow.com/how_8663856_reduce-hacking.html#ixzz2Of7JZqMC

Canter, D. (2013). “Fighting an Order to fight cybercrime†Bloomberg BusinessWeek March 11- March 17, 2013.

Chakraborty, B. (2013). “Small firm hit by 3-year hacking campaign puts face on growing cyber problem†Foxnews.com Retrieved from: http://www.foxnews.com/politics/2013/02/22/small-businesses-big-targets-for-cyber-snoops/#ixzz2Ngj7XMli

Computer Weekly (2006). “Act on foreign spy risk, firms urged†Retrieved from: http://www.computerweekly.com/articles/2006/12/01/220307/act-on-foreign-spy-risk-firms-urged.htm

Dillow, C. (2012). “In the last year, hackers gained ‘Full Functional Control’ of NASA networks, stole the control codes for the is†POPSCI. Retrieved from: http://www.popsci.com/technology/article/2012-03/hackers-gained-full-functional-control-nasa-networks-stole-control-codes-iss-last-year

Engleman, E. (2013). “Hacked? Who Ya Gonna Call?†Bloomberg BusinessWeek February 11- February 17, 2013

Hatcher, W. (2013). “Cyber Security helping secure one network at a time†Retrieved from:

http://iselama.typepad.com/files/scada2pub-1.pdf

New Orleans Business News (2011). “Hackers in China hit Western oil companies, security firm reports†The Associated Press. Retrieved from: http://www.nola.com/business/index.ssf/2011/02/hackers_in_china_hit_western_o.html

Perlroth, N. (2013). “Hacker in China Attacked the Times for last 4 months†The New York Times. Retrieved from: http://www.nytimes.com/2013/01/31/technology/chinese-hackers-infiltrate-new-york-times-computers.html?pagewanted=all&_r=0

Parker, D. (1998). “Fighting Computer Crime: A New Framework for Protecting Information†Retrieved from: http://education.illinois.edu/wp/crime/hacking.htm

Peters, J. (2013). “America's Awful Computer-Crime Law Might Be Getting a Whole Lot Worse†Retrieved from:http://www.slate.com/blogs/crime/2013/03/25/computer_fraud_and_abuse_act_the_cfaa_america_s_awful_computer_crime_law.html

Silverman, J. (2007). "Could hackers devastate the U.S. economy?". HowStuffWorks.com. Retrieved from: http://computer.howstuffworks.com/die-hard-hacker.htm.

Stone, D. (1999). “Computer Hackingâ€, University Laboratory High School, Retrieved from: http://www.ed.uiuc.edu/wp/crime/hacking.htm

U.S. Department of Justice (2009-2012). Computer Crime and Intellectual Property Section Press Releases. Retrieved from: http://www.justice.gov/criminal/cybercrime/pr.html

Wooten, D. (2009). “Hacking: modern day threat or hobby? (pt. 1)â€. Retrieved from: http://www.examiner.com/x-13831-Computer-Security-Examiner~y2009m6d22-Hacking-modern-day-threat-or-hobby-pt-1#


Refbacks

  • There are currently no refbacks.


ISSN: 1694-2507 (Print)

ISSN: 1694-2108 (Online)