Wednesday, September 11, 2019
Network Security and Growing Problems Protecting your Privacy Research Paper
Network Security and Growing Problems Protecting your Privacy - Research Paper Example In the last decade, federal governments like the FBI and other organizations have supported the Cyber command battling computer intrusions to fend of attacks network systems. The problem with network systems security is how easy a hacker can access your system to gain what the criminal is targeting. The methods can be done from across the globe being sent thru an email to millions of people to entice them to open or allow access from them to the network. This method can be done thru a link posted in the email or it aggressively uploads a file once opened and once opened the malicious software penetrates into the network system loading or unloading data to its requester. Another method used by hackers is to use devices that passively listen to networks by accessing the broadcast being sent between the networks. When the hackers are trying to monitor the nodes or access points in the network the equipment typically used are network hardware typically found in electronic stores. The hardware that is typically used is Wi-Fi modem, laptop and a network analyzing software. The hardware listed can be then used to pick up Wi-Fi signals used in networks and then be managed in the software that is able to interpret its meaning. In Wi-Fi signals, the information being broadcasted is usually "open" since you cannot see what is being sent over the stream. With the information being free a hacker with bad intentions can collect a surplus of information without being detected. The typical hacker that finds ways to steal private information are not industry IT or IS professionals but enthusiast that are technically savvy enough to understand the inner workings of a computer and software language to control them. In current days in the tech industry, it's not out of the normality to hack to jailbreak a smartphone so you don't have to pay the manufactures prices butà instead get it for free. With the same concept, hackers can access networks.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.