Need a unique essay?
Order now

Essay Sample: Hacking Cybersecurity

2021-07-09
3 pages
552 words
University/College: 
Boston College
Type of paper: 
Essay
This essay has been submitted by a student. This is not an example of the work written by our professional essay writers.

Hacking is an English term used to refer to the process of re-configuring a particular system to work in manners or ways that was not served by the owner. In most instances, hacking is illegal. Hacking does not only encompass taking control of another individual computer but also taking control of websites, banks, companies and other peoples accounts on social media. Due to the processes involved in hacking, the process is complicated. There are four different ways in which an individual can be hacked. This paper provides an overview of hacking, the impact of hacking and the solutions to hacking.

The four strategies that hackers can use to access or hack other peoples computers include port scanners, vulnerability scanners, malicious programs, and password cracking. Hackers usually use different viruses such as Trojan horses that are hidden on computers without the knowledge of the owners. Additionally, hackers may utilize rootkits softwares that are similar to Trojans. Once these hackers get control of the computer, they can monitor the actions being undertaken by the owner, access information, modify programs and even perform other different functions without a detection by the owner. Some hackers use password hacking softwares that guesses the passwords of users.

In terms of impacts, hacking can be categorized in terms of individual effects, effects on countries, organizations, and economies. It is imperative to comprehend that it is the victims of hacking that feel the effects and threats posed by hacking attacks. It is thus vital to ensure that people understand the dangers of hacking and the circumstances that lead to hacking so that they can be cautious or alert. When large organizations such as banks are hacked, the information taken or stolen by hackers can be used for malicious purposes. Some hackers may sell the information to the highest bidder. Once an individuals information is taken by a hacker, the victim normally feels or has fears of being constantly watched. When companies are hacked on a regular basis, the confidence of customers normally nosedives, and as a result, a company may be declared bankrupt. What is even more interesting is that some companies may hire hackers to access information from their competitors. I fact, some countries even go to the extent of training hackers so that they can compromise the economy of other countries.

In order to stop hacking, the first step is to ensure that the developed countries that normally hack other countries stop. This creates a sense of responsibility. Once these countries have stopped hacking, cybercrime policies and regulations should be passed so that individuals who are found guilty of hacking are prosecuted. Secondly, it is vital that information technology authorities in countries encourage individuals to place or put firewalls. The impact would be immense in that firewalls would watch for and prevent Trojans, ensure outbound control, and prevent ransomware or any other program from taking control of the owners computer. Moreover, organizations should always encourage their employees to counter password sniffing or cracking by using complex passwords, making sure that they change their passwords on a regular basis. As soon as some software updates are released, owners of computers should be in a position to update their systems and install new software definitions. Finally, to stop hacking, all computers should have the most recent versions of anti-virus programs.

Have the same topic and dont`t know what to write?
We can write a custom paper on any topic you need.

Request Removal

If you are the original author of this essay and no longer wish to have it published on the thesishelpers.org website, please click below to request its removal: