Tuesday, June 18, 2019
Network Security and Growing Problems Protecting your Privacy Research Paper
Network Security and Growing Problems Protecting your Privacy - Research Paper ExampleIn the last decade, federal governments like the FBI and other organizations nourish supported the Cyber command battling computer intrusions to fend of attacks network systems.The problem with network systems security is how easy a hacker arouse entre your system to consume what the criminal is targeting. The methods can be done from across the globe being sent thru an email to millions of people to entice them to open or allow access from them to the network. This method can be done thru a link posted in the email or it aggressively uploads a file once undecided and once opened the malicious software penetrates into the network system loading or unloading data to its requester. Another method workoutd by hackers is to use devices that passively listen to networks by accessing the broadcast being sent between the networks.When the hackers are trying to monitor the nodes or access points in th e network the equipment typically used are network hardware typically found in electronic stores. The hardware that is typically used is Wi-Fi modem, laptop and a network analyzing software. The hardware listed can be then used to pick up Wi-Fi signals used in networks and then be managed in the software that is able to interpret its meaning. In Wi-Fi signals, the information being broadcasted is usually open since you cannot see what is being sent over the stream. With the information being free a hacker with bad intentions can collect a surplus of information without being detected.The typical hacker that finds ways to steal private information are not industry IT or IS professionals but enthusiast that are technically savvy enough to understand the inner workings of a computer and software language to control them. In current days in the tech industry, its not out of the normality to hack to jailbreak a smartphone so you dont have to pay the manufactures prices but kinda get it for free. With the same concept, hackers can access networks.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment