Management Information System

Read Complete Research Material

MANAGEMENT INFORMATION SYSTEM

Management Information System



Management Information System

Introduction

The Internet is full of sites and tips that serve the neophytes in their evil hackers, young, as criminals and terrorists have access to it, which means more intrusion is also knocking on doors. Although improved security in the web and stricter penalties for breaking into systems, hacker attacks are over three times in the last 2 years.

Hacking is an act of penetrating computer systems, the accumulation of knowledge about systems and about how they operate. Hacking is a condemned act, which is commonly known as a cyber crime. Hacking has become common especially in the past few decades, which has given rise to people and organizations being more conscious about protecting their systems and keeping it secure.

Most companies refuse to report the attacks to avoid a negative impact on advertising. The statistics cover from the inroads in the networking local (which gives the hacker access to files with the information) to the vandalism at the sites (the denial of service attacks and information theft). The risks here are personal and professional. Hackers can steal passwords and numbers of accounts on your PC or bank can take possession of trade secrets from the network's local company.

Hackers

With the advent of the era of computer labels that have been a number used to designate individuals or groups of them engaged in illegal activities. With the passing of years, the media broadcast journalism adopted the name "hacker" to describe anyone involved in acts that infringe against the property intellectual, network security, authors of virus, intrusion servers, e-interceptors, vandals in cyberspace, and so on (Duff & Gardiner, 1996, pp 211-228).

The word hacker applied in computing refers to the person who is dedicates his expertise to the task of research or development efforts beyond the normal and conventional with a passion that exceeds its conventional energy. The hacker is someone who is passionate about computers and is willing to dedicate to them beyond the limits. Hackers have "a healthy sense of curiosity, try all the locks on the doors to see if they are open or not (Halbert, 1997, pp 361-374).

Hackers have strongly been associated with of a long-haired teenager with a cigarette in his hand, which certainly is not an accurate reflection of the representative community. Hackers differ from ordinary people often in some intuitive understanding of many processes taking place inside the computer. The main difference between a hacker from the user is that in most cases, the attacker only wants himself and enjoys the learning process (Hannemyr, 1999, pp 120- 122).

Hackers are technically competent people who have a clear understanding of the operation of computers and networks. They have realized the usage phenomenon of protocols for system operation (Hollinger & Lanza-Kaduce, 1988, pp 101-126). Motivation in the work of hackers may be different from the desire to attract attention towards him and to his usual greed. Hackers are generally divided into four groups:

1st Children and young people

Who find by accident hacker programs on the ...
Related Ads