Evolution Of Hacking

Read Complete Research Material



Evolution of Hacking

Evolution of Hacking

Introduction

In the existing situation, most of human activities and business practices are dependent on the telecommunications and functioning networks. These networks are considered as a firm support for effective communications as they efficiently work for the maintaining the position of American marketplace in many aspects such as critical infrastructure partners, state and local entities, government, private citizens businesses and law enforcement. These networks are comprised of private and sensitive information, and are targeted by the foreign governments and various other entities in order to commit steal trade secrets, economic espionage, or access to the government information for gaining a strategic benefit over the United States. In the context of computer security, hacking is a process of seeking and exploiting weakness in a computer network or a computer system. There are several reasons that motivate hackers, sometimes they take it as a challenge, and in some cases they do this for profit and sometimes as a protest. Hacking is considered as a criminal activity as it destroys some one's data security (Blyth, 2008).

Discussion

People with criminal minds are now intelligent enough to design malicious software to easily damage and decrypt some one's personal data. This has made computer security extremely important. To get associated with most trusted security sites and developing best tools for security is not only to protect all the data and information but it also provides peace of mind that data is secured and protected from any hacker (Yves, Cuppens and Jajodia, 2004).

There are many vulnerabilities appearing in information security organizations and IT companies that are mainly linked with the erosion of long duration of competitiveness and loss of rational property and, the similar vulnerabilities faced by many other organizations in other areas. There is no limit for the risks associated with these kinds of security industries and business men. These threats of intellectual property are also present in a number of countries and industries in which U.S. has its businesses set up (Yves, Cuppens and Jajodia, 2004).

Almost all over the world, computer intelligence has enhanced much in last few years. It is not capable of acquiring huge amount of information that was totally considered to be inaccessible or partially accessible in past with human intelligence operations. Hackers are involved in implementing computer intelligence in a very effective way for achieving its modernization targets. Cyber reconnaissance infrastructure and military intelligence collection also supports an effort to combine military and civilian cyber programs and bring improvement in both defensive and offensive abilities Thomas, 2001).

The term reconnaissance is actually comes from its military use, where it is referred to a mission into enemy territory for acquiring data and information. In the context of computer security, the term reconnaissance is considered as an initial step for preventing further attacks that are directed to damage the targeted system. Port scanning, is often used by the attacker for instance in order to discover any risky ports. A hacker mostly damages the vulnerabilities of services and systems that are linked with open ...