Ping sweeps and port scans has been a notorious and yet a useful tool for hackers and system administrators. Ping sweeps and port scans at times can be a bother to both system administrators and network managers. Ping sweeps and port scans work together and can be dangerous but it also can be prevented. A ping sweep, also known as an internet control message protocol sweep (ICMP) is a basic network scanning technique used to determine the range of Internet Protocol (IP) addresses that are being used. Port Scans It is one of the most common infamous computer activities.
They break into computer systems, frequently with intentions to alter or modify existing settings. Sometimes nasty in nature, hacking may cause damage or disruption to computer systems or networks. "Unauthorized access" involves approaching, trespassing , communicating with, storing data in, retrieving data from, or otherwise intercepting and changing computer resources without consent. The goals created by these people are negative and range from accessing and downloading data from corporate servers to defacing a public website. Hactivism is strictly confined to negatively-orientated goals due to the legal and right implications’ that come of controlling private information.
Trojans:- A Trojan is a network that takes personal information from a home/business co computer and sends it to the internet. Worms:- A worm is a self-replicate computer programme which uses a computer to replicate itself which then spreads to other computers. Hackers:- A hackers is a person who will purposely try to ruin a computer network or someone’s private work. Scams:- A scam is when you use a computer to steal information in order to cause harm to others. Loss of data:- Loss of data is when data on your computer get lost.
Case Study 2: Social Engineering Attacks and Counterintelligence Social Engineering Attacks and Counterintelligence Abstract Social engineering and Counterintelligence Social engineering defines a non-technical type of incursion that depends severely on human communication and frequently includes misleading other people to break standard security procedures. A social engineer runs a "con game." According to Rouse’s example in her article – “A person using social engineering to break into a computer network might try to gain the confidence of an authorized user and get them to reveal information that compromises the network's security (Rouse, 2006)”. Social engineers regularly depend on the usual usefulness of people in addition to their weaknesses. Social engineering is an element of many types of exploits.
Many forms of spyware, however, are more malicious and can have serious effects on users and businesses. Key logging spyware, for example, transmits to the author of the spyware a log of every keystroke entered on that computer. The author can then sift through this data to find valuable information, such as credit card numbers, security codes and confidential information, from that user or their business. Other types of spyware search through the data stored on the host computer for particular types of file, which are likely to contain confidential or personal information, such as Word documents or images, and transmit them to the spyware
P3 explain the security risks and protection mechanisms involved in website performance Security Risks Hackers: A hacker is someone who finds weaknesses in a computer or computer network, enters, and modifies or/and steals data this could slow down performance very much or even completely halt it. Viruses: A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously, used to refer to other types of malware, including but not limited to adware and spyware programs that do not have a reproductive ability. Viruses can damage and/or decrease the performance of the machine they “infect”. Phishing: Phishing is the act of attempting to acquire information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity from Amazon.
SECURITY RISKS Hacking: This is when you break into someone’s computer system and gain access to all their files and personal information and also to delete, corrupt or steal their files. There are a lot of hackers on the internet who are highly skilled in computers and know their way around all the firewalls and the computer security system. Hackers usually tend to hack people’s computers with the aim to retrieve things which will benefit them for example bank account details and passwords so they can have access to someone else’s money. Other hackers use it to change the details on someone’s account so they can take their identity which is called identity theft. To avoid getting hacked is to always update your security system on a regular basis so hackers cannot find a way to get through it; also you should install a really secure firewall which should be updated regularly as well.
These ads get in the way of the viewers screen and will most of the time trick you into clicking onto the pop up, which unethically redirects you to another web page. It may even make you click in an area that authorizes an installation of some sort of adware to your computer. Lack of online B2C ethics has been a large contributor to identity theft and internet fraud. In conclusion, there are many legal and ethical concerns with online B2B and B2C sites. Since most of the internet is unregulated it is important to research companies that we consider doing business with from the B2B or the B2C perspective.
While the internet plays an essential role in everything we do, computers have created new ways to take advantage of technology for criminal deeds. For example, hackers have the ability to steal millions of credit card numbers through the illegal access of a data base. Through online sharing networks, pedophiles distribute child pornography throughout the internet. Others can distribute viruses to computers if only for the sake of perversity and spitefulness. Not any one company or agency can successfully fight cybercrime alone, cooperation has to be the key to succeed.
With all the endless possibilities associated with the internet, there is also a negative side to it. The internet opened the door to new ways to exploit children. It gave child predators (pedophiles and molesters) the opportunity to prey on the innocent from their home computer, share their collection with others, and conduct their business anonymously. The internet also made it extremely difficult to stop the spread of child pornography. This paper will show how the internet allowed predators to prey on children and how child pornography changed.