Explore chapters and articles related to this topic
Network Security and Management
Published in Stephan S. Jones, Ronald J. Kovac, Frank M. Groom, Introduction to COMMUNICATIONS TECHNOLOGIES, 2015
Stephan S. Jones, Ronald J. Kovac, Frank M. Groom
Hackers are usually young and want to beat the system by breaking into networks of computer systems. They are intellectually acute and sometimes morally challenged. A hacker is a person who enjoys the technical field, exploring computer systems and networks as a challenge. Some hackers are driven by sharing, openness, decentralization, free access to computers, and even the goal of world improvement. Others are motivated by financial/personal gain or more destructive goals. The field of hacking can be further broken down into different categories (white hats, black hats, gray hats, and elite hackers, to name a few).
Cyber Security in the Era of Big Data
Published in Maria G. Burns, Managing Energy Security, 2019
As for the methods hackers use, the most common types of attacks have been fraud, intrusion, spam, malware, and denial of service. The trends changed in 2018, with the most common types of cyber attacks pertaining to browser, brute force, denial of service, worm, and malware. Phishing and cross-site scripting (XSS) are also common. The past year has seen a dramatic shift from ransomware-based attacks to cryptominer-based attacks.
Enterprise solutions and technologies
Published in Abbas Moallem, Human-Computer Interaction and Cybersecurity Handbook, 2018
Enterprises that develop their own applications are exposed to a whole new world of threats which must be mitigated. While the security of applications is a topic beyond the scope of this chapter, it is important to mention that there are real risks that must be addressed by programmers within the enterprise. SQL injection, where an attacker can inject malicious code into web-based applications, is perhaps the most popular of dozens of exploits which programmers need to be aware of. Heartland Payment Systems, which at the time provided credit card payment processing solutions for 175,000 customers, was fined $145,000,000 after a hacker was able to breach their security controls through SQL injection [10]. Cybersecurity programs should include special training elements for developers. Developers should be well versed in techniques attackers use to exploit software vulnerabilities including SQL injection, cross-site scripting, and web and application server configuration vulnerabilities. The Open Web Application Security Project publishes a top 10 list of vulnerabilities, which all developers should be aware of [13]. Consider sending programmers to secure development training courses or bringing a trainer on site to keep programmers up to date on vulnerabilities. Cybersecurity and development managers should keep in mind that developing secure code is more work than developing code simply for functionality. With ever-increasing demands, it is easy for a developer to be so focused on meeting functionality goals that security is overlooked, so it is always helpful to integrate a peer code-review as part of the release management process. Make security code reusable, review it regularly, and make use of automated tools for testing. The concept of ethical hacking or penetration testing allows enterprises to test their applications using techniques developed by hackers. For environments where a live resource is not feasible, there are tools available as well, which can test for some of the most common vulnerabilities. Qualysguard Web Application Security, Trend Micro, Accunetics, TrustWave, VeriCode, and countless others offer testing applications and services to identify vulnerabilities.
Motivation and Demotivation of Hackers in Selecting a Hacking Task
Published in Journal of Computer Information Systems, 2023
Brown et al.,36 suggest there are four contextual factors that influence the intention to use certain types of collaboration technology. These broad contextual factors are: i) technology characteristics, ii) individual or group characteristics, iii) task characteristics, and iv) situational characteristics.36 In the case of exploring TRA and GDT and their impact on hacker intentions, the contextual factors of technology characteristics from the Brown et al.36 list that could be set aside as it is not as meaningful. For example, evaluating a writer’s choice of pen when trying to discern what drives that writer’s topic selection is analogous to understanding why a choice of technology is not an important contextual concern in understanding hackers. Therefore, this research focuses on the intrinsic motivations of a hacker and not the choice of technology he or she uses. When TRA and GDT are used as lenses, only the internal and external pressures of an individual’s motivations are what become important. Those motivations come from how the hacker perceives the hacking task in terms of social merit and risk, as well as the challenge it creates for the hacker. This leaves three of Brown et al.36 factors relevant to this course of research. First, there are the individual characteristics of the hacker that act as drivers to motivate them to attempt a hacking task. Second, there are the characteristics of the intended task itself. Last, there is the situational context that influences a hacker’s actions based of the visibility of the intended hacking task.
Cybersecurity for children: an investigation into the application of social media
Published in Enterprise Information Systems, 2023
Victor Chang, Lewis Golightly, Qianwen Ariel Xu, Thanaporn Boonmee, Ben S. Liu
From Figure 3, we can see that one of the security issues that social media users are most concerned about is hacking. It is one that both the users themselves and social media platforms cannot control when attacked by hackers. Actually, there is both unethical and ethical unauthorised access (Figure 4). Ethical hacking is the activity performed by hackers hired by the company to develop a security system and be authorised to hack the network ethically and legally. On the other hand, unethical hacking refers to unauthorised access to the network and seeking benefits from the data. In general, the word hacking causes readers to feel insecure and think it is unethical behaviour. However, social media companies do hire skilful personnel to perform hacking to identify and fix potential security loopholes to improve their security system. Therefore, it should have reliable and applicable regulations for unethical and illegal hacking to protect the vast social media data set. In the following two sections, we will introduce the hacking methods and explore the reasons they do hacking, as shown in Figure 4.
Security challenges in the transition to 4G mobile systems in developing countries
Published in Cogent Engineering, 2023
Fanuel Melak Asmare, Lijaddis Getnet Ayalew
The theft of intellectual property and confidential business information; sensitive business information theft, as well as the possibility of stock market manipulation; opportunity costs, such as service and employment disruptions, and other similar unhealthy practices will decrease trust in online activities and additionally encore cost of network security, insurance, and cyber-attack recovery, while the reputation of the hacked company suffers as a result (Lewis & Baker, 2013).