Sunday, August 18, 2019

Essay examples --

Hacking has been around for more than a century. Members of the public have had their personal information stolen and passed all over the internet. A hacker is a person who uses computers to gain unauthorized access to data. Like for an example in October 2011 Sony the company that owns PlayStation was hacked by some intruders. The intruders staged a massive attempt to access user accounts on its PlayStation Network and other online entertainment services (Hosaka,2011). ; this is also an example of port scan. Port scans and ping sweep, is very dangerous for companies because it will allow people to hack your network or personal information and create viruses that could do a lot of damage to your computer or network. Port scan is a very popular tool that many hackers use to get unauthorized access to a lot of networks across the world. A port scan is a series of messages sent by a hacker that is attempting to break into a computer to learn which computer network services have an open port. Usually when hackers have a plan to hack a company’s network they usually use port scan or sometimes ping sweeps because it’s a very great tool to use in a hacking process. Ping sweeps and port scans are very dangerous but can be preventable for most companies. Also port scan and ping sweep can impact a company in a negative way that can cause personal information to be given out to the public. If this happen to a company this can cause emergency shutdown and possible shutting down the company until the hackers are identify. (Jr. Pyles,n.d.). In the late 1980’s Kevin Mitnick a 25 years old veteran hacker secretly monitors the emails of MCI and Digital Equipment security officials. Kevin Mitnick successfully did this by using the port scan to fi... couple of years. In order to prevent intruders from using port scans or ping sweep to enter a network, companies must have an antivirus software that fights off any intruders’ commands or entrance attempts because if companies do then they wouldn’t have a problem with hackers trying to hack their network system. References Hosaka, T. (2011, October 12). Sony hack october. Retrieved from Jr. Pyles, G. (n.d.). Ping sweeps and port scans. Retrieved from Ward, M. (2011, June 9). A brief history of hacking . Retrieved from A history of hacking. (n.d.). Retrieved from

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.