muhamad syafiq bin borhanudin 2011194315 sr2211m1
DESCRIPTION
MUHAMAD SYAFIQ BIN BORHANUDIN 2011194315 SR2211M1. INTRODUCTION. As organizations are increasingly dependent on information technologies for sustainability and profitability, defending digital information assets against misuse or hacking has assumed vital importance. 1. Introduction - PowerPoint PPT PresentationTRANSCRIPT
MUHAMAD SYAFIQ BIN BORHANUDIN2011194315SR2211M1
1. Introduction
As organizations are increasingly dependent on information
technologies for sustainability and profitability, defending digital
information assets against misuse or hacking has assumed vital
importance.
As organizations are increasingly dependent on information
technologies for sustainability and profitability, defending digitalinformation assets against misuse or hacking has assumed vitalimportance.
INTRODUCTION
In essence, identity theft and financial fraud conducted by hackers have evolved into serious and pervasive threats to consumers and the financial services industry.
Getting onto someone else xbox live account when the account info has been kept secret (this is only hacking, if they get into the system themselves such as Xbox.com Admin)
What is Hacker??
Hacking is the means of bypassing a security system for the means of accomplishing a task that is prohibited by the service or a machine.
Examples
Deleting someone else's Facebook/Twitter/Myspace account whereas the other person did not give any info away
5) they can look tough over everyone, look hard
Why would people want to hack?
1) it makes them feel clever and important2) they can talk crap all they want as they will hack you if you talk3) they can access anything, anybodys machine, popular services4) everything is free
keystroke loggers — software or sometimes hardware that records every key press on a computer's keyboard for the hacker to access — may reveal passwords and other important security information
What are the effects of computer hacking that's focused on obtaining data?
trade secrets may be compromised
personal details of individuals or customers, such as
address information, social security numbers, bank
account data, and credit card numbers may be used for
identity theft, a $50 billion problem