StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

How to Save Organisations from Hackers - Report Example

Cite this document
Summary
This report "How to Save Organisations from Hackers" sheds some light on the recent worrying trends in which more types of sophisticated technical approaches are used to compromise and illegal access information and computer systems/networks…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.6% of users find it useful
How to Save Organisations from Hackers
Read Text Preview

Extract of sample "How to Save Organisations from Hackers"

Download file to see previous pages

In their actions, hackers in contemporary society use the most sophisticated of malware to attack information systems and networks in ways never seen before. Nevertheless, the initial role of social engineering in these attacks is core and cannot be overlooked due to the technologies used. Social engineering is hackers’ equivalent of a con or a trick, which makes the target people or systems think someone, something, or an action, is safe, trustworthy, and familiar while in reality, it is not (Kiountouzis & Kokolakis, 2011).

The most common of social engineering con tricks often involve the hacker sending an e-mail to the target person or system. This e-mail if first tailored so that it appears to have come from a trustworthy sender. However, these con e-mails often contain links that when opened or clicked, direct a computer to malware, which is in turn downloaded by the user on the target computer or system (Kiountouzis & Kokolakis, 2011). At this stage, the hacker employs the Remote Access Tool (RAT) to search through the computer network and/or infect other computers or networks.

Social engineering is today exploited by hackers to bring down or access others’ computer/information networks and obtain information in the comfort of their homes provided they are sure their target will most likely be sitting at their computers (Kiountouzis & Kokolakis, 2011).This paper explores the various types of cyber and security threats to which information and technology companies and there ISs are exposed and the role of employee alertness in averting these threats, particularly those originating from hackers’ using social engineering.

In this regard, the paper is a case study of an information security breach at one of the most renowned IT security firms in the United States, the RSA. After addressing how RSA responded to the breach, the paper explores the role of employee alertness in averting such threats in the future. However, it is of the essence to first have a general understanding of the various techniques that hackers use to breach information security systems and obtain information illegally. The Protection Motivation Theory This paper will employ the protection motivation theory to explain the role and importance of employee alertness in assisting IS firms in detecting and preventing security breaches via social engineering techniques.

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“CAN ALERTNESS OF EMPLOYEES SAVE ORGANISATIONS FROM HACKERS USING Essay”, n.d.)
CAN ALERTNESS OF EMPLOYEES SAVE ORGANISATIONS FROM HACKERS USING Essay. Retrieved from https://studentshare.org/information-technology/1403838-can-alertness-of-employees-save-organisations-from
(CAN ALERTNESS OF EMPLOYEES SAVE ORGANISATIONS FROM HACKERS USING Essay)
CAN ALERTNESS OF EMPLOYEES SAVE ORGANISATIONS FROM HACKERS USING Essay. https://studentshare.org/information-technology/1403838-can-alertness-of-employees-save-organisations-from.
“CAN ALERTNESS OF EMPLOYEES SAVE ORGANISATIONS FROM HACKERS USING Essay”, n.d. https://studentshare.org/information-technology/1403838-can-alertness-of-employees-save-organisations-from.
  • Cited: 0 times

CHECK THESE SAMPLES OF How to Save Organisations from Hackers

Hacker Culture

This paper ''Hacker Culture'' discusses that to prevent and the discourage hackers, a person should: use of a 2 way firewall, updating an operating system regularly, Avoid questionable websites, Safe email protocol, Not opening suspicious emails etc.... For example, in the case of Wisconsin department of revenue, hackers try to change some figures on revenue by finding access to information hence giving false information to public (Jerome, 1990).... hackers may also block the public from logging in to the site hence the revenue details would be inaccessible....
11 Pages (2750 words) Research Paper

Ethical Hacking Issues

person who enjoys learning the details of computer systems and how to stretch their capabilities-as opposed to most users of computers, who prefer to learn only the minimum amount necessary.... person who enjoys learning the details of computer systems and how to stretch their capabilities-as opposed to most users of computers, who prefer to learn only the minimum amount necessary.... More and more companies now believe in the quote: "To catch a thief, think like a thief" and hiring ethical hackers to ensure information system security....
4 Pages (1000 words) Essay

Unethical Behavior at All Levels of Society

Hacking… hackers are motivated by intellectual curiosity.... hackers are unauthorized but talented people.... hackers, according to Smith and Rupp (2002), belong to five categories.... hackers impersonate and extract valuable information on the corporate computer system.... hackers engage in hacking for the sheer pleasure it provides and they remain committed to the skill of hacking.... hackers consider this to be a harmless act....
6 Pages (1500 words) Research Paper

Should All Hacking Be Banned

hellip; The public is of the opinion that hacking should be banned forgetting the benefits derived from ethical or controlled hacking.... The benefits derived from controlled hacking are critical to national security as well as in maintaining a high standard in electronic products.... Crackers often prey on all computer packages ranging from operating systems to games.... This coursework "Should All Hacking Be Banned" seeks to highlight positive aspects associated with hacking and how they serve society....
7 Pages (1750 words) Coursework

Hacking Strategies and Online Security Measures

This paper “Hacking Strategies and Online Security Measures” is aimed at identifying the various ways hackers use to penetrate computer systems, with the particular focus on the use of malware, social engineering tactics, cyberespionage, and advanced persistent threats (APT).... Malware (malicious software) is one of the common ways that hackers used to access computer systems.... In the most recent attacks, hackers are using malware to attack some of the most vulnerable organizations, especially banks (owing to their exclusive money transactions)....
10 Pages (2500 words) Research Proposal

Hackers and How to Control Them

This coursework "Hackers and how to Control Them" describes the key aspects of hachers' attacks.... this paper outlines stealing of the password, wireless attacks, social spying, malicius bot sowtware, hackers organizations, ways in which industries and organization use protect themselves from the hackers.... However, the company needs not to worry anymore as this paper is going to provide them with the common methods that hackers use to attack their system and some of the ways in which these hackers can be prevented....
9 Pages (2250 words) Coursework

The Use of Hacking

Knittel and Soto (2003) disagree with the media's description of hacking as attacking other people's computers with the intention of causing harm (6) and instead describe hackers as overly talented persons who use their talents to explore innovative ways of improving how the computers operate by improving the software and hardware of the computers (8).... It is such people that Knittel and Soto point out that media refers to as hackers while in the computer world they are referred to as crackers and are not highly regarded (8)....
10 Pages (2500 words) Essay

The Societys Response on Internet Hackers

… The paper " The Society's Response on Internet hackers" is a good example of a term paper on information technology.... The paper " The Society's Response on Internet hackers" is a good example of a term paper on information technology.... Such criminals are known as hackers and they normally possess the knowledge of stealing or damaging vital information on the internet either from the top-secret government files or even in personal bank accounts....
12 Pages (3000 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us