StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Hacking of Computer Systems and Cyber Crimes - Essay Example

Cite this document
Summary
The paper "Hacking of Computer Systems and Cyber Crimes" describes that individuals and corporations can benefit greatly from two articles because they provide firsthand information on the potential dangers of cyber assaults, and why security measures must be re-enforced…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95.1% of users find it useful
Hacking of Computer Systems and Cyber Crimes
Read Text Preview

Extract of sample "Hacking of Computer Systems and Cyber Crimes"

Hacking of Computer Systems and Cyber Crimes For many years now, computers have been a part of human civilization in today’s world, thus, there have been key events and personalities that have shaped the history of computers and computing generally. Therefore, this paper aims to provide a summary of and a detailed review of two recent articles in the history of computers or computing; the articles are going to narrow down on the topic further, by focusing on hacking incidences and cyber security threats that have bedeviled leading companies such as Apple Inc in the recent past. The first article to be considered in this review is “Apple Mac Computers Hit in Hacker Attack, Researcher Says”; written by Jordan Robertson and has been sourced from Bloomberg where it featured on 5 April 2012. According to this article, a recent research has shown that over 6 Million users of Mac computers had reportedly fallen victim to hacker attacks; this is an indication that Apple Inc, a company that had been predominantly untargeted by hackers, had now become a prime target. The article further relates that, according to a Russian antivirus software maker Doctor Web, the hacking attack predominantly targets computers using Apple’s Mac OS X software as opposed to windows systems. The research makes it apparent that most of the attacks occurred in the US and Canada, and the company had successively sealed off a security hole that had been a passageway for the virus. In addition to that, the research determined that the malware in question, specifically meant for Mac computers, capitalized on a weakness in a version of Oracle Corp’s Java software that functions as a plug-in on web browsers. The research also rebuffs traditional claims that Mac computers cannot be hacked, by pointing out the shift in hacker activities from computers that use Microsoft’s windows operating systems to those using Apple’s Mac OS X. The research points out to the increase in Mac computer users in the world today that has hit a remarkable record of over 63 Million worldwide users today. Therefore, the research subtly posits that this could be the reason why hackers are now shifting their focus to this new and unexplored market niche that has the potential of swelling up further in the near future. Initially, Apple Inc has been an underdog in the computer operation systems business, and as such, it has been largely ignored by hackers due to its constrained market share. However, in the recent past, Apple Inc has risen above competition in this sector to rival industry giants like Microsoft Corp. In this respect, Apple Inc has taken a strategic position in the industry by increasing its market share considerably, that it has now attracted hacker activities. Conversely, industry giants like Microsoft Corp have traditionally been a haven for hackers and hacker activities due to their large market share; it is estimated that about 90% of the world’s desktop computers use the Microsoft Corps’s windows OS and this means that it has the largest numbers of victims. Numbers are very significant to the hackers because then they are able to transfer the malware to a large proportion of victims in a single attack; this highly promotes the hackers’ illicit money making schemes. The research establishes that Apple’s spokesman Bill Evans has declined to comment on the recent attacks, perhaps due to the implications of the incidence to the future strategic direction of the company. The sudden realization that the company was not hacker resistant anymore could potentially ruin the company’s prospects in the future because then it has lost one of its competitive advantages in the industry. It is understood that computers that use Apple Inc’s Mac OS X operating systems are equally vulnerable to hackers, just like the computers operating on Microsoft Corp’s windows operating system. The second article “Exclusive: Hacked companies still not telling investors” is by Joseph Menn, and appeared in Reuters on 2 February 2012. According to this article, a host of leading US companies whose computer systems had been breached because of cybercrimes had not disclosed this information, thus, undermining disclosure policies stipulated by securities regulators. The article highlights the belief by top US cyber security officials that incidences of corporate hacking had been rampant in the US, thus, prompting the Securities and Exchange Commission (SEC) to issue advisory to corporate to report hacking assaults and potential information breaches. The article cites Lockheed Corp, a defense contractor, as one of the many corporations that are not willing to disclose information about hacking incidences and cyber security threats. For instance, Lockheed Martin Corp, despite having survived a major and tenacious cyber-attack on its systems, it does not even identify hacking as a potential risk, leave alone disclosing that it had been hacked. The article further reveals that a Reuters’ review of over 2000 fillings provides evidence of new hacking incidences, which had only been downplayed as general risks, or left out altogether. Apparently, companies are working hard not to disclose hacking incidences and cyber security threats to avoid SEC’s enforcement of private lawsuits against them. Other firms that have been reported to have fallen victim to cyber-attacks include Mantech International Corp, CALCI International Inc, in addition to many defense and technology firms across the US; however, like the rest, these companies have also remained silent about the hacking incidences even in their fillings. The article points out that cyber security has increasingly become an issue of national concern in Washington, thus prompting the US president in his State of the Union address to direct a firm action on the legislative proposals. What seems to be at stake in all the cyber-attacks is important digital data, including, but not limited to blueprints, secret business formulas and strategic plans. Evidently, hosts of companies are hesitant to report such hacking incidences to SEC simply because they never find out, or because they do not wish to scare away potential investors in the businesses. This is in recognition that such hacking incidences could easily result to deformation of public reputation for individual companies; in this respect, negative reputation would eventually lead to financial losses due to remedial actions, losses of business opportunities or due to potential liability. This second article’s main idea is that, despite disclosure policies form SEC, corporations are not willing to report cyber security threats and hacking incidences this is in protection of their public reputation and financial profits, which stand at risk through any form of disclosure. The article still highlights the increasing threat paused by cyber security threats and hacking incidences, not only to business secrets, but also to other valuable information such as blueprints and strategic plans. This article also recommends action consideration of stern legislative proposals in addressing the cyber security threat, to safeguard infrastructure against malicious attacks. Ultimately, both articles provide very incisive and informative information about hacking incidences and cyber security threats that undermine the privacy and security of information systems. The writers have comprehensively dealt with the topic to greater depths, with a crispy clear understanding of the subject matter, providing sufficient statistical evidence to back up the information; elaborate examples and relevant case studies have been offered to help present the information of the articles to the readers. Eventually, the articles stand out as highly scholarly, authoritative and unbiased, thus lending credibility to the writers and the sources of publications. The articles have specifically accorded the topic the seriousness it deserves, especially in modern times, where a successful breach of an information system has an incredible potential to damage the reputation of corporations, resulting to financial losses. Both individuals and corporations can benefit greatly from these two articles because they provide firsthand information on the potential dangers of cyber assaults, and why security measures must be re-enforces to secure information systems. Works Cited Robertson, Jordan. “Apple Mac Computers Hit in Hacker Attack, Research says”. bloomberg.com. 5th April, 2012. Web. 27th Feb, 2013. < http://www.bloomberg.com/news/2012-04-05/apple-mac-computers-affected-by-hacker-attack-researcher-says.html> Menn, Joseph. “Exclusive: Hacked companies still not telling investors”. Reuters.com. 2nd Feb, 2012. Web. 21stFeb, 2013. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Summry Essay Example | Topics and Well Written Essays - 1250 words”, n.d.)
Summry Essay Example | Topics and Well Written Essays - 1250 words. Retrieved from https://studentshare.org/information-technology/1468693-summry
(Summry Essay Example | Topics and Well Written Essays - 1250 Words)
Summry Essay Example | Topics and Well Written Essays - 1250 Words. https://studentshare.org/information-technology/1468693-summry.
“Summry Essay Example | Topics and Well Written Essays - 1250 Words”, n.d. https://studentshare.org/information-technology/1468693-summry.
  • Cited: 0 times

CHECK THESE SAMPLES OF Hacking of Computer Systems and Cyber Crimes

Cyber-crime: Its History, Types, Methods and the Effects on Networks and Users

This category includes the stealing of computer processor time as well as that of computerized services.... Moreover, it has been estimated that the cost of the aggregate damage caused by cyber-crimes to companies have amounted up to $36.... Such very discouraging statements only tell us one thing: that cyber-crimes are real and rampant, and that they need to be dealt with.... With such an overwhelming issue of fraud, there needs to be insight on the nature of these cyber-crimes – their history, their various types, the methods of preventing them, and their effects on Internet users....
13 Pages (3250 words) Research Paper

Computer-Based Crimes: Identity Theft, Phishing and Pharming Scams

The misuse of the computer may involve the falsification of computer signatures through unauthorized codes; the creation of false bank accounts; theft of personal information and misuse of the stolen information; the virus infection created on computers that can hamper the proper software operations and damage records.... This essay "Computer-Based crimes: Identity Theft, Phishing and Pharming Scams" analyses guaranteed solutions to crimes committed in the cyberworld for the US legal system....
8 Pages (2000 words) Essay

The Doctrine of Cyber Law, its Effectiveness and Reliability

In the present age computers and the internet have become more sophisticated, giving the opportunity to criminals to commit serious crimes with it and this formed the basis of the enactment of several laws relating to the computers and internet.... Thus, cybercrime is something which has similarity to the term crime, as all crimes are illegal and all crimes threaten order.... 'Cybercrime' means the crimes that are committed within that space and it refers to the risks online (Wall 10)....
6 Pages (1500 words) Research Paper

Computer Hacking

The report very well describes the importance of hacking and portrays that it can play a major role in the security of home as well as office systems and networks.... The report also gives a brief discussion about how the prevention of hacking of systems can take place.... This research paper "computer Hacking" shows that technology has facilitated the shrinking of the globe into a global village where access to almost everything is not more than a matter of a click....
15 Pages (3750 words) Research Paper

Criminology: Cyber Crime

Continued development and integration of computer technology alongside changing techniques of cyber crime have proved difficult for cyber crime detectives and investigators to stop cyber crimes.... Forms of Cyber crime As mentioned earlier, cyber crimes assume various forms and means that are all destructive to individual information system.... Institution Date Criminology: Cyber Crime Introduction The invention and introduction of computer technology presented great advantages that made it receive warm welcome and appreciation from all corners of the world....
10 Pages (2500 words) Research Paper

Types and Measures of Cybercrimes

Such actions, when committed through computers systems and networks, constitute cyber crimes.... In this paper, I seek to discuss types of cyber crimes.... One of the types of cyber crimes, and one that is widely experienced among service delivery industries, is hacking.... Hacking refers to illegal and unauthorized entry into a private system and it in most cyber crimes A crime defines an act of omission or commission that infringes another party's rights and is punishable under legal systems....
2 Pages (500 words) Coursework

Cyber Crime A Global Crime

These criminal acts include the disruption of other computer systems using viruses and worms, gaining unauthorized access to confidential files, creating and distributing pornographic films based on children, stealing identity, stalking, and a host of other thefts and frauds.... Other crimes such as identity thefts and extortions are also perpetrated through social networking sites.... A more extensive definition was given by the Council of Europe's Budapest Convention on cyber Crime that defined cybercrime as – ...
14 Pages (3500 words) Research Paper

Criminal Justice: Cyber Crime Investigation

Such techniques eventually increase both the technical as well as legal complexities in investigating and prosecuting the cyber crimes.... However, not all cyber crimes are against law or considered unethical as can be the case in police actions and judicial interferences (Wall, 2007, p.... National governments need to examine the current status to determine if they are sufficient enough to combat with the kinds of crimes committed through the wired technology....
13 Pages (3250 words) Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us