A number of technologies are available to companies to prevent
hacking attacks. The most popular tools are Internet firewalls,
anti-virus software, intrusion detection systems, and vulnerability
assessment tools. Firewalls are used to set up a virtual wall between
the Internet and the company's internal network to repel attackers.
Anti-virus software detectsand removes computer viruses, worms, and
Trojan horses. Intrusion detection systems watch over critical networks
and computers looking for suspicious activities, and can alert
administrators in the event of an attack. Finally, corporations use
vulnerability assessment tools to inventory their computing
infrastructure and better understand the existing vulnerabilities.
Tools
of the trade: Hackers have a variety of tools at their disposal to use
in breaching computing and telecommunications equipment. Some hackers
meet at conferences to exchange ideas and preview the latest gadgets.
Contrary to popular belief, most hackers are not international or industrial spies with evil motives and a desire to rule the world; most hackers have a simpler agenda. Among hackers, one of the most frequently cited motivations is that hacking is fun and is like solving a game or a puzzle. Many hackers perceive their activities to be harmless and they do not believe that they are victimizing anyone. In addition, the thrill of doing something illegal or the ability to access data unavailable to the public can be a tempting motivator. The chance to earn recognition from within a hacker group also offers strong incentive for up-and-coming hackers who have yet to gain a reputation. Finally, many hackers justify their actions by explaining that they are doing a service for other
Contrary to popular belief, most hackers are not international or industrial spies with evil motives and a desire to rule the world; most hackers have a simpler agenda. Among hackers, one of the most frequently cited motivations is that hacking is fun and is like solving a game or a puzzle. Many hackers perceive their activities to be harmless and they do not believe that they are victimizing anyone. In addition, the thrill of doing something illegal or the ability to access data unavailable to the public can be a tempting motivator. The chance to earn recognition from within a hacker group also offers strong incentive for up-and-coming hackers who have yet to gain a reputation. Finally, many hackers justify their actions by explaining that they are doing a service for other
0 comments:
Post a Comment