})(window,document,'script','dataLayer','GTM-55V2NQQ6');

Hacking and Counter Measures

346 words | 2 page(s)

There are different types of hacking that are categorized according to the way they interfere with the computer systems. Hacking by Trojan systems involves the use of malicious programs that are passed into a computer system through file-sharing. Impersonation and hijacking are also used by hackers to retrieve some sensitive information like passwords and other forms of confidential information. Denial of Service is also a hacking system that makes a user experience high levels of instability due to intrusion.

Phishing involves these email scams in getting confidential information like financial data and passwords from innocent internet users. Link manipulation is phishing the technique through which links contained in emails can be used to achieve mischievous intentions by hackers (Bhardwaj & Singh, 2011). Filter evasion techniques like images can also be used by hackers to assist in avoiding the filters that prevent them from gaining access. Phone Phishing can also occur through fake messages sent through phone. Website forgery includes the creation of deceptive websites that are identical to the original ones to assist in getting information from the users.

puzzles puzzles
Your 20% discount here.

Use your promo and get a custom paper on
"Hacking and Counter Measures".

Order Now
Promocode: custom20

There are various strategies that can be used in avoiding the hacking. People should be trained to combat phishing attempts be recognizing them and mitigating them through technical responses. People should also be trained on how to identify legitimate sites in order to avoid impersonation attempts. In order to avoid spyware, the use of software that block them from their malicious activities are very essential towards avoiding the leakage of information that can be very harmful to the computers (Bhardwaj & Singh, 2011). Trojan horses also disguise as legitimate email attachments and once in the computer, and they can easily access sensitive data. People should also be careful with some of the attachments that are in the emails and avoid downloading and installing any programs they do not understand. Internet users should also reduce their vulnerability by the use of legitimate applications like browsers and other software that may be safe.

    References
  • Bhardwaj, Minakshi & Singh, G.P. (2011). Types of Hacking and their Counter Measure. International Journal of Educational Planning & Administration. 1(1): 43-53.

puzzles puzzles
Attract Only the Top Grades

Have a team of vetted experts take you to the top, with professionally written papers in every area of study.

Order Now