Computer Memory Hacking1
Computer Memory Hacking
Introduction
This essay is about computer hacking and computer hacking. This essay will describe what the hacking of memory for a computer, or the hacking of RAM is for a computer. The essay will also include the common tools that hackers use to interrupt the memory of a computer with two common examples of this action being done included in this essay. This essay will also include three best practices that computer users can use to prevent from their computers being hacked of memory and/or RAM. As well, this essay will examine the significance of hacking in organizations as well as in modern society. Two quality resources will be the basis for supporting source material for this essay. First, I will begin by describing what the hacking of memory for a computer, or the hacking of RAM is for a computer.
According to the North Carolina State University Study Guide, they give this definition of hackers:
Hackers are people who try to gain unauthorised access to your computer. This is normally done through the use of a 'backdoor' program installed on your machine. You can protect yourself from these by using afirewalland a good up-to-date anti-virus program. You would normally get such a backdoor program by opening an E-mail attachment containing the backdoor program. It is normal for such a backdoor program to send out more copies of itself to everyone in your address book, so it is possible for someone you know to unintentionally send you a malicious program. A few backdoor programs can work with any e-mail program by sitting in memory and watching for a connection to a mail server, rather than actually running from within a specific mail program. These programs automatically attach themselves to any e-mail you send, causing you to unintentionally send out malicious programs to your friends and associates (North Carolina State University, 2016).
The guide also goes onto to state that hackers break into computer user’s memory and/or RAM and can sometimes destroy all of the data in a computer user’s computer. The United States Department of Justice (2016) goes on to state that computer hacking is a federal crime and also infringes on intellectual property of the computer user that is being hacked. The North Carolina State University Study Guide (2016) says that many people who hack computers do it because it is a “challenge” and they seek the thrill of being able to have access to other people’s information.Computer hacking can happen to anyone and anywhere, for example from a personal computer to the United States government.Next I will give two examples of the common tools that hackers use to hack computers.
Computer hackers will sometimes hack computers out of revenge and they tend to target two different sources: government departments and personal computers. Due to this there are four types of hackers which emerge (North Carolina State University, 2016). The four different types of hackers are pranksters, fame seekers, educational and criminals. Next I will discuss three best practices that a computer user can use to guard against hackers.
The three best practices that a computer user can use to guard against hackers come from the North Carolina State University (2016):
A skilled hacker will do whatever it takes to break into your computer. Just ask Microsoft. Even a giant software company is not completely safe. The company was hacked by a Trojan-horse program hidden inside an innocent-looking email attachment. The Trojan horse replicated itself throughout Microsoft's internal network and eventually emailed proprietary secrets back to the originator of the Trojan horse. Follow these six steps to protect your computer from being hacked:
- Don't let other people onto your computer unless you really trust them. A great way to do this is to password-protect your computer.
- Don't ever open attachments. Avoid Trojan horses and viruses by following this rule. For more information, gohere.
- Turn off file sharing if you don't need it. If a port scan is done on your computer, a hacker may find a back door to your machine and access your files.
- Use an antivirus program and keep it up to date. For more information, gohere.
- If you have a constant Internet connection, use a firewall. For more information, gohere.
- Routinely update Windows software. This is extremely important. Updates fix many bugs and known security holes within the Windows operating system (North Carolina State University , 2016).
With these best practices kept in mind, this will protect computer users from being hacked. Next I will discuss how hacking has effected organizations and modern society using two key examples.
Two key examples of how hacking has effected organizations and modern society include the first one I will mention from the Federal Bureau of Investigation (FBI). The FBI (2015) were involved in dismantling a criminal ring of hackers known as Darkode that was running in 20 countries worldwide. Charges were laid. In the New York Field Office of the FBI (2015), hackers had stolen more than 150,000 press releases to generate $30 million in illegal funds and the FBI (2015) charged nine people with two indictments.
Conclusion
This essay has described what hacking of memory and/or RAM means. This essay has examined the common tools that hackers use to hack memory of computer devices, also detailing two real-life examples of such tools in action. This essay has identified three best practices that one should use to protect their computers from being hacked. Finally, this essay has analyzed the significance of hacking in organizations and modern society.
References
North Carolina State University.(2016). Ethics in Computing. Online: North Carolina. Retrieved
from
The Federal Bureau of Investigation. (2015). Major Computer Hacking Forum Dismantled.
Online: Washington. Retrieved from
The Federal Bureau of Investigation. (2015). Nine People Charged in Largest Known Computer
Hacking and Securities Fraud Scheme. Online: New York. Retrieved from
The United States Department of Justice. (2016). Reporting Computer, Internet-Related, or
Intellectual Property Crime. Online: Washington. Retrieved from