Hackers And Security. What Are The Effects Of Data Encryption And Firewalls?
?
Over the last several years, the computer industry has grown to an
all time high of technology and knowledge. With the existence of hackers,
swift precautions are being taken. The placement of firewalls and the task
of data encryption are becoming a necessary fact of business for those with
confidential information. And still, this is not enough. Hackers have
become so involved with the tasks of cracking firewalls and decoding
encryption, it seems that privacy is a virtue of the past. People are no
longer safe as they once were. The presence of encryption and firewalls are
growing stronger, but so are hackers. In the following report, you will
read what a true hacker is, the effects of ...
Want to read the rest of this paper? Join Essayworld today to view this entire essay and over 50,000 other term papers
|
academic circles. Hackers are becoming more common, and quickly
learning new techniques and methods, which no longer leave computer systems
as 'safehouses'. The question of "what kind of person is a Hacker?" cannot
be answered simply. Hackers vary in race, style and preference. Since every
person is different, therefore so are hackers, "Each Hacker has their own
style and methods" (Rootshell). According to the Hackers Code of Ethics, a
true Hacker is one who shares:
1 The belief that information-sharing is a powerful positive good,
and that it is an ethical duty of hackers to share their expertise
by writing free software and facilitating access to information
and to computing resources wherever possible.
2 The belief that system cracking for fun and exploration is
ethically OK as long as the cracker commits no theft, vandalism,
or breach of confidentiality.
3 The belief that there actions are not illegal, but those ...
Get instant access to over 50,000 essays. Write better papers. Get better grades.
Already a member? Login
|
devices.
For Hackers, a firewall is one of the tougher devices to crack. Since
Firewalls are always different, there are no standards for breaking down
and exploiting the system. Through programs called port scanners, and
firewall phreaking, hackers are able to find vulnerable ports (open holes
in the server) which can then be sent certain packets of data, called
nuking, that can crash and disable the system. According to Dan Farmer, of
Sun Microsystems,
Every day, all over the world, firewalls and hosts are being
broken into. The level of sophistication of these attacks varies
widely; while it is generally believed that most break-ins
succeed due to ...
Succeed in your coursework without stepping into a library. Get access to a growing library of notes, book reports, and research papers in 2 minutes or less.
|
CITE THIS PAGE:
Hackers And Security. What Are The Effects Of Data Encryption And Firewalls?. (2008, January 2). Retrieved December 23, 2024, from http://www.essayworld.com/essays/Hackers-Security-What-Effects-Data-Encryption/76851
"Hackers And Security. What Are The Effects Of Data Encryption And Firewalls?." Essayworld.com. Essayworld.com, 2 Jan. 2008. Web. 23 Dec. 2024. <http://www.essayworld.com/essays/Hackers-Security-What-Effects-Data-Encryption/76851>
"Hackers And Security. What Are The Effects Of Data Encryption And Firewalls?." Essayworld.com. January 2, 2008. Accessed December 23, 2024. http://www.essayworld.com/essays/Hackers-Security-What-Effects-Data-Encryption/76851.
"Hackers And Security. What Are The Effects Of Data Encryption And Firewalls?." Essayworld.com. January 2, 2008. Accessed December 23, 2024. http://www.essayworld.com/essays/Hackers-Security-What-Effects-Data-Encryption/76851.
|