Introduction
Advancement in technology has created major challenges in data security with hackers improvising techniques to maliciously tamper with stored information on computers or servers. Noticeably, there are different motivations for computer hacking. For example, some hack computers in government agencies for fun, while others are motivated by theft of information of sabotage. Nevertheless, all the hackers pose serious problems to information security by engaging in computer crime (Rosoff, Pontell, & Tillman, 2020). Therefore, it is indispensable to criminally prosecute hackers who break into government computers.
Firstly, hackers should be criminally prosecuted since they tamper with confidential information, which might be of harm if disseminated to the public. Government agencies such as the Federal Bureau of Investigations (FBI) or Central Intelligence Agency (CIA) store a lot of confidential information that is not for public consumption such as files concerning military operations or internal security programs. However, hackers may infiltrate the computers for fun such as to prove they can do so, which is a common culture among them. According to Rosoff et al (2020), hackers, especially teenagers are motivated by fantasies of being invisible and uncontrolled superiority complex, which influences them to attempt even the most secure systems. The exposure or erasure of such information can be considered as white-collar crime and perpetrators should be prosecuted. The Computer Fraud and Abuse Act (CFAA) prohibits any kind of unauthorized access to another computer. The law acknowledges that while some simple acts of hacking might not lead to any damage to the victim, perpetrators need to be punished to serve as a deterrent to others.
Additionally, those who break into private corporations’ computers should also be prosecuted for violating the CFAA law. Even though no other criminal activity occurs after breaking into the computers, the hackers expose the organization to other vulnerabilities. Noticeably, it is a common behavior among hackers to send worms or viruses into other's computers without their knowledge. The bugs lower the security of information stores in the computers creating increased risks for secondary tampering. Additionally, before most companies know that their systems have been compromised, information theft or damage may have occurred. In such a case, secondary hackers identify vulnerabilities created by their predecessors and tamper with an organization's data for their financial gains.
Moreover, hacking private organization damages their public reputation and credibility. For example, if customers identify instances of data breaches in an organization, they are likely not to engage in business with the corporate again. Big service corporations such as banks and insurance companies face imminent threats from hackers. If a hacker gets access to their stored data, the public might be wary of the security of their money or benefits. As a result, the organization’s reputation is damaged, and it ends up losing its market share. Noticeably, such stunts have been in existence where competitors pay hackers to discredit the security of a specific rival corporation. The above events justify the need for prosecution of any individual who accesses a corporates computer without any legal authorization.
On the other hand, some bugs and viruses used to hack corporations might have long term implications on a company's data or website. For instance, the bugs can interfere with information storage and retrieval leading to the dissemination of incorrect data. Corrupt data lowers the credibility of information in an organization, which might cause financial damages. Additionally, organizations might incur huge costs trying to build their damaged systems or creating a new website. Even though hacking occurs without any criminal activities, it would be unfair if minor hackers were left free.
Methods of avoiding Identity Theft
With the increasing use of social media, online government services, and e-commerce, the risk of identity theft increases each day. In this case, hackers or thieves could use an individual’s identity without permission, making them liable malicious actions (“Identity theft”, 2020). For example, a thief can use one’s credit card information to purchase goods on online platforms that give little concern to identify verification. In most cases, the victim is unaware of the identity theft until later when they identify suspicious activities with their credit cards or insurance covers (“Identity theft”, 2020). Albeit there is no certain way to prevent becoming a victim of malicious practice, there are several practices that one can engage in to eliminate the vulnerability of their online data and minimize the risks of identity theft.
Firstly, one should monitor their credit regularly to ensure that there are no suspicious activities. Monitoring one’s credit after 30 days is effective in identifying whether someone has opened a new account under his or her name (“Identity theft”, 2020). Most credit reporting bureaus do not charge individuals who enroll for periodic reports concerning their credit status. The practice minimizes theft and increased liability since a person can freeze the credit if he or she notices any identity theft. Additionally, credit lenders offer acco8unt freeze options, which people should utilize. The freeze option denies access to an account’s information unless one requests for unfreezing (“Identity theft”, 2020). In this case, if someone steals social security numbers, they will be denied access while trying to open accounts with the victim's names. In the event one has been victimized, they can request for a fraud alert to facilitate creditors to verify the information.
Secondly, people should use strong passwords while visiting various sites. Noticeably, it can be tiring to have multiple passwords for different online accounts; therefore, people are tempted to use weak passwords, which are easy to remember (“Identity theft”, 2020). For instance, people often use their pet names, college admission numbers, or phone numbers. However, hackers have developed tools in which they use to guess people's passwords giving them a gate pass to one's social media platforms or online banking services. Hence, to minimize the damage, individuals should create a strong and unique password for every online site. String passwords have a mix of alphabet cases, symbols, numbers, and are long making it difficult to guess or memorize them (Irby, 2020). Moreover, if online sites offer two-factor authorization, it is advisable or people to set it up since it serves as an additional layer of security (Irby, 2020). In most cases, the two-factor verification sends codes to the user’s phone number.
Thirdly, people should safeguard their social security numbers since they serve as the master key to their biodata. In this case, people should memorize their social security numbers to avoid carrying their cards everywhere, reducing the risk of theft (Irby, 2020). Moreover, people should ask to confirm whether their social security numbers will be protected if they are asked to provide them (Irby, 2020). In case an individual doubts the security of their information, they should not provide it to minimize the risk.
Noticeably, people should be aware of various scams and phishing sites that aid hackers in retrieving personal data. Phishing is done through lucrative websites that lure unsuspecting internet users into visiting. They request individuals to input their data, which is used by the thieves. People should avoid suspicious website invites, especially from unauthentic sites. Moreover, people should protect their emails by adding additional layers of security or installing virus detection software and firewalls on their computers (Irby, 2020). Primary emails are essential and store critical data; therefore, if hackers can get control of the mail by either sending corrupt file attachments or phishing the password, a person’s data is placed under jeopardy (Irby, 2020). A compromised email can lead to theft and make it hard for the victim to deny any allegations.
Security Tools for Home and Enterprise Internet Operations.
Given the increased need for data security, there are a plethora of Internet security tools that protect both home and enterprise operations. The security tools prohibit access, scan, and identify any malicious applications or bugs in a computer that might make them vulnerable (Daniels, 2019). Noticeably, users might find themselves being compelled to use multiple tools since there is rarely a one-fits-all security feature,
Firstly, Antimalware or antivirus applications protect computers and other programable devices from security breaches. They detect and eliminate the malware before it spreads to other files on a computer. Currently, there is a myriad of commercial antivirus software such as Kaspersky and Avast that users can purchase for both home and enterprise use. Secondly, password managers are useful in facilitating the storage and organization of passwords (Daniels, 2019). They allow users to create an encrypted master program that allows them to access all their passwords in one database. Thirdly, computer firewalls are infamous network filters that block dangerous traffic from accessing a user’s network or personal computer (Daniels, 2019). They provide restrictions on data packets moving in and out of a private network, creating checkpoints between the public Internet and private networks. As a result, there prevent hackers from accessing one's computer. Most operating systems have inbuilt firewall applications such as the Windows Defender in Microsoft OS (Daniels, 2019).
Fourthly, web vulnerability tools allow developers to assess the security of their websites during the web development process. They seek to identify security vulnerabilities such as Command injection, path traversal, cross-site scripting, SQL injection, and insecure server configuration (Daniels, 2019). For example, a dynamic analysis security testing tool is utilized from the outside to test the potential vulnerability hackers might exploit. The tools can aid enterprises, especially those that offer online banking to ensure that they develop top not applications.
Fourthly, security suites are popular for offering a wide array of Internet security for bot home and commercial use. The security suites or applications comprise of firewalls, anti-spyware, anti-virus, and drive scanning tools (Daniels, 2019). Unlike the other cybersecurity tools, they are effective since they offer all-round protection, minimizing the hustle of applying multiple software (Daniels, 2019). The most common examples are the McCafé and Kaspersky Internet Security albeit they require a subscription fee based on the package one chooses.
Noticeably, internet suits are the most effective Internet security tools for both home and office use. They offer network security in addition to internet protection making sure that users’ data is secure both offline and online. Additionally, since they often have subscription fees, users have 24/7 live support, which can be accessed through mail or phone calls (Daniels, 2019). The live support is essential since users can report unusual behavior their computers and allow experts to help them out. On the other hand, password managers and firewalls are the least effective in internet security. Notably, hackers have identified multiple ways to bypass firewalls especially using virtue protected networks (VPN) (Daniels, 2019). Therefore, people should apply an additional layer of security despite them having active firewalls and password managers.
References
Daniels, D. (2019). 14 network security tools and te...
Cite this page
Data Security Challenges: Computer Hacking Risks & Motivations - Essay Sample. (2023, Aug 04). Retrieved from https://proessays.net/essays/data-security-challenges-computer-hacking-risks-motivations-essay-sample
If you are the original author of this essay and no longer wish to have it published on the ProEssays website, please click below to request its removal:
- Computers and their Effects on the 21st Century Life
- Pennsylvania Department of Education Website Summary Reflection Paper
- How the Hawthorne Studies Influences Researchers' Thinking About Employees' Motivation
- Production Method and the Best Technique for Manufacture Essay
- Essay Sample on Explanation on How Big Data Works in Digital Supply Chain
- Essay Example on HL7: A Standard for Healthcare Information Management
- Essay on Humans Augmented: Rise of Tech to Improve Human Productivity