Introduction
Computer hacking dates several years down the line. Computer hacking remains a major criminal offense in every part of the world given that it mainly involves unauthorized access of another person's or institutions private information. Hackers have fundamental knowledge and skills that they apply when it comes to hacking and ensure that they leave no trace. The early forms of hacking paved the current system that hacking takes place. Most of the hacking that has taken place has gone unnoticed based on the strategies and skills that hackers use to carry out their activities. The United States like any other country remains among those nations that have undergone challenges related to hacking. The paper seeks to examine two cases of computer hacking underlining the victims, perpetrators the effects of the hack that took place alongside the fundamental steps that the organizations took after the hack.
Types of Business Hacked
The two major types of business that faced hacking challenge include the Universities hacking that took place in which almost one hundred and forty-four universities were infiltrated. The hacking resulted in serious damages on the universities data with other companies also becoming victims to the hacking. It is important to note that the attackers used spear phishing emails to access key information that resulted in a huge loss. The second hacking that the paper will discuss is Marriott International. The management realized and announced that hackers had stolen data belonging to approximately five hundred million consumers who became the major victims. The attack took place in the year 2014 but remained undetected for the next four years after the attack had taken place.
Reasons for Hacking
In the first cases of the Universities hacking, the main reason behind the hacking was for the suspects to gain access to the data that belonged to the universities for their gain and to find out the nature of the items stored in the system. To other people, the fundamental reason behind the attack seems to remain unknown. In the second hacking, the hacker's motive was to steal some of the essential data were belonging to their customers.
Methods Used to Swipe Data
For the Universities hacking, the attackers used spear phishing emails to access data that were belonging to the institutions. The attackers were able to steal a huge amount of data for personal use. In the other hacking of Marriott International, the hackers used the password hacking methods to gain access to the organizational information without the fundamental knowledge of the owners
Types of Data Stolen
Both cases of hacking, informational data that were stolen were those that belong to both the universalities and for the Marriott International organization. Attackers were keen to access vital information that belonged to the management of both the two different entities.
The Perpetrators
For the universities hacking, the Perpetrators were the nine Iranian citizens whose motives still lie unnoticed and were keen to secure the data belonging to the universities for their unknown use. In the second place of the hacking, the Perpetrators were the Chinese intelligence groups who were seeking to get information that belongs to the USA citizens.
Kind of Law Enforcement Steps
The investigative department took the fundamental step to find out the fundamental reasons and the individuals who were involved in both cases of the hacking. The security personality was able to secure the source and the reason behind the hacking who were able to face the rule of the law that governs security breach.
Prosecution
In both cases, the culprits were prosecuted and even charged for having violated the rule of law. Besides, the victims were held responsible for the crime committed as they gave the reason behind their breach attempts.
The Victims
In the Universities case of security breach, the victims were mainly the school management and the entire staffs who lost their data. Besides, even the student's body was able to lose their academic data. Besides, most of the organizations that had close relations with the Universities that were affected also managed to be victims of the attack. In the second attack, customers were the major victims, in which they lost most of their essential data.
Were There Convictions
In both cases, there were convictions. After the investigation that took place in the department of criminal justice, both the culprits could be held responsible for their casualties. Most of the hacking that has taken place has gone unnoticed based on the strategies and skills that hackers use to carry out their activities.
Preventive Measure Taken After Hacking
After the attack, both of the two businesses that were victims of the attack improved their security system. For instance, in both cases, they managed to use secure passwords that were strong enough to prevent a future attack. In both cases, the security measures were seeking to reduce and help detect any form of threat or security breach that could take place to threaten the data stored either that belongs to the clients.
Cite this page
Essay Sample on History of the Computer Hacking. (2022, Nov 26). Retrieved from https://proessays.net/essays/essay-sample-on-history-of-the-computer-hacking
If you are the original author of this essay and no longer wish to have it published on the ProEssays website, please click below to request its removal:
- Linear Programming Case Study
- Cyber Security in Business Organizations
- Data Security Regulation Requirements Essay
- Essay Sample on Supply Network Strategies
- Essay Example on Insider Threats: Malicious or Unintentional?
- Essay Sample on Governing Cyberspace: The ICT Debates at Various Levels
- Essay Example on C4 Model: A Tool for Communicating Software Architecture