Essay Sample on History of the Computer Hacking

Paper Type:  Essay
Pages:  4
Wordcount:  830 Words
Date:  2022-11-26

Introduction

Computer hacking dates several years down the line. Computer hacking remains a major criminal offense in every part of the world given that it mainly involves unauthorized access of another person's or institutions private information. Hackers have fundamental knowledge and skills that they apply when it comes to hacking and ensure that they leave no trace. The early forms of hacking paved the current system that hacking takes place. Most of the hacking that has taken place has gone unnoticed based on the strategies and skills that hackers use to carry out their activities. The United States like any other country remains among those nations that have undergone challenges related to hacking. The paper seeks to examine two cases of computer hacking underlining the victims, perpetrators the effects of the hack that took place alongside the fundamental steps that the organizations took after the hack.

Trust banner

Is your time best spent reading someone else’s essay? Get a 100% original essay FROM A CERTIFIED WRITER!

Types of Business Hacked

The two major types of business that faced hacking challenge include the Universities hacking that took place in which almost one hundred and forty-four universities were infiltrated. The hacking resulted in serious damages on the universities data with other companies also becoming victims to the hacking. It is important to note that the attackers used spear phishing emails to access key information that resulted in a huge loss. The second hacking that the paper will discuss is Marriott International. The management realized and announced that hackers had stolen data belonging to approximately five hundred million consumers who became the major victims. The attack took place in the year 2014 but remained undetected for the next four years after the attack had taken place.

Reasons for Hacking

In the first cases of the Universities hacking, the main reason behind the hacking was for the suspects to gain access to the data that belonged to the universities for their gain and to find out the nature of the items stored in the system. To other people, the fundamental reason behind the attack seems to remain unknown. In the second hacking, the hacker's motive was to steal some of the essential data were belonging to their customers.

Methods Used to Swipe Data

For the Universities hacking, the attackers used spear phishing emails to access data that were belonging to the institutions. The attackers were able to steal a huge amount of data for personal use. In the other hacking of Marriott International, the hackers used the password hacking methods to gain access to the organizational information without the fundamental knowledge of the owners

Types of Data Stolen

Both cases of hacking, informational data that were stolen were those that belong to both the universalities and for the Marriott International organization. Attackers were keen to access vital information that belonged to the management of both the two different entities.

The Perpetrators

For the universities hacking, the Perpetrators were the nine Iranian citizens whose motives still lie unnoticed and were keen to secure the data belonging to the universities for their unknown use. In the second place of the hacking, the Perpetrators were the Chinese intelligence groups who were seeking to get information that belongs to the USA citizens.

Kind of Law Enforcement Steps

The investigative department took the fundamental step to find out the fundamental reasons and the individuals who were involved in both cases of the hacking. The security personality was able to secure the source and the reason behind the hacking who were able to face the rule of the law that governs security breach.

Prosecution

In both cases, the culprits were prosecuted and even charged for having violated the rule of law. Besides, the victims were held responsible for the crime committed as they gave the reason behind their breach attempts.

The Victims

In the Universities case of security breach, the victims were mainly the school management and the entire staffs who lost their data. Besides, even the student's body was able to lose their academic data. Besides, most of the organizations that had close relations with the Universities that were affected also managed to be victims of the attack. In the second attack, customers were the major victims, in which they lost most of their essential data.

Were There Convictions

In both cases, there were convictions. After the investigation that took place in the department of criminal justice, both the culprits could be held responsible for their casualties. Most of the hacking that has taken place has gone unnoticed based on the strategies and skills that hackers use to carry out their activities.

Preventive Measure Taken After Hacking

After the attack, both of the two businesses that were victims of the attack improved their security system. For instance, in both cases, they managed to use secure passwords that were strong enough to prevent a future attack. In both cases, the security measures were seeking to reduce and help detect any form of threat or security breach that could take place to threaten the data stored either that belongs to the clients.

Cite this page

Essay Sample on History of the Computer Hacking. (2022, Nov 26). Retrieved from https://proessays.net/essays/essay-sample-on-history-of-the-computer-hacking

logo_disclaimer
Free essays can be submitted by anyone,

so we do not vouch for their quality

Want a quality guarantee?
Order from one of our vetted writers instead

If you are the original author of this essay and no longer wish to have it published on the ProEssays website, please click below to request its removal:

didn't find image

Liked this essay sample but need an original one?

Hire a professional with VAST experience and 25% off!

24/7 online support

NO plagiarism