ISSC 451 hacking term paper

timer Asked: Feb 25th, 2019
account_balance_wallet $20

Question Description

You will be required to write one term paper this semester. The specifications are as follows:

  1. You must write a 4-6 page term paper on a topic of your choice related to cybercrime (ALL TOPICS MUST BE APPROVED). Some examples would include, how to avoid being a victim of cybercrime, the laws surrounding cybercrime, a recent incident related to cybercrime or pick an individual cybercrime and discuss the impact this crime has on society. Please write the term paper in a Word document and then upload it for grading.
  2. Your term paper outline is due at the end of Week 2.
  3. Your term paper is due at the end of Week 8.
  4. In addition to the 4-6 pages of the paper itself, you must include a title page and a reference page.
  5. Your title page must include the title of your paper, the date, the name of the course, your name, and your instructor’s name.
  6. Your reference page must be written in APA citation style, Arial or Time New Roman styles, 12-point font.
  7. Page margins Top, Bottom, Left Side, and Right Side = 1 inch, with reasonable accommodation being made for special situations.
  8. Your paper must be in your own words, representing original work. Paraphrases of others’ work must include attributions to the authors. Limit quotations to an average of no more than 3-5 lines, and use quotations sparingly. It is always better to write the information in your own words than to directly quote.
  9. When submitting the paper, it will automatically run through Turnitin for review. PAPERS WITH AN ORIGINALITY REPORT FROM TURNITIN OVER 15% OR OVER 2% FROM A SINGLE SOURCE WILL RESULT IN A ZERO GRADE.

Running head: HACKING 1 Hacking Institutional Affiliation Date HACKING 2 Hacking Thesis Statement: Hacking involves accessing another person’s computer system without permission. I. Introduction a) According to Saini, Rao, & Panda, (2012) hacking is unauthorized access of a computer or a network. b) It’s an act committed by an intruder by accessing a computer or network permission from the owner. c) Ideally, hackers are computer programmers with an advanced level of knowledge. II. Reasons for hacking a) Some computer hacker executes hacking for the purpose of showing off - since they possess exceptional expert skills. b) These types of hackers undertake relatively harmless activities such as modifying software or hardware to some perform tasks outside the creator’s intent. c) Some hackers are commonly driven by greed, and in this case, they target banks, insurance firms, and other organizations with the aim of acquiring confidential details. d) Hackers displaying destructive intentions are called crackers or Black Hat. HACKING 3 e) Those hackers who exploit computers for exploration or curiosity purpose are called White Hat-they break into a network system to alert into the owners of their security flaws. f) Not all hackers are altruistic, and some fall on between the black hat and white hat. Those hackers are known as Grey Hat. III. Techniques utilized by hackers to get access over the computer or internet system. A. The hackers use SQL injection technique to spot the security vulnerabilities of the software that is running on the Internet. i. SQL injection can be used to attack the SQL database that is poorly protected or unprotected. ii. To gain access, a hacker enters a portion of SQL code which is in the form of a web where the user must enter the username and the password to give the hacker further access iii. SQL injection can be used to retrieve information such as credit card number B. Secondly, hackers can use a theft or FTP passwords technique. i. In this technique, hacker tempers with the website to gain access to the PCs that are poorly protected. C. Lastly, hackers use a technique of cross-site scripting. HACKING 4 i. In this technique, a cracker infects a Web page with a malicious program such that when the victim visits the Web page, the scripts automatically downloads in the user browser and executed. ii. IV. The script deceives the user and gathers confidential information. Conclusion a) Hacking one of the most common computer-related crimes today. b) The motives of the hacking vary from one hacker to the other. HACKING 5 References Grabosky, P. (2000, April). Computer crime: A criminological overview. In Workshop on Crimes Related to the Computer Network, Tenth United Nations Congress on the Prevention of Crime and the Treatment of Offenders, Vienna (Vol. 15). Moore, R. (2014). Cybercrime: Investigating high-technology computer crime. Routledge. Saini, H., Rao, Y. S., & Panda, T. C. (2012). Cyber-crimes and their impacts: A review. International Journal of Engineering Research and Applications, 2(2), 202-209.

Tutor Answer

School: UT Austin


Running head: HACKING


Student’s Name
Instructor’s Name
Institutional Affiliation



Technological developments realized in the last few decades have benefited the world in
various ways, but challenges associated with cybercrime continue to affect individuals, their
businesses, and institutions through activities such as hacking to obtain vital information. Saini,
Rao, and Panda (2012) associate hacking with the unauthorized access of a computer or network
to obtain data that the criminals can use to commit a series of crimes, such as defrauding and
impersonating other people to gain financially. The process involves committing certain acts
where intruders access computers or networks without the permission of the owners or
controllers of the systems to disrupt operations, which derail production processes in
organizations (Grabosky, 2000). Indeed, hackers attack institutional information technology (IT)
structures using their knowledge of computer programming with additional level of knowledge
and use help from “insiders” or disgruntled former employees to understand the layout of the
systems (Saini et al., 2012). While technological progress has brought benefits to the world such
as ensuring improved production processes in industries, the developments entail challenges such
as hacking, which involve accessing another person’s computer system or network without
Reasons for Hacking
Hackers execute their plans as a means of fulfilling the needs of their curiosity and
knowledge concerning computer systems and to compete with peers. The ...

flag Report DMCA

awesome work thanks

Similar Questions
Hot Questions
Related Tags
Study Guides

Brown University

1271 Tutors

California Institute of Technology

2131 Tutors

Carnegie Mellon University

982 Tutors

Columbia University

1256 Tutors

Dartmouth University

2113 Tutors

Emory University

2279 Tutors

Harvard University

599 Tutors

Massachusetts Institute of Technology

2319 Tutors

New York University

1645 Tutors

Notre Dam University

1911 Tutors

Oklahoma University

2122 Tutors

Pennsylvania State University

932 Tutors

Princeton University

1211 Tutors

Stanford University

983 Tutors

University of California

1282 Tutors

Oxford University

123 Tutors

Yale University

2325 Tutors