Access over 35 million academic & study documents

Hackers & Consuming and Accessing of The Internet Discussion

Content type
User Generated
Subject
Computer Science
Type
Discussion
Rating
Showing Page:
1/2
DISCUSSION:
In the current era, a huge spike can be noticed in the rate of percentage in consuming and
accessing of the Internet. Almost all the prioritize corporations, companies, agencies,
institutions of this day whether government-run or private entities are hugely dependent on
the Internet for their daily work. The internet is used for communication as well as the
transfer of information that is crucial to the work of these organizations. Educational and
Research institutes are readily providing study and research findings online for the use of
potentially any person in need, this information and knowledge is being readily available and
utilized. Governments are providing information on matters of national importance to its
citizens directly through the portals of the relevant agencies. People may shop, watch movies
or videos, communicate, and even learn with the help of the Internet. Thus, the internet not
only stores sensitive and relevant information of the people but also of the various
corporations and governments. There needs to exist integrity, availability as well as the
confidentiality of such sensitive information for the Internet to function as a mere tool of ease
rather than a weapon with all the knowledge of every single human being, corporation and
government.
However, as may be witnessed from time to time the presence of its intrusion errors and
traffic controls almost all the systems and types of equipment provides chances to individuals
with malicious intent to attack and destroy or steal sensitive information. These attacks on
systems with malicious intent are called cyber-attacks and are carried out by people with
intricate knowledge of coding and the working of the various elements necessary for the
functioning of the Internet, who are called Hackers. Hackers study the code used to create
and run the applications and software and identify weak points which they can then
manipulate to can access the systems and carry out the cyber-attack. These weak points in the
code are called bugs and they exist in all types of equipment, applications, and software on
the Internet waiting to be found and exploited. The hackers may use these bugs to gain access
to the master code used to create and run the system and make necessary changes to the code
potentially stealing it.
Hackers are also of two types the ones who identify these bugs and report them two the
relevant authorities potentially helping prevent cyberattacks are known as ‘White hat
Hackers whereas the members with malicious intent are known as Black hat Hackers.
These white hat hackers help corporations and software developers, as well as governments,
identify points of potential weakness that may be exploited, thus preventing major security
breaches. But some bugs remain unchecked which results in major breaches in companies
such as Microsoft, Google, Facebook, Twitter, Instagram, and Apple. The major software
developers have also announced cash prizes to any person who identifies and reports such
bugs. Modern devices come equipped with traffic, intrusion prevention systems or rectifying
those systems, privacy loss protection, and securing the content transparency functions such
as accuracy to control the spam, combating with virus, and URL transparency. Yet security
experts admit that nothing is 100% secure. There will always exist another weak point, new
vulnerability, or human error which will lead to one of the thousand attacks that these
companies or people face every day. The attacks on various data centres, servers, PCs, and
mobile phones are ever-increasing no matter how much the securities tighten. The newer
attacks are more advanced and more complicated making them more and more difficult to

Sign up to view the full document!

lock_open Sign Up
Showing Page:
2/2

Sign up to view the full document!

lock_open Sign Up
Unformatted Attachment Preview
DISCUSSION: In the current era, a huge spike can be noticed in the rate of percentage in consuming and accessing of the Internet. Almost all the prioritize corporations, companies, agencies, institutions of this day whether government-run or private entities are hugely dependent on the Internet for their daily work. The internet is used for communication as well as the transfer of information that is crucial to the work of these organizations. Educational and Research institutes are readily providing study and research findings online for the use of potentially any person in need, this informa ...
Purchase document to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Anonymous
Great! Studypool always delivers quality work.

Studypool
4.7
Indeed
4.5
Sitejabber
4.4