Custom essays on The effect of computer hacking on privacy

The development of network Internet technologies has led to the development of cyber-crimes and the appearance of such notions as information or network security and privacy. The first known virus transmitted through the Internet, appeared in January 1999 and was called HAPPY-99. It is believed that the virus was created in order to gain access to the passwords of a number of Western banks’ clients (Embar-Saddon 1033-43).
However, in order to obtain codes and passwords there is no urgent need to carry out an attack via the Internet. Many computer terrorists use simpler and less reliable methods, through installing spyware programs directly on a target computer from a floppy disk. Nowadays, spyware programs could be downloaded from any website containing free software (Reilly 42-44). Statistics shows that 99% of users put all the settings default, i.e. the way they are suggested by the system. So further the spyware will just record and save everything what is typed by the user on the computer keyboard (names, passwords, etc.). After some time, the cracker can come and pick up all the codes, which can be done with the help of the bat-file (Leng 187-89). However, this act is already computer terrorism, because it can be applied to any computer, including those belonging to special services.
For instance, most security services have their own computer networks, isolated from the outside world and protected by security means. Thus, there is a parallel “secret” version of the World Wide Web, designed for various purposes, ranging from sending reconnaissance photographs and ending with the transfer of information to diplomats. From this perspective, it is hard to even imagine the damage which could be caused to the country-custodian of such computer information in case of violating its integrity by the cracker-hacker. Obtaining such information by hackers, its transfer to third parties, failures in the private computer networks and similar violations make the core of computer terrorism (Embar-Saddon 1033-43; Furnell and Warren 28-34).
The consequences of computer terrorism can be unpredictable. According to unconfirmed reports, during the attack on the largest U.S. cities by suicide bombers on September 11th, 2001, the U.S. air defense system was disabled by computer hackers, being in the service of terrorist number 1 in the world, Osama bin Laden. Perhaps this is the first case of collaboration of terrorists and computer hackers, which led to a huge number of fatalities (Fallows 58-63).
Another manifestation of computer terrorism is presented by threats, sent through the Internet. Recently, the increase in threats of Siberian plague infection sent through e-mail is observed in the United States. It is practically impossible to identify the sender, if he is an experienced hacker. According to the U.S. law, such computer terrorism is one of the most serious crimes. The FBI announced a reward for the capture of computer terrorists and hackers, while the terrorists themselves (in the case of their capture) will be sentenced to the long-term imprisonment (up to 25 years) (Marshall).
In 2007, Sochi won the right to host the 2014 Winter Olympics and almost immediately was totally disconnected from the Internet. Unknown cyber criminals paralyzed the Internet division of South Telecommunication Company for several days. Hackers attacked the company’s resources with tens of thousands of infected computers around the world. The representative of Juniper Networks claims that it is extremely difficult to reflect such an attack, because it uses so-called legitimate traffic: an army of computers around the world doing quite legitimate attempts to access sites that are connected with the outside world through a network of providers. Special Internet provider systems (IDP) cannot catch and block such traffic (Embar-Saddon 1033-43).
Besides, nowadays, the crackers of information systems use the know-how, to completely protect from is impossible even for professionals. For instance, the company’s staff receives e-mails with Director General’s instructions and with an attached pdf-file. This file contains a masked half of the virus, while the other half has been previously downloaded to the computers of employees. When the pdf-file is opened, the halves of the virus get united and the virus starts its malicious activity (Furnell and Warren 28-34). Typically, the automatic software updates (like update of Java) serve the gate for the second halves of the virus. In addition, virus-containing e-mails usually come from the torrents, which further compexifies the search of criminals. However, this type of hacker attacks is the new season and has great perspectives, while the algorithm for protection against viruses through the updates has not been worked out yet (Reilly 42-44).
According to Perimetrix company’s data, in 2007 95% of companies suffered from leaks of confidential data. Most frequently, the companies experience the steals of personal data (57%), details of certain transactions (47%) and financial reports (38%). 58% of respondent companies admitted that the data was stolen through e-mail (Botha and von Solms 5-11). In this situation, it is quite difficult to calculate the loss due to identity thefts: this should include unknown information on how many potential deals have failed because of inside data leaks. According to Panda Software assessments, in 2008 only in the United States data leaks caused companies’ and individuals’ losses amounting to nearly $ 1.5 billion. However, the main thing is time spent to eliminate the effects of the inside data spreading. According to Panda Software, it takes 90 million man-hours in the US (Marshall).



Author: essay
Professional custom essay writers.

Leave a Reply