Hacking has dangerous effects on the digital society. Today many security measures are combating these cybercriminals from anti-virus and firewall software to cybersecurity companies to block out threats on personal and business networks. I will identify as an IT professional the critical aspects of the techniques that hackers use and how to protect yourself from these exploiters. Hacking is a significant problem in this country and abroad. Countries spend trillions of dollars a year finding ways to improve their network infrastructure. Hacking does have its pros and cons when applying to something beneficial like ethical hacking and penetration testing, where agencies that have white hat hackers break into systems to help fix security measures within a company or government agency. As a network engineer, I have seen many attempts on my company networks and even a company coming in posing as a cable company. The one problem we have is people bringing their laptops and using their cell phone s in different areas of the company building can be a significant security risk. To my company. I hope to persuade people and educate them about the potential risk associated with the internet and when our society is going into (IOT) Internet of things open a broad spectrum of new security risks.
The key points of evidence that I found that is beneficial to my topic are the history surrounding how hacking is dangerous to our society and the means in how hackers use their techniques to hack into networks to gain un authorized access to a computer or server on a network. Why hacking is dangerous is because the hackers can gain access to company information through their systems to steal valuable information like personal banking statements or social security numbers. As new technology comes out and new software is being created each day, hackers can find ways to get money and find vulnerabilities in networks to take them over. This is a major problem our society is facing today
The key points of evidence that I found that is beneficial to my topic are the history surrounding how hacking is dangerous to our society and the means in how hackers use their techniques to hack into networks to gain unauthorized access to a computer or server on a network. Why hacking is dangerous is because the hackers can gain access to company information through their systems to steal available details like personal banking statements or social security numbers. As new technology comes out and new software is being created each day, hackers can find ways to get money and find vulnerabilities in networks to take them over.
My goal in this essay is to educate people in the process and techniques hackers use to gain access to valuable information on a computer network. Our society is facing a significant problem in internet crimes more recently the Sony Network attack and the Wells Fargo attacks that happen last year. The problem is that people think certain companies have monitors in place, but the hacking is getting more supplicated were these attacks happen before the security teams know what’s happening. This is what happened to Sony last year that had a significant data breach that they thought it was fixed but really the breach occurred eight days before they realized what happened. For this essay to be successful is that I need to let the readers understand that when you put your personal information online, it can be exploited by cybercriminals on the internet.
The first potential resources and evidence that could be used to support my topic would probably be The article based on The introduction to hacking and hackers is about the start and creations and techniques used in different types of hacking. This article will help me develop a strong narrative on the history of the hackers. The second resource is the article Ethical hacking improves cyber security by letting the hackers work with agencies to find countermeasures to attacks. The third source I will be talking about is The multifaceted Strategy is best to ensure cybersecurity is about the secret services taking steps to fight the global cybercrimes around the world.
The resources and evidence that I used above to support my topic would probably be the article based on the Intro to Hacking and Hackers. This article best describes the issue more in detail about how the hacker became who they are today. The critical points in this article discussed the pros and cons of hackers and the professional hackers which help business and government agencies find ways to stop hacking. Th is article aligned vital points of the topic for my essay between the pros and cons that would help me persuade my readers to the better understanding why hacking is beneficial if it is used for legal purposes.
The most intriguing evidence I found in the article Intro to Hacking and Hackers was the history behind the way how the term hacker began. According to the article, two train model hobbyists from MIT were interested in the large mainframe computer at their university. The term Hacker was made when the students changed and modified the speed of their train on the tracks. Another intriguing evidence that supports my topic is the Hackathons that happen every year where top hackers work together to hone in their skills in massive tournaments.

x

Hi!
I'm Piter!

Would you like to get a custom essay? How about receiving a customized one?

Check it out