StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Cyber Crime: The Measures of Prevent Hacking - Term Paper Example

Summary
This paper discusses the measures or precautions that can be taken in order to prevent hacking. The paper presents the various measures that could have been taken by militarysingles.com and CSS Corporation in order to stop the hackers from hacking into their websites.    …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER99% of users find it useful
Cyber Crime: The Measures of Prevent Hacking
Read Text Preview

Extract of sample "Cyber Crime: The Measures of Prevent Hacking"

Cyber Crime Introduction LulzSec Reborn used “hacking” in order to commit cybercrimes against both militarysingles.com and CSS Corporation. The hacktivist group hacked into the databases of both the victim websites and accessed the personal information of their customers and made it available to public. There are numerous methods that are used to commit cybercrimes such as hacking, phishing, spam, etc. This paper discusses about the measures or precautions that can be taken in order to prevent hacking. Following are the various measures that could have been taken by militarysingles.com and CSS Corporation in order to stop the hackers from hacking into their websites: Correct CHMOD Permissions CHMOD file permissions safeguard your files or folders by allowing different access levels. Each file or folder is assigned a specific value and this ensures that files and folders on your server are not accessed by any unauthorised personnel. 000 (no access) to 777 (complete access) is the range of CHMOD permissions (Erickson, 2008). There are various aspects that need to be considered when setting CHMOD permissions such as compatibility with web-hosts, limitation of features, etc. The effective use of CHMOD permissions can greatly reduce the risk of hackers. Preventing illegal farmers One of the main reasons that hackers target websites such as military singles or CSS Corporation is to access their databases that contain personal information of their customers, mainly email-ids. The email-ids are valuable to hackers it can be used for spamming or spreading of malicious items. Therefore, websites that store the email-ids of their customers must ensure that the personal data of the customers must be stored in secure format rather than writing texts like “email.txt”. Storing in MySQL database can be very useful and ensure the safety of the information. Irresponsible Marketing Most websites in a desperate attempt to increase traffic and attract customers turn to third party websites that uses illegal means such as spamming to drive traffic. These methods not only attract customers but also criminals or hackers. Also the websites can be used as a gateway to hack the main website. Hence, websites must be careful in choosing the kind of viral marketing they adopt. It is more important to attract the right customers than wrong people. Targeted and specific marketing must be used to drive traffic. Security Patch Updates Updating security patches is essential to prevent hackers. Website owners must hence ensure that all security patches for the various service aspects are updated and installed. All plug-ins/core files must be monitored continuously and updated. Secure Ports Hackers use ports as a gateway to access files on a websites server. Ports are used to transfer data from outside to the server and vice-versa. That is, they are used to access the information on serves from the outside and hence are a soft target of hackers. In order for information on the server to be accessed from outside, the port needs to be opened and closed when needed. Programs such as FTP (File Transfer Protocol) need an easy access system. This is very attractive to hackers as it gives them an opening to enter the servers and access any sensitive information on them (Mcclure, Scambray & Kurtz, 2005). Therefore in order to ensure that ports do not act as a easy passage for hackers, it needs to be continuously monitored and any unwanted ports must be properly closed. Also the activity within the opened ports must be monitored to identify any suspicious activity. Third-party scripts and programs Many websites install third party scripts and programs on their websites in order to perform some specific function which might of value to the website. Even though these scripts and programs might add value to the website, it is necessary to be cautious while installing and using them. Third party scripts and programs must not be used until and unless their function and working is completely understood. It is necessary to understand what the third party script and program does apart from the intended function. It should be thoroughly looked into for any references to third party URLS. Strong Passwords One of the most important and basic measures that websites can take is to insist their customers to set strong passwords. Rather than leaving the option to the customers, the websites must insist customers to set strong passwords that will include a variety of characters, numbers and symbols. Also the passwords must be random and long as it makes them more difficult to crack (Lockhart, 2007). An important measure, especially with respect to online communities, is to ensure that “.htpasswrd” and “.htaccess” are formatted in the right way using CHMOD of 644. This gives the best out-layer protection to both the visitors and owners of the website. This is very essential measure as this is the most common technique used by hackers. Hence, it must be made impossible for the hackers to find passwords by making them longer and unique. The longer the password, tougher it is for the hackers as the number of combinations increased exponentially with the length of the password. Avoid Generic Usernames Using common usernames is one of the most common mistakes many site owners do. Using usernames such as “Site Owner”, “Administrator” or “Admin” makes it very easy for the hackers to get into the website. Therefore site owners must stop using generic usernames and instead start using unique usernames that are known only to authorised personnel. Also the companies must insist their customers to stop using generic usernames and instead use unique usernames. This will reduce the chances of the individual accounts being hacked. Cookies Customers or users and also website administrators must be asked to clear the cookies caches after using websites on public computers. Even if the service providers guarantee of no tracking policies, it is in the best interest to ensure that cookies and caches are cleared. Commenting Comment section is another soft target for hackers. It is easy for hackers to insert trouble causing html codes in the comments section. Therefore, any form of input in the comments section must be validated before it is accepted. Antivirus and Malware Software Antivirus and malware software must be installed and continuously updated on the servers. The server must also be continuously scanned in order to ensure that any malware or Trojans and detected and removed. Conclusion The above discussed measures will help to ensure that websites are protected from hackers. Some of these measures demands actions from the site owners while others demand action from the customers or users. The prime responsibility of ensuring the safety of the website is on the site owners. By implementing the measured discussed in this paper, site owners can be sure of the safety of the websites. References Erickson, J. (2008). Hacking: The Art of Exploitation. CA: No Starch Press, Inc. Mcclure, S., Scambray, J. & Kurtz, G. (2005). Hacking Exposed: Network Security Secrets And Solutions. NY: The McGraw-Hill. Lockhart, A. (2007). Network Security Hacks. CA: O'Reilly Media, Inc. Read More

CHECK THESE SAMPLES OF Cyber Crime: The Measures of Prevent Hacking

The Actual Reasons for the Perpetuation of Internet Crimes

Aside from the poor security measures of the governments, some private companies also have the same outdated technology and are therefore also partly to blame for their misfortunes.... In fact, based on the report by Ponemon Institute entitled Second Annual Cost of cyber crime Study: Benchmark Study of U.... Companies in 2011, the damage that cyber crime has caused in the United States alone has amounted from $1.... In fact, according to the December 2000 report by McConnell International, the occurrence of Internet crimes is caused by the following factors: “They are easy to learn how to commit; they require few resources relative to the potential damage caused; they can be committed in a jurisdiction without being physically present in it; and they are often not clearly illegal” (“cyber crime,” 2000)....
7 Pages (1750 words) Literature review

Cyber Threat in a Finance Organisation

Rather the opposite scenario is true, crime through internet or cyber crime has increased manifold in last few years due to human civilizations over exposure of internet.... Surprising fact is that public awareness about the threat of cyber crime, internet hacking is pretty low despite being the fact that activities of hackers are creating negative impact on financial system of a country in regular interval (Fletcher, 2007).... Now, readers of this essay might question that why government and cyber crime agency are not taking steps to regulate the cyberspace?...
12 Pages (3000 words) Essay

Types and Measures of Cybercrimes

The paper "Types and measures of Cybercrimes" focuses on the critical analysis of the major issues in the types and measures of cybercrimes.... One of the types of cyber crimes, and one that is widely experienced among service delivery industries, is hacking.... hacking refers to illegal and unauthorized entry into a private system and it in most cases aims at the illegal retrieval of information.... ne of the effective measures to warding cyber crimes is legal deterrence, an initiative that can be achieved by reporting, to law enforcement authorities, cases of cyber crimes or behaviors suspected to possibly lead to cyber crimes....
2 Pages (500 words) Coursework

Computer Crime and Safety Issues among Companies and Organization

Computer and cyber crime include:- hacking, copying of copyrighted material, theft and misuse of confidential information of someone else, coding a computer virus or a bug with an intention to disrupt someones computer or network with the intention to serve another cause. ... cyber crime refers to criminal conduct committed on a computer, network electronic and auxiliary devices where the computer has not necessarily been used instrumentally in crime.... Any unlawful act carried out on the internet is cyber crime....
4 Pages (1000 words) Essay

Criminal Justice: Cyber Crime Investigation

Countries where legal coverage or protection is inadequate will be more prone to cyber crime and would be less able in competing with the new economy.... As cyber crime increasingly breaches over the national borders, the nations which are perceived as havens of information run the risk of getting their electronic messages blocked by other network (cyber crime .... They can also designing attacks that can appear to have originated from foreign sources (cyber crime ....
13 Pages (3250 words) Research Paper

The Impact of Hacking in Todays Firms

This paper will define hacking, discuss the types and techniques of hacking, and give examples of companies that have been hacked.... hacking is an activity that is a major concern for many organizations.... This paper tells that hacking is frequently perceived as a form of computer crime.... hacking entails amending features of a computer system to perform a different function that the computer was not intended for....
6 Pages (1500 words) Term Paper

Cyber Espionage Crime

cyber crime espionage crime constitutes the ancient and the classical versions of crimes that are now executed using digitalized technology.... Secondly, cyber crime tends to overlap with other crimes that make it difficult to identify and to tackle the crime.... Thirdly, cyber crime is very dynamic as compared to other forms of crime and hence, making it quite challenging to address it.... The US officials had a confrontation with Chinese officials over the persistent hacking of the US firms....
5 Pages (1250 words) Report

Future Cyber Security Crimes

During this phase, cyber-criminals engaged intensively in the hacking of military services while the public users were a target of numerous viruses.... A perfect example was the development of a malware known as Trojan horses that facilitated hacking of computers in remote access centres (James, 2009).... In fact, it is also during this phase that there were a number of tools that were formulated for the purpose of enlightening people with little or no knowledge of hacking to learn the intrusion process hence attack others....
8 Pages (2000 words) Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us