Welcome to my blog, hope you enjoy reading
RSS

Selasa, 2 Mac 2010


DeFiNiTiOn:
  1. People who engage in computer hacking activities are often called hackers. Since the word “hack” has long been used to describe someone who is incompetent at h
  2. Computer hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original her profession, some hackers claim this term is offensive

- Computer hacking is most common among teenagers and young adults, although there are many older hackers as well.
- Many hackers are true technology buffs who enjoy learning more about how computers work and consider computer hacking an “art” form.
- For these individuals, computer hacking is a real life application of their problem-solving skills.
- Since a large number of hackers are self-taught prodigies, some corporations actually employ computer hackers as part of their technical support staff.
- These individuals use their skills to find flaws in the company’s security system so that they can be repaired quickly.
- In many cases, this type of computer hacking helps prevent identity theft and other serious computer-related crimes.
- In comparison to those who develop an interest in computer hacking out of simple intellectual curiosity, some hackers have less noble motives.
-Hackers who are out to steal personal information, change a corporation’s financial data, break security codes to gain unauthorized network access, or conduct other destructive activities are sometimes called “crackers.”
-This type of computer hacking can earn you a trip to a federal prison for up to 20 years.

*There are a number of ways for schools to minimize potential for hacking.*

1. Schools need to clearly establish acceptable use policies and delineate appropriate and inappropriate actions to both students and staff.

2.Students and staff need to instructed regarding hacking, the mentality associated with it, the consequences of various hacking actions and possible consequences of interacting and forming online relationships with anonymous individuals who claim to be proficient in invading others' privacy.

3. Teachers need to be aware of student activities in the computer labs and pay special attention to things they hear in terms of hacking behavior.

Tiada ulasan:

Catat Ulasan