Wednesday, November 20, 2019
Web Server Hacking Research Paper Example | Topics and Well Written Essays - 2000 words
Web Server Hacking - Research Paper Example To add to the attraction and profitability of these hacking attacks is the proliferation of insecure web applications (Zachary, 2006). These attacks on computer systems with negative intent are not new. They go as far back as the eighties when hackers used their skills to break into computer systems and perform their illegal activities. The advent of web based applications, though, has led to the increase of sophistication in hacking attacks. The skill required to perform these attacks, on the other hand has lessened proportionately. In order to understand the need for security in oneââ¬â¢s computer system, he or she should realize the risks involved. Most operating systems have a default configuration that is not designed with security as the chief focus. The default setup, instead, focus on functionality, communications and usability. There is therefore a need to understand the server vulnerabilities in a system in order to perform particular functions to improve security (Leyde n, 2002). It is hence clear that web server hacking is an important topic that should be evaluated in detail and understood by users of computer systems. When one tries to break into or use a computer system wrongly, he or she is considered an intruder. ââ¬ËUsing wronglyââ¬â¢ is not a restricted term and can be used to represent an act of stealing confidential information or a minor offense of just misusing oneââ¬â¢s email for spam (Zachary, 2006). Presently, more people both through the internet and corporate intranets are continuously attempting to test the various systemsââ¬â¢ security. The motive differs in every instance but revenge and stealing for profit are some of the motives driving intruders. ââ¬ËHackerââ¬â¢ and ââ¬Ëattackerââ¬â¢ are the two terms that are used in describing a person who tries to get into networks and systems. An individual that likes to get into their computer system
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.