Abstract
Computer hacking involves the modification of computer hardware and software to attain an objective external to the owners innovative function. Hacking involves people who are not proficient in their profession and it is majorly meant to break or alter the functioning of an existing system. Computer hacking has increased drastically over the years. This is so regardless of current federal regulations including computer Deception and Abuse Act. Federal laws have contributed very little to prevent potential computer hackers. Recent Studies have confirmed that only a small percentage of computer hackers are ever caught and persecuted.
Majority of the companies who fall victim deliberately prefer to keep this action a secret to prevent denting of their image. There should be obligatory exposure necessity imposed by parliament, which necessitates companies to unveil intrusions. These obligations will be
...outstanding to the trouble of computer hacking in several ways. To begin with, the individuals affected by hacking will receive advance warning that their private information was stolen by intruders (Peltier, 2006). This will allow the affected individuals to take more safety measures in managing their identities. Mandatory reporting will help law enforcement in finding out and prosecuting larger number of computer hackers.
With more publicized punishment cases of computer hackers, there should be a decrease in future reported cases of cyber crimes including hacking. Since computer hacking is both a national and international concern, stronger measures must be put in place to stop hacking, and incase hackers remain a powerful threat, they should be sternly punished. Introduction Hacking is a widely known way of interfering with a computer system by illegally gaining access to information and tampering with it. Hacking
is dangerous as it can interfere with people jobs.
In today’s world, many business and corporations rely on computer systems to operate and manage their businesses. If hacking fails to be dealt with, how many people will have to be affected? Hacking can destroy a person’s life temporarily (NELSON, 2014). This is so for the individuals who rely on the computer to keep track of their personal information in their dealing with clients. Since hackers work together in harmony, strong measures should be put in place to stop their destructive motives. To prevent cyber crimes, governments should put in place the employment of cyber specialists. College graduates who have specialized in subjects such as social engineering, computer science and mathematics should be incorporated into the cyber security system.
Actually, the government should see to it that there are more opportunities for employees with specific skills in the fields of engineering, mathematics and computer science than the employees themselves. The extensive use of skills for say in mathematics such as algorithms can help much in detecting signs that may suggest criminal activity, and also help in scheming computer system which is security-minded. Social engineers on the other hand can devise a program called pop-up that appears to alert the connection host incase of any interruption in their network (Peltier, 2006). This creates the awareness of improving the system to prevent further damages. The duties of computer specialists vary.
There are those who try to outsmart criminals by coming up with anti-virus software to counteract an attack. There is another category referred to as ethical hackers who penetrate into a company’s computer network to note weak points and suggest how
they can be improved. Other specialists known as intrusion-detection technicians inspect strange patterns or signals that may trigger a serious cyber break-in. other specialists expand codes to secure information or temper with codes to assist in identifying and destroying malware (Monteith, 2016). Government should involve the services of forensic experts who offer effective response as they check how a criminal gained access, how such damage can be restricted and how to prevent re-occurrence.
With the emerging danger of advanced persistent threat carried out by well specialist criminals, serious measures must be devised to prevent future damages. An example of a great havoc happened in December 2013 where hackers used malware to rob individual and monetary information from approximately 110 million clients of the Target store series in America (Peltier, 2006). Brian Krebs, an expert in cyber security points out that a certain malware tracking emails sent to an autonomous Target contractor could have contributed to criminals swiping credit card information from cash documents in retails stores. By closely checking this type of malware, investigators might find how it infected the computer system and its origin. Such an occurrence happened though the owner of the retail shop failed to provide details on how the system was interfered with. Future occurrences should clearly report and disclose faults to aid in investigation.
The congress should make clear that anyone interested in entering into cyber security world must be aware that no matter his or her specialty, strict checks concerning their background are a routine more so for an administrative agency or a service provider working closely with one. One must allow investigators to assess every single aspect of their lives
including their tweets and other conversations in the social media. In majority of governments, job vacancies within the government may call for proof of citizenship or permanent residency. However, specialists’ advice that motivated persons with unique scientific knowledge should be strategically placed for a cyber security profession. Unfortunately hackers are always ahead in their skills and this encourages even more efforts to be invested in dealing with cyber crime.
During enrollment, rules and regulations should be disclosed together with the consequences of breaking the laws. This ensures accountability to people who are entrusted in computer security systems (Monteith, 2016). Hacking should be brought into a halt due to the adverse problems it can cause. Hopefully, people will be enlightened on the repercussions of computer hacking and will shun away from the act. With all the adverse effects it causes, something must be done hastily.
References
- Peltier, T. R. (2006). Social Engineering: Concepts and Solutions. Information Systems Security, 15(5), 13-21.
- Nelson, B. (2014). Computer Science: Hacking into the cyber world. Nature, 506(7489), 517-519.
- Monteith, B. (2016). Hacking for Good and Bad, and How to Protect Yourself against Hacks! Knowledge Quest, 44(4), 60-64.