StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Cracker Control - Assignment Example

Cite this document
Summary
A "Cracker" refers to a technology guru who seeks to access copyrighted software or computer network systems without the owner’s approval (Basta & Brown, 2013). Crackers can use different tools and techniques to gain control of my network and system. Indeed, since the modern…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.6% of users find it useful
Cracker Control
Read Text Preview

Extract of sample "Cracker Control"

Cracker Control A "Cracker" refers to a technology guru who seeks to access copyrighted software or computer network systems without the owner’s approval (Basta & Brown, 2013). Crackers can use different tools and techniques to gain control of my network and system. Indeed, since the modern world relies on internet connections that have encrypted packets, we can locate Wireless hotspots that are prone to cracking. Wireless hotspots have two encryptions that include WEP and WPA. Crackers can use aircrack-ng or coWPAtty to crack WPA2-PSK passwords that recover wireless keys (Philip, 2008).

They also need a Backtrack Live CD and a compatible wireless adapter that links with CommVIew for Wireless hotspots (Philip, 2008). These tools enable the wireless card to assume a monitor mode that helps in capturing data packets. A strong Wi-Fi network signal also enables the cracker to connect and disconnect from my network with ease. Hydra is another tool that performs fast dictionary attacks against numerous protocols thus facilitating cracking of systems.Numerous security principles or processes can address this problem when effectively implemented.

These include the establishment of access control mechanisms and End-to-end encryption. Moreover, SSID hiding, MAC ID filtering, Static IP addressing, access control and integrity controls, and training on computer security can address this problem (Federal Trade Commission, 2011). We should also configure router passwords and firewall that prevent Wireless hotspots (Kent & Steiner, 2011). Other security principles include identifying the kind and purpose of personal information stored in files and on the computer (Federal Trade Commission, 2011).

Keeping only the relevant information and disposing of irrelevant data in a proper manner can help in addressing this problem. Moreover, protecting stored data and establishing proper measures of responding to security threats avert cracking (Federal Trade Commission, 2011). Ultimately, nobody should divulge personal data without proper authorization. These measures can limit crackers from gaining control of my network and system.ReferencesBasta, A., Basta, N., & Brown, M. (2013). Computer Security and Penetration Testing.

Boston, Massachusetts: Cengage Learning. Print.Federal Trade Commission. (2011). Protecting Personal Information. Retrieved from: file:///C:/Users/Acer/Documents/bus69-protecting-personal-information-guide-business_0.pdfKent, J., & Steiner, K. (2011). Ten Ways to Improve the Security of a New Computer. Rertrieved from: https://www.us-cert.gov/sites/default/files/publications/TenWaystoImproveNewComputerSecurity.pdfPhilip. (2008). How To Crack WEP and WPA Wireless Networks. Retrieved from: http://www.

speedguide.net/articles/how-to-crack-wep-and-wpa-wireless-networks-2724

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Cracker Control Assignment Example | Topics and Well Written Essays - 250 words”, n.d.)
Cracker Control Assignment Example | Topics and Well Written Essays - 250 words. Retrieved from https://studentshare.org/information-technology/1661953-cracker-control
(Cracker Control Assignment Example | Topics and Well Written Essays - 250 Words)
Cracker Control Assignment Example | Topics and Well Written Essays - 250 Words. https://studentshare.org/information-technology/1661953-cracker-control.
“Cracker Control Assignment Example | Topics and Well Written Essays - 250 Words”, n.d. https://studentshare.org/information-technology/1661953-cracker-control.
  • Cited: 0 times

CHECK THESE SAMPLES OF Cracker Control

Password Cracking Systems

In difference, a hardware development continually provides attackers growing computational control.... However, there is a security challenge in way of its implementation that is the extent and uncertainty of client selected passwords does not level in any way with computing control.... In this scenario, the prime objective of the cracker is to perfectly get the password of server (UNIX) or other system and for Windows and NT....
20 Pages (5000 words) Research Paper

Disaster Recovery Planning for NIST

A cracker sees a highway ahead to breach the system with this approach (Cooper, 1995).... According to Herman Mehling, "A disaster recovery plan is a bit like car insurance; you don't realize its value until you're in an accident" (Mehling, 2007).... This was the common state of affairs in every organization a few years back....
8 Pages (2000 words) Essay

Crimes Against Information

On the other hand, a malicious cracker not only breaks codes to enter off-limits areas, but he or she seeks to vandalize or defile the area by causing immediate damage or planting viruses which slowly infiltrate and destroy systems that operate as critical infrastructures.... The essay "Crimes Against Information " discusses the threat of cyber-terrorism remains a quick and inexpensive weapon to deliver a detrimental effectholding cyber-terrorists responsible and matching the detriment of their crimes have not been implemented....
6 Pages (1500 words) Essay

Conducting Cyber Intelligence and Restricting Cyber Attacks on Organizations

This paper discusses how cyber intelligence has played its important role and how the cyber attacks can bring problems for organizations whenever they hit them.... nbsp;Cyber intelligence is a method through which security threats are tracked, countered and analyzed in a number of different ways....
12 Pages (3000 words) Essay

Experience as the Joint Venture Technical Head

15 years Experience in Operation, in several projects, plant start-up, troubleshooting and Management, and leadership Skills.... Specialization: Operating Petrochemical Plant and Handling project activities.... nbsp; (Gas Treatment Units, Sulphur unit, Steam Cracking Unit, and fractionation Unit)....
5 Pages (1250 words) Resume/CV

Internet Needs More Rules and Regulations

There is no particular person, company, organization, or user that can have full control of the internet.... The Computer Emergency Response Team an, organization that guards the internet explains how computer hackers are exploiting the internet users through internet protocol spoofing whereby they counteract security measures by posing as “friendly computers” to an internal network and adopting an IP address similar to those of the internal computers thereby allowing the cracker into the system....
5 Pages (1250 words) Essay

The Use of Hacking

… Hacking has many meanings and no definite definition.... It implies different things to different people and circumstances.... As Taylor (1999) notes, the meaning and implications of hacking have changed over the years (23).... He notes that in the computer Hacking has many meanings and no definite definition....
10 Pages (2500 words) Essay

The History, Production, and Processes Involved by Pembrokeshire Cheese Company

There are main chemicals that are mixed in order to obtain a refined cheese and since cheese is a food product, it is important that these chemicals are engineered properly and quality control to be undertaken to assert these processes.... The author of the paper "The History, Production, and Processes Involved by Pembrokeshire Cheese Company" argues in a well-organized manner that the production of cheese requires various processes....
7 Pages (1750 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us