Index IntroductionGlobal perspectiveNational perspectivePersonal perspectiveHow to solve this problem?IntroductionI like technology, especially digital technology because it is everywhere on our phones, laptops, tablets, computers, etc. But is it too good to be true or like most things there are negatives and positives. The positives are the connectivity where you can talk over the sea, talk to people you never could have found, learn new and exciting things with a click of a button or just by asking Siri, have fun and so much more. Unfortunately the negative aspects are much worse than the positive ones: cyberbullying, viruses, etc. But the absolute worst thing is hacking. Say no to plagiarism. Get a tailor-made essay on "Why Violent Video Games Shouldn't Be Banned"? Get an Original Essay This will be the main point I will talk about. Hacking is probably the worst thing you can do on the Internet: you can access other people's accounts on social media and ruin their online life, you could lock someone's location by hacking and know where they are at any time, you could hack the your computer and know all your history or even lock your computer and make you pay for it and that is probably the lowest of lows a person could reach. Global Perspective Hacking can affect people on a global scale because it can be used to scam people, mess with multinational corporations, and even give the US military something to worry about. It doesn't help that the US military uses Mac and Windows. There are Macs in use on DoD networks. DISA (Defense Information Systems Agency) has developed a STIG for OS Macs are not uncommon at Beltway military facilities. However you won't find Macs on the battlefield, 99% of usable computers run Windows. What if someone hacks into the US military database and finds top secret information and sells it to another country, this could spark another world war. But this would be very difficult because the US military has a group of people who stop hackers like this and they have to stop about two thousand hackers a month. Sometimes it may just be a little spam, but there have been times when they messed up, so that's it. still dangerous. A 25-year-old living in the UK hacked the US military for fun. A British hacker who allegedly hacked a U.S. Department of Defense satellite system in 2014 and accessed the personal information of hundreds of military personnel pleaded guilty Thursday. Sean Caffrey, a 25-year-old resident of Sutton Coldfield in the West Midlands, admitted hacking into a US military communications system in June 2014 and stealing usernames and email addresses of more than 800 employees and data from 30,000 satellite phones, he said. the UK's National Crime Agency announced on Thursday. Hackers have already started to meddle in politics like when a hacker hacked into Donald Trump's Twitter account by posting a video of adults who still liked my little pony and did this to make Donald Trump look like a fool in front of the world , even if it was a childish prank made by an American what if someone does this with even more evil intent and becomes the catalyst for a war between North Korea and America that could have a devastating effect on the world. There is also a fear that hackers could interfere with banks and destroy countries' currency - all this is possible and must be stopped by the online police. There isalso another problem: if the Internet was monitored by online police, this would radically change and destroy the freedom of the Internet. This is a big problem because it would limit website designers who help people and economies, for example Google It. helps give jobs to people from all over the world, this is good, but with an online police it would discourage people. It would also make the web less private even more of a problem because large online companies can buy this information and sell it. Then the cycle repeats because hackers can use that very information against you. National Perspective Hacking would really effect Nigeria, it could help corrupt politicians and people with similar jobs to steal from Nigeria, help people steal without being seen, this is terrible because it is a big problem for Nigerians because this is destroying the economy. This would affect public schools, roads, hospitals, etc. It can be stopped by getting the online police to set up traps so that when someone steals money online they will raise an alarm, then the corrupt individual will be caught and tried in Nigerian court. law this would seriously help, but if someone was able to break the system that means they would be able to hide the money in the cloud as credit, it would be incredibly hard to find. This is a problem, but it's bigger than hacking, corruption is the problem, but hacking is the fuel that fuels bad things. Hacking incidents in NigeriaNigerian hackers and cybercriminals are accused of masterminding a major theft of billions of dollars' worth of information and money, worldwide. According to experts, Nigerians manage to carry out the robbery by sending phishing emails to commercial organizations and industrial enterprises, which they then steal. The FBI estimates that these phishing attacks have cost companies more than $3 billion. The number of affected companies exceeds 22,143. Kaspersky Labs, an Internet security company, said it found more than 500 companies under attack in at least 50 countries. Those under attack are mostly industrial enterprises and large transport and logistics companies, based in Germany, the United Arab Emirates, Russia and India. In a blog post, Kaspersky said that cybercriminals managed to steal technical drawings, floor plans and diagrams showing the structure of electrical and information networks. Researchers said all indications are that these were Business Email Compromise (BEC) attacks that have come to be associated with Nigerian cyber criminals. The emails received by the victims seemed authentic enough to fool people. Some had attachments with names like “Energy & Industrial Solutions WLL_pdf,” “Woodeck Specifications Best Prices Quote.uue,” and “Saudi Aramco Quote Request for October 2016.” These are well crafted emails that appear legitimate and are crafted to convince the victim to open the malicious attachment. The emails ask recipients to verify the information as soon as possible, clarify the price of the product or receive the goods specified in the attached delivery note. The malicious attachments contain RTF files with an exploit for the CVE-2015-1641 vulnerability. They can also contain archives of different formats containing malicious executable files or macros, and OLE objects designed to download malicious executable files. Kaspersky has discovered that the malicious files are intended to steal confidential data and install hidden remote administration tools on infected systems. Using Whois services, Kaspersky discovered that the domains used to host the malware were registered to residents of Nigeria. A.
tags