During mid-December, Nancy Boyle received an e-mail that appeared to have come from her bank. It warned her about her account that it would be disabled if she does not update her information. A link was provided for to update her information on the said e-mail to expedite the process. However after submitting her information, her account began to reflect a sudden loss of money. It was a bad start for Mrs. Boyle as her mother-in-law was recently diagnosed with cancer, the IRS was starting an audit on their finances and also it was a week before Christmas. Due to this scam, Mrs. Boyle was placed in a difficult predicament (Krebs, 2004).
This, my friends, are one of the network’s biggest threats. And no, it’s not just about the fraudulent email, but rather the threat that was behind it all. The very existence that stands to gain from such actions – a hacker. Before everything starts however, we should try and understand what a network is first. Without defining what a network is, it would be problematic to discern on how a hacker works their ‘magic’ on us. We would be forever in the dark, never knowing how they managed to take our information to begin with. For a network is what connects us to these beings and likewise we should have a better understanding of it in order to protect us from these individuals.
A network is basically a group of interconnected computers that allow data transmission to one another (Local area networks, 2012). Usually within a network, there will be a main system which has a centralized control of all the data transmission. Think of it as a big box that contains smaller boxes, wherein the big box is the main system and the smaller boxes in it are the data inputs being sent. If one were to have a need to access the data from the main system, it can easily send a copy of the data to another system within the network. However, in order to have access to the main system’s files, the system acquiring the files must be a part of the network. Also, it should be considered that almost anything can be a network. As conditions to be considered a network are rather low, one can say that the biggest network would be the Internet itself. With that being said, keeping a network safe from almost every prying eye becomes hard as the number of networks that can access the Internet increases. Another thing to note would be physical factors that can affect the network from the inside, for not just about everybody would be willing to protect the network. Sometimes there will be those who will try to infiltrate the network for their own benefit. People who take, delete and change data without consent or breaks into the network to destroy it are often called as hackers.
Hackers are people who have talent in breaching the security of a network. Their most used method is attacking a network from the outside. This simply means that the method they use do not require them to have a solid line to the main system. All...