Computer Memory Hacking

Computer Memory Hacking

Name:

Institution:

Computer Memory Hacking

Question 1

Hacking of the memory or hacking of the RAM is the process by which a computer’s memory is modified in a view to accomplishing tasks or goals, which are not the initial intended purpose. It is gaining unauthorized access to a computer’s memory or RAM. RAM is an abbreviation for Random Access Memory. The individual who engages this activity is referred to as a hacker (Erickson, 2008).

Question 2

Hackers use thousands of tools to hack computer memory. Some are more effective than others are. The newest memory hacker tool is the RAM Scraper. The RAM Scraper has been used to access computer memories of big stores such as Target and Home Depot recently. It is launched at the point of sale of the computers in the stores, to steal valuable customer card data. The RAM Scraper was installed at the point of sales systems and after that used to process card transactions that passed through the system. It uses a Remote-access Trojan and for it to work; it has to be launched secretly at the POS system. This can be done by sending a link to a cashier, or an infected email. Once he clicks on the link, the malware is silently installed in the system. This is referred to as phishing (Lininger & Vines, 2005). Once in the system, the hackers can access the administrator’s files where they steal valuable card data such as PINs.

The other most common hacker tool is a virus. These are often sent through emails, compact disks, and even on websites. Once one opens a file, the virus launches itself into the system, making the memory vulnerable to unauthorized access from outsiders. A virus is a program or software that is inserted in a computer memory to copy itself into files in the computer memory. A virus causes the memory to behave unexpectedly and breach the security of the system. The hacker can now access the computer memory remotely, and this can be very destructive, depending on the hacker’s intention. One of the greatest viruses to cause the largest damage was the Melissa virus, which was the first successful email-ware virus. It inserted quotes from the Simpsons cartoon into Word documents. It is estimated to have caused more than $80million worth of damage.

Question 3

One can protect their computer memory from being hacked. This can be done using the following ways:

  • The most important practice is to protect one’s computer by installing anti-virus software. Examples include Kaspersky, Norton, and Avira antivirus.
  • Avoid clicking on advertisements when online. These are often worms or viruses in disguise; when an individual clicks on the advertisement, the worm or virus installs itself secretly in the system, which corrupts the computer memory and may even crash it
  • People should avoid adult websites. This is where hackers thrive. People should resist the temptation of visiting such sites as they are laden with viruses and other malware.

Question 4

Computer hacking is not always malicious. Sometimes it is used with good intentions, which are referred to as ethical hacking. Ethical hacking is hacking the computer memory to identify vulnerability and loopholes in a system. Most organizations have hired ethical hackers to assist them in ensuring their computer memory and systems are protected from malicious hackers. It has had a positive impact in education, where students are learning how to be ethical hackers, which is a career in itself. People now understand that hacking does not always have to be malicious, but constructive too.

References

Erickson, J. (2008). Hacking. San Francisco, Calif.: No Starch Press.

Lininger, R., & Vines, R. (2005). Phishing. Indianapolis, IN: Wiley Pub.

Calculate your order
275 words
Total price: $0.00

Top-quality papers guaranteed

54

100% original papers

We sell only unique pieces of writing completed according to your demands.

54

Confidential service

We use security encryption to keep your personal data protected.

54

Money-back guarantee

We can give your money back if something goes wrong with your order.

Enjoy the free features we offer to everyone

  1. Title page

    Get a free title page formatted according to the specifics of your particular style.

  2. Custom formatting

    Request us to use APA, MLA, Harvard, Chicago, or any other style for your essay.

  3. Bibliography page

    Don’t pay extra for a list of references that perfectly fits your academic needs.

  4. 24/7 support assistance

    Ask us a question anytime you need to—we don’t charge extra for supporting you!

Calculate how much your essay costs

Type of paper
Academic level
Deadline
550 words

How to place an order

  • Choose the number of pages, your academic level, and deadline
  • Push the orange button
  • Give instructions for your paper
  • Pay with PayPal or a credit card
  • Track the progress of your order
  • Approve and enjoy your custom paper

Ask experts to write you a cheap essay of excellent quality

Place an order
Verified by MonsterInsights