Monday, October 21, 2019
Free Essays on Learning The Web
The world in which we live is becoming based solely on computers as technology grows. Businesses have their organizationââ¬â¢s finances, records, and information on the World Wide Web (WWW). On this network formally called the Internet, any person with a home computer or even one at their place of business, can access data, information, records, logs, and databases of organizationsââ¬â¢. With this ability come those who would exploit it; they call themselves hackers. There have been many cases in our world where someone has broken into a company electronically through the Internet with very highly sophisticated equipment. Some can see any information you have on your computer if your computer is connected to the Internet. I will try to give you examples and make you aware of this terror that has come upon this world. In the March 15th, 2002 issue of Newsweek there is an article on how a young man named Adrian Lamo hacked into the New York Times database. ââ¬Å"Adrian Lamo is a 21-year-old high school dropout with no job and no permanent address. So how did he get to be listed alongside such luminaries as Bill Gates and Robert Redford in The New York Times' Op-Ed database? By hacking into the newspaper's supposedly secure corporate intranet-and then listing himself as an expert in "computer hacking, national security and communications intelligence.â⬠(Fragala, Newsweek 1) To know that there are people out there that are able to accomplish these unimaginable feats of computer and electronic genius boggles my mind. The New York Times is a very distinguished and respectable newspaper. When there is a corporation of that magnitude, you expect that they have the best computer scientists on their staff developing web pages and databases that are more secure than Fort Knox. Well, there is a say ing somewhere by someone that I cannot remember right now that goes, ââ¬Å"Nothing in this world is completely secure.â⬠That theory in my mind and most ... Free Essays on Learning The Web Free Essays on Learning The Web The world in which we live is becoming based solely on computers as technology grows. Businesses have their organizationââ¬â¢s finances, records, and information on the World Wide Web (WWW). On this network formally called the Internet, any person with a home computer or even one at their place of business, can access data, information, records, logs, and databases of organizationsââ¬â¢. With this ability come those who would exploit it; they call themselves hackers. There have been many cases in our world where someone has broken into a company electronically through the Internet with very highly sophisticated equipment. Some can see any information you have on your computer if your computer is connected to the Internet. I will try to give you examples and make you aware of this terror that has come upon this world. In the March 15th, 2002 issue of Newsweek there is an article on how a young man named Adrian Lamo hacked into the New York Times database. ââ¬Å"Adrian Lamo is a 21-year-old high school dropout with no job and no permanent address. So how did he get to be listed alongside such luminaries as Bill Gates and Robert Redford in The New York Times' Op-Ed database? By hacking into the newspaper's supposedly secure corporate intranet-and then listing himself as an expert in "computer hacking, national security and communications intelligence.â⬠(Fragala, Newsweek 1) To know that there are people out there that are able to accomplish these unimaginable feats of computer and electronic genius boggles my mind. The New York Times is a very distinguished and respectable newspaper. When there is a corporation of that magnitude, you expect that they have the best computer scientists on their staff developing web pages and databases that are more secure than Fort Knox. Well, there is a say ing somewhere by someone that I cannot remember right now that goes, ââ¬Å"Nothing in this world is completely secure.â⬠That theory in my mind and most ...
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.