22 Jun 2022

224

The Relationship Between Hacking and Viruses

Format: APA

Academic level: College

Paper type: Assignment

Words: 326

Pages: 1

Downloads: 0

Hacking and a virus are two controversial topics that cannot be covered exhaustively but first it is way better to understand the terms of details ( Powell, 2016). Hacking refers to the process of a particular individual distributing or writing a malicious code with concrete and sealed goals in his or her mind. Piracy occurs on two platforms of either an individual being hacked to get information to specifically aid theft or either a business being hacked. There is a line of reasons as to why some companies get hacked. The reasons are to expose the specific secrets a trade might be hiding from the general public. Steal traders or clientele secrets, shake and ambush clients trust over the security of their personal information at the business in question and finally create a damaging effect on the business profits during the time it will take to fix the problem. 

On the other hand, viruses are numerous bits of code that are created with a particular purpose in mind of an individual. In most cases viruses are downloaded or got running up in the system by the user and got a unique feature of self-replicating ( Suuronen & Bergenwall, 2016).  In some instances, viruses represent competitive threats multi-layered and are categorically designed to offer a disabling effect on the specific anti-virus programs, disable the browser in use and corrupt vital processes and information. 

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

Hackers will have valid reasons as to why they want to get access to organizational data in various sectors including health, business, and banking, manufacturing, and investment sector. The primary reason is to vandalize the operations of a particular organization for some organization to gain financially officially. The other big goal is to expose to the general public the secrets of some agencies over the time ( McBrayer, 2014).  Hacking of organizational data can also take place with a purpose of destroying the relationship and the trust some clients have in some organizations over the security of personal informational and private information. 

References 

McBrayer, J. (2014).  Exploiting the digital frontier: hacker typology and motivation . The University of Alabama. 

Powell, A. (2016). Hacking in the public interest: Authority, legitimacy, means, and ends.  New Media & Society ,  18 (4), 600-616. 

Suuronen, J., & Bergenwall, M. (2016).  U.S. Patent No. 9,392,002 . Washington, DC: U.S. Patent and Trademark Office. 

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 14). The Relationship Between Hacking and Viruses.
https://studybounty.com/relationship-between-hacking-and-viruses-assignment

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

Security Implication of the Internet of Things

The Internet of Things (IoT) can be described as s system of interconnected devices that have the ability to transfer information over a computer network without the need of human-to-computer or human-to-human...

Words: 892

Pages: 3

Views: 96

Modern Day Attacks Against Firewalls and VPNs

Introduction The need to have an enhanced security of the computer connectivity happens to be one of the reasons that attract companies and organizations towards wide usage of VPNs. Several simple techniques...

Words: 2025

Pages: 7

Views: 134

How to Deploy and Administer Windows Server 2012

Securing a reliable, and expandable configuration for a company is important to build a strong network. The new and enhanced features of the Windows Server 2012 can be used to implement the network. In this...

Words: 1673

Pages: 6

Views: 88

Deployment Model in Cloud Computing

Deployment model is a representation of a cloud environment primarily distinguished by parameters such as accessibility, proprietorship, and storage size. The National Institute of Standards and Technology gives the...

Words: 254

Pages: 1

Views: 82

How to Use Web Search Engines for Business Research

The advancement of technology has made it possible for many people around the world to have easy access to information whenever they want. The development of the Wide World Web-enabled different kinds of information...

Words: 773

Pages: 3

Views: 87

Distributed Database Management System (DDBMS)

Introduction Data management has been a headache to many technology enthusiasts for quite a long period of time. They have successfully managed to logically collect interrelated data and share it. If the data is...

Words: 799

Pages: 3

Views: 128

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration