Hacking, Protection and the Consequences of Hacking Cover Image

Hacking, Protection and the Consequences of Hacking
Hacking, Protection and the Consequences of Hacking

Author(s): Zoran Čekerevac, Zdenek Dvorak, Ludmila Prigoda, Petar Cekerevac
Subject(s): Security and defense, Criminology, ICT Information and Communications Technologies, Socio-Economic Research
Published by: Žilinská univerzita v Žilině
Keywords: hacking; hacker; information technology; internet of things; protection; economics;

Summary/Abstract: Understanding the term hacking as any unconventional way of interacting with some system it is easy to conclude that there are enormous number of people who hacked or tried to hack someone or something. The article, as result of author research, analyses hacking from different points of view, including hacker’s point of view as well as the defender’s point of view. Here are discussed questions like: Who are the hackers? Why do people hack? Law aspects of hacking, as well as some economic issues connected with hacking. At the end, some questions about victim protection are discussed together with the weakness that hackers can use for their own protection. The aim of the article is to make readers familiar with the possible risks of hacker's attacks on the mobile phones and on possible attacks in the announced flood of the internet of things (next IoT) devices

  • Issue Year: 20/2018
  • Issue No: 2
  • Page Range: 83-87
  • Page Count: 5
  • Language: English
Toggle Accessibility Mode