network_vulnerability

toc = = =__**Vulnerability of networks to intrusion: Hacking**__=

[|Hacking] means illegally accessing other people's computer systems for destroying, disrupting or carrying out illegal activities on the network or computer systems. Hacking is the worst form of network intrusion and is the biggest problem for many organizations and institutions. This is because hackers can access all the confidential information about a particular company and this is a big issue for the company itself.

Recently at the United States a hacker hacked into his former employer's network and shut down telecommunications services, including 911 numbers in major US cities for hours. This man called William Bryant worked for the [|Cox's national telecommunication networks] and he was sacked from his position for doing so. Although network specialists managed to fix the problem immediately, people faced a lot of problem during this time. Customers at Dallas, New Orleans, Las Vegas and Baton Rouge were left without 911 emergency service for hours and when Bryant was asked he had no answer and said he was not responsible. = = =**__Social and ethical issues:__**=

The 911 emergency services were shut for hours because it was hacked and shut down by the hacker. This could have been disastrous as some people might be in need of the service which unfortunately has not occurred. For example what if a patient could have had a heart attack and was in immediate need of paramedics? What if someone was in need of the fire brigade? what if someone needed the police immediately?

Thus we see that hacking has serious consequences for many people. I feel that the stake holders are the people who are hacked and the hackers as well. Although the people who are hacked loose the most, I think hackers are also a stake holder because once they are caught they can be penalized as in the above case Bryant was. He was put to imprisonment for 13 years and was also fined $250000 by the Court. = = = = = = = = = = =__**Solution:**__=

The solution to this problem is to install firewalls and anti hacking softwares on the networks. It should also be ensured that only authenticated users are allowed to enter the server room. Also no external devices such as external hard drives or flash drives should not be used on the main file server. This would prevent people from putting in virus or do any other mischief with the file server. The government can also play an important role by implementing rules against hacking. For example a legislation could be passed that would put hackers behind the bars for a certain number of years and fine them.

==

= =