Hacking, Protection and the Consequences of Hacking Hacking, Protection and the Consequences of Hacking 

  • Zoran Cekerevac
  • Zdenek Dvorak
  • Ludmila Prigoda
  • Petar Cekerevac
Keywords: hacking, hacker, information technology, internet of things, protection, economics

Abstract

Understanding the term hacking as any unconventional way of interacting with some system it is easy to conclude that there are enormous number of people who hacked or tried to hack someone or something. The article, as result of author research, analyses hacking from different points of view, including hacker’s point of view as well as the defender’s point of view. Here are discussed questions like: Who are the hackers? Why do people hack? Law aspects of hacking, as well as some economic issues connected with hacking. At the end, some questions about victim protection are discussed together with the weakness that hackers can use for their own protection. The aim of the article is to make readers familiar with the possible risks of hacker's attacks on the mobile phones and on possible attacks in the announced flood of the internet of things (next IoT) devices.

Author Biographies

Zoran Cekerevac

Faculty of Business and Industrial Management, “Union - Nikola Tesla” University in Belgrade, Serbia

Zdenek Dvorak

Faculty of Security Engineering, University of Zilina, Slovakia

Ludmila Prigoda

Faculty of Economics and Service, Maykop State Technological University, Maykop, Russia

Petar Cekerevac

Hilltop Strategic Services, Belgrade, Serbia

Published
2018-06-30
How to Cite
Cekerevac, Z., Dvorak, Z., Prigoda, L., & Cekerevac, P. (2018). Hacking, Protection and the Consequences of Hacking Hacking, Protection and the Consequences of Hacking . Communications - Scientific Letters of the University of Zilina, 20(2), 83-87. Retrieved from http://komunikacie.uniza.sk/index.php/communications/article/view/92
Section
Articles