Communications - Scientific Letters of the University of Zilina 2018, 20(2):83-87 | DOI: 10.26552/com.C.2018.2.83-87

Hacking, Protection and the Consequences of Hacking Hacking, Protection and the Consequences of Hacking

Zoran Cekerevac1, Zdenek Dvorak2, Ludmila Prigoda3, Petar Cekerevac4
1 Faculty of Business and Industrial Management, "Union - Nikola Tesla" University in Belgrade, Serbia
2 Faculty of Security Engineering, University of Zilina, Slovakia
3 Faculty of Economics and Service, Maykop State Technological University, Maykop, Russia
4 Hilltop Strategic Services, Belgrade, Serbia

Understanding the term hacking as any unconventional way of interacting with some system it is easy to conclude that there are enormous number of people who hacked or tried to hack someone or something. The article, as result of author research, analyses hacking from different points of view, including hacker's point of view as well as the defender's point of view. Here are discussed questions like: Who are the hackers? Why do people hack? Law aspects of hacking, as well as some economic issues connected with hacking. At the end, some questions about victim protection are discussed together with the weakness that hackers can use for their own protection. The aim of the article is to make readers familiar with the possible risks of hacker's attacks on the mobile phones and on possible attacks in the announced flood of the internet of things (next IoT) devices.

Keywords: hacking, hacker; information technology; internet of things; protection; economics

Published: June 30, 2018  Show citation

ACS AIP APA ASA Harvard Chicago Chicago Notes IEEE ISO690 MLA NLM Turabian Vancouver
Cekerevac, Z., Dvorak, Z., Prigoda, L., & Cekerevac, P. (2018). Hacking, Protection and the Consequences of Hacking Hacking, Protection and the Consequences of Hacking. Communications - Scientific Letters of the University of Zilina20(2), 83-87. doi: 10.26552/com.C.2018.2.83-87
Download citation

References

  1. Eli the Computer Guy. Introduction to Hacking [online]. Available: https://www.youtube.com/watch?v=yGIHjTmTFfA [accessed: 2010-12-12].
  2. JARRET, H. M., BAILIE, M. W.: Prosecuting Computer Crimes [online]. Available: https://www.justice.gov/sites/default/files/criminal-ccips/legacy/2015/01/14/ccmanual.pdf.
  3. National Assembly of the Republic of Serbia. Law on Organization and Jurisdiction of State Authorities for Combating High-Tech Crime [online]. Available: http://www.paragraf.rs/propisi/zakon_o_organizaciji_i_nadleznosti_drzavnih_organa_za_borbu_protiv_visokotehnoloskog_kriminala.html [accessed: 2017-03-18].
  4. Ukrainian National Assembly. Law of Ukraine of 7 September 2005 № 2824-IV on the Ratification of the Convention on Cybercrime (with amendments and addenda of 2010-09-21) [online]. Available: http://search.ligazakon.ua/l_doc2.nsf/link1/T052824.html.
  5. Kazakhstan. Proposed a Convention Project to Combat Cyberspace [online]. Available: http://www.zakon.kz/4808903-rf-predpolozhila-proekt-konvencii-po.html [accessed: 2016-08-01].
  6. Black Hat. Black Hat Hacker [online]. Available: http://www.blackhat.com.
  7. ROUSE, M.: Script Kiddy [online]. Available: http://searchmidmarketsecurity.techtarget.com/definition/script-kiddy.
  8. Microsoft. Keyboard Shortcuts for Microsoft Word on Windows [online]. Available: https://support.office.com/en-us/article/Keyboard-shortcuts-for-Microsoft-Word-on-Windows-95EF89DD-7142-4B50-AFB2-F762F663CEB2.
  9. STANESCU, B.: Top 5: Corporate Losses Due to Hacking [online]. Available: https://hotforsecurity.bitdefender.com/blog/top-5-corporate-losses-due-to-hacking-1820.html.
  10. GISH, W.: The Effects of Computer Hacking on an Organization [online]. Available: http://smallbusiness.chron.com/effects-computer-hacking-organization-17975.html.
  11. LEWIS, J. A.: Economic Impact of Cybercrime [online]. Available: https://www.csis.org/analysis/economic-impact-cybercrime.
  12. SMITH, G.: Hackers Cost U.S. Economy Up To 500,000 Jobs Each Year. Study Finds [online]. Available: http://www.huffingtonpost.com/2013/07/25/hackers-jobs_n_3652893.html.
  13. BARRET, D., YARDON, D., PALLETA, D.: U.S. Suspects Hackers in China Breached about 4 Million People's Records. Officials Say [online]. Available: https://www.wsj.com/articles/u-s-suspects-hackers-in-china-behind-government-data-breach-sources-say-1433451888.
  14. SANGER, D. Obama Order Sped up Wave of Cyberattacks against Iran [online]. Available: http://www.nytimes.com/2012/06/01/world/middleeast/obama-ordered-wave-of-cyber-attacks-against-iran.html?_r=3&adxnnl=1&pagewanted=all&adxnnlx=1338548715-2wt62+m6D3KzuVRTaa2QJQ.
  15. DERESPINA, C.: WikiLeaks Releases 'Entire Hacking Capacity of the CIA'WikiLeaks Releases 'Entire Hacking Capacity of the CIA' [online]. Available: http://www.foxnews.com/us/2017/03/07/wikileaks-releases-entire-hacking-capacity-cia.html.
  16. BACON, J.: WikiLeaks: CIA Can Hack into Phones, TVs-Everything [online]. Available: http://www.usatoday.com/story/news/nation/2017/03/07/wikileaks-says-has-published-cia-hacking-codes/98844256/ [accessed: 2017-03-07].
  17. SCEKIC, D., CEKEREVAC, Z.: Privacy by Design - Possible Solution in the Protection of Privacy and Personal Data. Proceedings of International Scientific-Professional conference Information Technologies, Economics and Law: state and development perspectives (ITEL-2016), USA, 260-262, 2016.
  18. JASEK, R.: SHA-1 and MD5 Cryptographic Hash Functions: Security Overwiev. Communications - Scientific Letters of the University of Zilina, 17(1), 73 - 80, 2015. Go to original source...
  19. CEKEREVAC, Z., DVORAK, Z., CEKEREVAC, P.: Internet Safety of SMEs and E-mail Protection in the Light of Recent Revelations about Espionage of Internet Communication System. Zbirnyk naukovykh prats Bukovynskoho universytetu, Ekonomichni nauky, 10, 25-33, 2014.
  20. KUBINA, M. & KOMAN, G.: (2016). Big Data Technology and its Importance for Decision-Making in Enterprises. Communications - Scientific Letters of the University of Zilina, 18(4), 129 - 133, 2016. Go to original source...
  21. PRIGODA, L., CEKEREVAC, Z., DVORAK, Z., CEKEREVAC, P.: One Look at the Modern Information Security [online]. Sustainable Development of Mountain Territories, 4(22). Available: http://www.meste.org/cekerevac.eu/biblioteka/ij_23.pdf.
  22. CEKEREVAC, Z., CEKEREVAC, P., VASILJEVIC, J.: Internet Security of SMEs is an Aspect of Security E-mail. FBIM Transactions, 2(1), 45-56, 2015. DOI:10.12709/fbim.02.02.01.05 Go to original source...
  23. CEKEREVAC, Z., RADONJIC, S.: Some SMEs Data Safety and Security Issues in the In-House and in the Cloud Computing. Proceedings of 18th International Science Conference Solving of Crisis Situations in a Specific Environment, Slovakia, 99-106, 2013.

This is an open access article distributed under the terms of the Creative Commons Attribution 4.0 International License (CC BY 4.0), which permits use, distribution, and reproduction in any medium, provided the original publication is properly cited. No use, distribution or reproduction is permitted which does not comply with these terms.