Internet Hacking and Prevention
Internet Hacking and Prevention
Internet Hacking and Prevention
ISSN(Online): 2581-7280
Abstract : Understanding the term hacking as any unconventional way of interacting with some system it is
easy to conclude that there are enormous number of people who hacked or tried to hack someone or something.
The article, as result of author research, analyses hacking from different points of view, including hacker's point
of view as well as the defender's point of view. Here are discussed questions like: Who are the hackers? Why do
people hack? Law aspects of hacking, as well as some economic issues connected with hacking. At the end,
some questions about victim protection are discussed together with the weakness that hackers can use for their
own protection. The aim of the article is to make readers familiar with the possible risks of hacker's attacks on
the mobile phones and on possible attacks in the announced food of the internet of things (next IoT) devices.
.
Keywords - Scalability, Fault tolerance, Performance, Measurements.
I. INTRODUCTION
Hacking is an unauthorized entry into a network or a computer to steal or manipulate information, data or
files. The person involved in this process is named as a hacker. Computer hacking is done using several types of
programs such as Rootkit, Trojan, Keylogger etc. Hackers also employ techniques like browser hijacks,
spoofing, phishing etc. to capture user’s personal or financial details.
Your computer may show certain signs of being hacked such as fake antivirus warning messages, unwanted
browser toolbar, redirection to strange websites, random pop ups, ransomware message etc. If you receive any
of these warning signs, you can be sure that your computer has been targeted by a hacker.
Prevention:If you are planning to download a music file, video or a utility software do so from a trusted
website. Many websites offer a free download of certain high-value software, but those may carry the virus or a
spyware released by a hacker to obtain your PC information.
Email is one of the biggest tools through which hackers spread malware. The spyware or virus are
hidden in attachments and links clicking on which the infection begins. Hence, never click on random
attachments if those are not from any trusted source.
F-115
www.viva-technology.org/New/IJRI
VIVA-Tech International Journal for Research and Innovation Volume 1, Issue 4 (2021)
ISSN(Online): 2581-7280
Email Security
Email is the number one entry point for malware into the enterprise. No surprise really. Given all the
data that has pointed to this as the root cause of many breach events, it should be the next place where
organizations double-down on security. It is very important that organizations take the time to be informed
consumers in this regard and understand what threats the email controls are preventing and what the
remaining exposures are so that a layered control model can be put in place.
Endpoint Detection and Response
Most of that email is destined for a user that will click on attachments and potentially infect themselves
with malware of some kind. The second most common malware infection vector is through malicious web
content; also, an end-user action. As a result, it makes sense to have a thorough suite of controls on the
endpoints and servers in the environment to identify and shutdown viruses, malware, and other potentially
unwanted programs. Making sure that all endpoints are under management and kept current will help
prevent whack-a-mole malware infections that can persist in environments with inconsistently applied
controls.
Segmentation and Egress Filtering
Just because a hacker or piece of malware makes its way into your environment, doesn’t mean they should
be able to spread adjacent network nodes or waltz back out with your mission critical, regulated
data. Limiting the ability to communicate both across and outside the network through a combination of
controls such as firewall policies and requiring the use of proxy servers is an often-overlooked opportunity
for organizations to increase their security, limit the impact of an incident and help prevent a network
incident from becoming a public data breach.
Robust Detection Control Infrastructure
History teaches us that prevention-centric strategies will fail and should be paired with detective controls to
minimize time to detection and remediation. Make certain you have a well-tuned SIEM/SOAPA/SOAR
infrastructure as part of your security architecture and that that is receiving logs that cover the internal network
and applications as well as through the perimeter. This includes tuning of endpoint, application, and network
device logs to enable an early detection and response capability in the environment.
F-116
www.viva-technology.org/New/IJRI
VIVA-Tech International Journal for Research and Innovation Volume 1, Issue 4 (2021)
ISSN(Online): 2581-7280
In order to prevent this unauthorized intrusion into your systems/networks , you must follow some basic security
guidelines:
DOWNLOAD SOFTWARE FROM AUTHORIZED WEBSITES
If you are planning to download a music file, video or a utility software do so from a trusted website. Many
websites offer a free download of certain high-value software, but those may carry the virus or a spyware
released by a hacker to obtain your PC information.
DO NOT CLICK ON RANDOM EMAIL ATTACHMENTS
Email is one of the biggest tools through which hackers spread malware. The spyware or virus are hidden in
attachments and links clicking on which the infection begins. Hence, never click on random attachments if those
are not from any trusted source.
SCAN ALL TYPES OF HARD DRIVES BEFORE RUNNING
Hard drives such as pen drives, external hard disk or mobile devices should be scanned by a USB scanner to
remove any kind of malware.
ABSTAIN FROM KEEPING EASY PASSWORDS
Do not keep easy passwords such as- your name followed by1234, your pet name or name & date of birth
etc. These information can be easily guessed or can be fetched from social media sites, so follow best password
management practices. You should keep an alpha-numeric password for your accounts including a combination
of special characters.
NEVER STORE OR SHARE YOUR LOGIN INFORMATION
Keeping your user id, password on your PC increases the risk of becoming a victim of hackers. Always try
to memorize your login information. It is also important to abstain from sharing your password via email.
Importance of an Anti-hacking Software
Anti-hacking software is also known as a computer antivirus software, which is a must have for every
PC. Anti-hacking software protects a PC from these cyber attacks by detecting and removing the virus,
spyware, and other malware intrusions. The antivirus software must be kept updated with the latest virus
signature so that any types of new threats can be detected. REVE Antivirus software is ideal for internet users
as it protects your computer's data from hackers.
IV. FAULT TOLERANCE AND DIAGNOSIS
FAULT TOLERANCE
Fault tolerance is a technique that has proven to be efficient to implement computing systems able to provide
a correct service despite accidental phenomena such as environmental perturbations (external faults), failures of
hardware components (internal physical faults), or even design faults such as software bugs. Faults are causes of
errors, errors are abnormal parts of the computing system state, and failures happen when errors propagate
through the system-to-user interface, i.e., when the service provided by the system is incorrect.
When faults are accidental and sufficiently rare, they can be tolerated. To do so, errors must be detected
before they lead to failure, and then corrected or recovered: this is the role of error handling. It is also necessary
to diagnose the underlying faults (i.e., to identify and locate the faulty components), so as to be able to isolate
them, and then replace or repair them, and finally to re-establish the system in its nominal configuration: fault
diagnosis, isolation, repair and reconfiguration together constitute fault handling.
There are various techniques for detecting errors. For simplicity, we categorize these as being either
property-checks or comparison-checks. Property-checks consist in observing the system state, in particular
certain values or events, and verifying they satisfy certain properties or rules. This usually imposes only a small
hardware or software overhead (redundancy). Among hardware property-checks, let us note that most
microprocessors detect non-existing or unauthorized instructions and commands, non-existing addresses and
unauthorized access modes, and that watchdogs can detect excessive execution durations. Software-based
property-checks include likelihood tests inserted into programs to check the values of certain variables, or the
instants or sequences of certain events (defensive programming).
Error detecting codes and run-time model checking can also be viewed as property-checks. Comparison-
checks consist in comparing several executions, carried out either sequentially on the same hardware, or on
different hardware units. This requires more redundancy than the first class of error detection techniques, but it
also assumes that a single fault would not produce the same effect (i.e., identical errors) on the different
executions. If only internal physical faults are considered, the same computation can be run on identical
F-117
www.viva-technology.org/New/IJRI
VIVA-Tech International Journal for Research and Innovation Volume 1, Issue 4 (2021)
ISSN(Online): 2581-7280
hardware units, since it is very unlikely that each hardware unit would suffer an identical internal fault at the
same execution instant to produce the same error. On the contrary, design faults would produce the same errors
if the same process is run on identical hardware units, and thus the comparison of the executions would not
detect discrepancies. In that case, it is necessary to diversify the underlying execution support, so that a single
design fault would affect only one execution, or at least would affect differently the different executions.
To be able to do that, it is necessary to have created and saved copies of the system state, known as recovery
points or checkpoints. Another error correction technique is called forward recovery, which consists of replacing
the erroneous system state by a new, healthy state, and then continuing execution. This is possible, for example,
in certain real-time control systems in which the system can be re-initialized and input data reread from sensors
before continuing execution.
Finally, a third technique consists in “masking” errors; This is possible when there is enough redundant state
information for a correct state to be built from the erroneous state, e.g., by a majority vote on three (or more)
executions. In most cases, the efficacy of fault tolerance techniques relies on the fact that faults are rare
phenomena that occur at random points in time. It is thus possible, for example in a triple modular redundant
architecture, to suppose that is unlikely for a second unit to fail while a failed unit is being repaired. An attacker
that succeeds in penetrating one system can pursue his attack on that system, and also simultaneously attack
other similar systems.
Diagnostic Tools
It should be noted that most currently available intrusion detection systems do not include any intrusion
diagnosis mechanisms. The explicit recognition of the fact that misuses and anomalies are indeed errors that can
be caused by any sort of fault. Indeed, a good intrusion detection system requires such a fault diagnosis
mechanism to minimize the rate of false alarms caused by errors due to other classes of faults.
V. MEASUREMENTS
1. Use a firewall.
Windows and macOS have built-in firewalls – software designed to create a barrier between your information
and the outside world. Firewalls prevent unauthorized access to your business network and alert you to any
intrusion attempts.Make sure the firewall is enabled before you go online. You can also purchase a hardware
firewall from companies such as Cisco, Sophos or Fortinet, depending on your broadband router, which also has
a built-in firewall that protects your network. If you have a larger business, you can purchase an additional
business networking firewall.
F-118
www.viva-technology.org/New/IJRI
VIVA-Tech International Journal for Research and Innovation Volume 1, Issue 4 (2021)
ISSN(Online): 2581-7280
6. Ignore spam.
Beware of email messages from unknown parties, and never click on links or open attachments that accompany
them. Inbox spam filters have gotten pretty good at catching the most conspicuous spam. But more sophisticated
phishing emails that mimic your friends, associates and trusted businesses (like your bank) have become
common, so keep your eyes open for anything that looks or sounds suspicious.
8. Shut it down.
Many businesses, especially those operating a web server, are "all systems go" all the time. If you're not
operating a complex internet-based company, however, switch off your machine overnight or during long
stretches when you're not working. Always being on makes your computer a more visible and available target
for hackers; shutting down breaks the connection a hacker may have established with your network and disrupts
any possible mischief.
9. Use virtualization.
Not everyone needs to take this route, but if you visit sketchy websites, expect to be bombarded with spyware
and viruses. While the best way to avoid browser-derived intrusions is to steer clear of unsafe sites,
virtualization allows you to run your browser in a virtual environment, like Parallels or VMware Fusion, that
sidesteps your operating system to keep it safer.
F-119
www.viva-technology.org/New/IJRI
VIVA-Tech International Journal for Research and Innovation Volume 1, Issue 4 (2021)
ISSN(Online): 2581-7280
VII. ACKNOWLEDGEMENTS
I thank my college for giving us the opportunity to make this project a success. I offer my special thanks and
sincerity.
I thank Professor Krutika vartak for encouraging me to complete this research paper, for guidance and assistance
for all the problems I encountered while doing research.
Without his guidance, I would not have completed my research paper.
VIII. REFERENCES
[1] Sanctum Inc, “Ethical Hacking techniques to audit and secure web enabled applications”, 2002.
[2] B. Reto, “Ethical Hacking”, in GSEC Practical Assignment, Version 1.4b, Option 1, Nov 24, 2002.
[3] Smith B., Yurcik W., Doss D., “Ethical Hacking: the security justification redux”, IEEE Transactions, pp.
375- 379, 2002.
[4] J. Danish and A. N. Muhammad, “Is Ethical Hacking Ethical? “ , International journal of Engineering
Science and Technology, Vol 3 No. 5, pp. 3758-3763, May 2011.
[5] Ajinkya A. Farsole, Amurta G. Kashikar and Apurva Zunzunwala , “Ethical Hacking, International journal
of Computer Applications (0975-8887), Vol. 1 No. 10, pp. 14-20, 2010.
[6] H.M David, “Three Different Shades of Ethical Hacking: Black, White and Gray,” in GSEC Practical
Assignment, Version 1.4b, Option 1, Feb 23, 2004.
[7] Ajinkya A., Farsole Amruta G., Kashikar Apurva Zunzunwala"Ethical Hacking", in 2010 International
Journal of Computer Applications (0975 – 8887) Volume 1 – No. 10
F-120
www.viva-technology.org/New/IJRI
VIVA-Tech International Journal for Research and Innovation Volume 1, Issue 4 (2021)
ISSN(Online): 2581-7280
[8] Marilyn Leathers “A Closer Look at Ethical Hacking and Hackers" in East Carolina University ICTN
6865.
[9] Gilberto Tadayoshi Hashimoto, Pedro Frosi Rosa, Edmo Lopes Filho, Jayme Tadeu Machado, A Security
Framework to Protect Against Social Networks Services Threats, 2010 Fifth International Conference on
Systems and Networks Communications.
F-121
www.viva-technology.org/New/IJRI