Wednesday, 18 May 2016

hacking

HACKING
In computer networking, hacking is any technical effort to manipulate the normal behavior of network connections and connected systems. A hacker is any person engaged in hacking. The term "hacking" historically referred to constructive, clever technical work that was not necessarily related to computer systems. Today, however, hacking and hackers are most commonly associated with malicious programming attacks on the Internet and other networks.
Origins of Hacking
M.I.T. engineers in the 1950s and 1960s first popularized the term and concept of hacking. Starting at the model train club and later in the mainframe computer rooms, the so-called "hacks" perpetrated by these hackers were intended to be harmless technical experiments and fun learning activities.
Later, outside of M.I.T., others began applying the term to less honorable pursuits. Before the Internet became popular, for example, several hackers in the U.S. experimented with methods to modify telephones for making free long-distance calls over the phone network illegally.
 Effects of Computer Hacking on an Organization
Computer hacking pervades global society in the digital age. The act of breaking into a secure computer network serves many purposes, from corporate espionage to blatant theft and political insubordination. Computer hacking affects organizations in a variety of ways some universal, others specific to the nature of the reason for hacking and the business in question. The direction of hacking whether the organization hacks or gets hacked also has an effect.
Information
Computer hacking often revolves around information. Organizations steal information such as research, business strategies, financial reports and more from one another through hacking operations. Digitized client databases also fall victim to hacking, with hackers stealing names, addresses, emails and even financial information from organizations. Such a loss of information to a small business may cost a competitive edge or the complete loss of a client base, effectively ruining the organization. On the opposite end of the spectrum, a business participating in computer hacking may gain a wealth of information providing a competitive edge and access to new client bases through the act. Personal or political information gained through computer hacking can serve as leverage in business or political dealings.

Organizational Structure
The structure of organizations previously hacked, at risk for hacking or with extensive digital networks requiring protection from hacking often reflects the threat of hacking. Businesses in such a position employ extensive information technology (IT) teams, which work constantly on creating, updating, developing and improving computer networks and safety to prevent or deter hackers from accessing information. Small businesses with limited budgets may face radical reorganization to cope with such efforts, while new businesses anticipating such preventative measures must work them into the initial business plan.
Effects on Technology Organizations
Organizations in the computer and technology industry may benefit or lose drastically from instances of computer hacking. Independent firms specializing in hacking prevention software or network development stand to benefit tremendously as the impact of hacking spreads throughout the world. Small businesses in particular may expand operations exponentially if successful in obtaining and retaining a client base. However, a company in this field whose product or efforts fail in the face of hacking face a ruined reputation and thereby the potential loss of a client base and an inability to attract additional clients.

BY MKULA DENNIS

No comments:

Post a Comment