Cyber Hacking and Types of Hackers

673 Words2 Pages

The FED or Federal Reserve Bank is the central banking system of the United States of America. It was created on December 23, 1913, after the enactment of the Federal Reserve Act, because of a series of financial panics from the America public referring to the panic of 1907. Recently the FED is celebrated it 100th anniversary. Which makes people wonder, “What will the FED look like 100 years from now?”. This is a very interesting question to ask. There are many different challenges/outcomes for the FED’s future. I will talk about one of those potential challenges/outcomes. Cyber hacking has recently been on the upswing. Target recently experienced a breach in their security which cost around 110 million Target customers their personal information. During the beginning of last February, the Federal Reserve has also hacked. The website that is which caused great concern. The hackers could have taken anything. No one quite knows. So after that incident, the FED should and will take great measures to protect itself from cyber attacks. Let’s get an overview of what the Federal Reserve has to deal with: The history of cyber hacking and the many different types of hacking. A hacker is a person who looks to reveal problems in a computer system or network. Hackers might be motivated to do what they do because they could make a profit or they are protesting or it is just something they like to do. There is a little underground community of hackers called the computer underground. There are other uses of the word hacker for example someone who has an advanced understanding of computers and computer software, but they are rarely used in the mainstream world. People have argued over the real definition of the term “hacker”. Compute... ... middle of paper ... ...bert (2005). Cybercrime: Investigating High Technology Computer Crime. Matthew Bender & Company. p. 258. ISBN 1-59345-303-5.Robert Moore Moore, Robert (2006). Cybercrime: Investigating High-Technology Computer Crime (1st ed.). Cincinnati, Ohio: Anderson Publishing. ISBN 978-1-59345-303-9. Andress, Mandy; Cox, Phil; Tittel, Ed (2001). CIW Security Professional. New York, NY: Wiley. p. 638. ISBN 0-7645-4822-0. Moore, Robert (2006). Cybercrime: Investigating High-Technology Computer Crime (1st ed.). Cincinnati, Ohio: Anderson Publishing. ISBN 978-1-59345-303-9. Chabrow, Eric (February 25, 2012). "7 Levels of Hackers: Applying An Ancient Chinese Lesson: Know Your Enemies". GovInfo Security. Retrieved February 27, 2012. Blomquist, Brian (May 29, 1999). "FBI's Web Site Socked as Hackers Target Feds". New York Post. "The Hacker's Dictionary". Retrieved 23 May 2013.

More about Cyber Hacking and Types of Hackers

Open Document