Hacker’s Watch

By Kamini Kandica Abdool

This (being hacked I mean) is the nightmare of a situation and the discussion seems forever never-ending. Some companies hire hackers to check their security network on the back-end but hope that there are no holes in the firewall and the intruder leaves.

We’re not in the movies here, this is real life and the excitement is also real. What happens when the hacker leaves is the height of it. The hope is here that the never will disappear and the ending will show up soon. Hackers are on the horizon and have been attacking mainly wireless ports that have shown as on home networks. The thing to remember that most people tend to forget is that the hacker is an intruder and doesn’t leave just because he walked out of your office. It’s not like hiring your regular everyday consultant. Hacking has it’s own specific compliance instructions….. For lack of being funny, really you have to bring forward a “cleaner”. Contact your compliance for specific instructions for this….. it’s different for every business and sector.

The addition to this (hacking in the industry) being legalized in the recent past is the hack of cameras and camera software has infiltrated into the hacking network as well. The new advances in the pirate markets and necessity for hackers to eavesdrop lead to the infarction of camera networks for privatized businesses and now, to home and small business owners. Many times, the hired hackers infiltrate knowingly as per hire legitimately but don’t ever fully need because their issues weren’t removed (pun? no). Really, full business according to global, US national and Chinese national standards necessitate proper cleanup of such issuance as appropriated once the time session elapses.

While practice occurs on the small frontier of big business these days, the increased risk of cyber terrorism and warfare has brought the hacking down to the large population on the ground. In many instances, people and the general public assume that big business is the big target but not these days, these days it is evident with all the routing of activity that big business, being the earlier targets are now secondary and less frequently adverse to hacking while, the small business and private homes have become the new targets.

These hidden scopes of pro filer have recently emerged as hackers attacked computers owned by IT individuals like myself unknowingly hoping to retrieve financial information and other pieces of what they might consider loot. The significance of such a find for the community as a measure-ability gain will begin after resolution. The back office experience has now hit the front line with a definite demand from the end-user. The requirement here is safety and security and the only ethical thing to do would be to forward the requested information.

The truth of it is, many businesses incorporate cameras into their network for security reasons however, there are times when people want to be just nosy and spy on themselves and others in their environment that might be at a later date illegally distributed. Voyeurism at best, they might say but that’s incorrect as well. The scenario in the reference provides information that invades privacy and creates channels a route into unexpected regions and creates a network for such matters, while invading the privacy of individuals.

Invasion of privacy is the problem and the example provided is a clear cut way of understanding how such a route can migrate from big business to a smaller more individual or end-user environment.

References:
http://www.hackingexpose.blogspot.com/2012/05/popular-surveillance-cameras-open-to.html

Advertisements

About kaminikandicaabdool

BA in Sociology - Temple University - December 2009 Microsoft Small Business Certificate - 2006 Current Endeavors - Volunteer at the World Tribute Center; Employee at Home Depot and Path Mark Against ANY KIND of terrorism, I don't smoke and I don't use non-prescription narcotics just the regular over-the-counter kind!!!!
This entry was posted in Technology and tagged , . Bookmark the permalink.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s