Hacking, Protection and the Consequences of Hacking Hacking, Protection and the Consequences of Hacking

Understanding the term hacking as any unconventional way of interacting with some system it is easy to conclude that there are enormous number of people who hacked or tried to hack someone or something. The article, as result of author research, analyses hacking from different points of view, includ...

Full description

Bibliographic Details
Main Authors: Zoran Cekerevac, Zdenek Dvorak, Ludmila Prigoda, Petar Cekerevac
Format: Article
Language:English
Published: University of Žilina 2018-06-01
Series:Communications
Subjects:
Online Access:https://komunikacie.uniza.sk/artkey/csl-201802-0013_hacking-protection-and-the-consequences-of-hacking-hacking-protection-and-the-consequences-of-hacking.php
_version_ 1797846805072838656
author Zoran Cekerevac
Zdenek Dvorak
Ludmila Prigoda
Petar Cekerevac
author_facet Zoran Cekerevac
Zdenek Dvorak
Ludmila Prigoda
Petar Cekerevac
author_sort Zoran Cekerevac
collection DOAJ
description Understanding the term hacking as any unconventional way of interacting with some system it is easy to conclude that there are enormous number of people who hacked or tried to hack someone or something. The article, as result of author research, analyses hacking from different points of view, including hacker's point of view as well as the defender's point of view. Here are discussed questions like: Who are the hackers? Why do people hack? Law aspects of hacking, as well as some economic issues connected with hacking. At the end, some questions about victim protection are discussed together with the weakness that hackers can use for their own protection. The aim of the article is to make readers familiar with the possible risks of hacker's attacks on the mobile phones and on possible attacks in the announced flood of the internet of things (next IoT) devices.
first_indexed 2024-04-09T18:00:53Z
format Article
id doaj.art-125b0c010ef3486b8def42a546641633
institution Directory Open Access Journal
issn 1335-4205
2585-7878
language English
last_indexed 2024-04-09T18:00:53Z
publishDate 2018-06-01
publisher University of Žilina
record_format Article
series Communications
spelling doaj.art-125b0c010ef3486b8def42a5466416332023-04-14T06:31:45ZengUniversity of ŽilinaCommunications1335-42052585-78782018-06-01202838710.26552/com.C.2018.2.83-87csl-201802-0013Hacking, Protection and the Consequences of Hacking Hacking, Protection and the Consequences of HackingZoran Cekerevac0Zdenek Dvorak1Ludmila Prigoda2Petar Cekerevac3Faculty of Business and Industrial Management, "Union - Nikola Tesla" University in Belgrade, SerbiaFaculty of Security Engineering, University of Zilina, SlovakiaFaculty of Economics and Service, Maykop State Technological University, Maykop, RussiaHilltop Strategic Services, Belgrade, SerbiaUnderstanding the term hacking as any unconventional way of interacting with some system it is easy to conclude that there are enormous number of people who hacked or tried to hack someone or something. The article, as result of author research, analyses hacking from different points of view, including hacker's point of view as well as the defender's point of view. Here are discussed questions like: Who are the hackers? Why do people hack? Law aspects of hacking, as well as some economic issues connected with hacking. At the end, some questions about victim protection are discussed together with the weakness that hackers can use for their own protection. The aim of the article is to make readers familiar with the possible risks of hacker's attacks on the mobile phones and on possible attacks in the announced flood of the internet of things (next IoT) devices.https://komunikacie.uniza.sk/artkey/csl-201802-0013_hacking-protection-and-the-consequences-of-hacking-hacking-protection-and-the-consequences-of-hacking.phphacking, hackerinformation technologyinternet of thingsprotectioneconomics
spellingShingle Zoran Cekerevac
Zdenek Dvorak
Ludmila Prigoda
Petar Cekerevac
Hacking, Protection and the Consequences of Hacking Hacking, Protection and the Consequences of Hacking
Communications
hacking, hacker
information technology
internet of things
protection
economics
title Hacking, Protection and the Consequences of Hacking Hacking, Protection and the Consequences of Hacking
title_full Hacking, Protection and the Consequences of Hacking Hacking, Protection and the Consequences of Hacking
title_fullStr Hacking, Protection and the Consequences of Hacking Hacking, Protection and the Consequences of Hacking
title_full_unstemmed Hacking, Protection and the Consequences of Hacking Hacking, Protection and the Consequences of Hacking
title_short Hacking, Protection and the Consequences of Hacking Hacking, Protection and the Consequences of Hacking
title_sort hacking protection and the consequences of hacking hacking protection and the consequences of hacking
topic hacking, hacker
information technology
internet of things
protection
economics
url https://komunikacie.uniza.sk/artkey/csl-201802-0013_hacking-protection-and-the-consequences-of-hacking-hacking-protection-and-the-consequences-of-hacking.php
work_keys_str_mv AT zorancekerevac hackingprotectionandtheconsequencesofhackinghackingprotectionandtheconsequencesofhacking
AT zdenekdvorak hackingprotectionandtheconsequencesofhackinghackingprotectionandtheconsequencesofhacking
AT ludmilaprigoda hackingprotectionandtheconsequencesofhackinghackingprotectionandtheconsequencesofhacking
AT petarcekerevac hackingprotectionandtheconsequencesofhackinghackingprotectionandtheconsequencesofhacking