Hacking, Protection and the Consequences of Hacking Hacking, Protection and the Consequences of Hacking
Understanding the term hacking as any unconventional way of interacting with some system it is easy to conclude that there are enormous number of people who hacked or tried to hack someone or something. The article, as result of author research, analyses hacking from different points of view, includ...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
University of Žilina
2018-06-01
|
Series: | Communications |
Subjects: | |
Online Access: | https://komunikacie.uniza.sk/artkey/csl-201802-0013_hacking-protection-and-the-consequences-of-hacking-hacking-protection-and-the-consequences-of-hacking.php |
_version_ | 1797846805072838656 |
---|---|
author | Zoran Cekerevac Zdenek Dvorak Ludmila Prigoda Petar Cekerevac |
author_facet | Zoran Cekerevac Zdenek Dvorak Ludmila Prigoda Petar Cekerevac |
author_sort | Zoran Cekerevac |
collection | DOAJ |
description | Understanding the term hacking as any unconventional way of interacting with some system it is easy to conclude that there are enormous number of people who hacked or tried to hack someone or something. The article, as result of author research, analyses hacking from different points of view, including hacker's point of view as well as the defender's point of view. Here are discussed questions like: Who are the hackers? Why do people hack? Law aspects of hacking, as well as some economic issues connected with hacking. At the end, some questions about victim protection are discussed together with the weakness that hackers can use for their own protection. The aim of the article is to make readers familiar with the possible risks of hacker's attacks on the mobile phones and on possible attacks in the announced flood of the internet of things (next IoT) devices. |
first_indexed | 2024-04-09T18:00:53Z |
format | Article |
id | doaj.art-125b0c010ef3486b8def42a546641633 |
institution | Directory Open Access Journal |
issn | 1335-4205 2585-7878 |
language | English |
last_indexed | 2024-04-09T18:00:53Z |
publishDate | 2018-06-01 |
publisher | University of Žilina |
record_format | Article |
series | Communications |
spelling | doaj.art-125b0c010ef3486b8def42a5466416332023-04-14T06:31:45ZengUniversity of ŽilinaCommunications1335-42052585-78782018-06-01202838710.26552/com.C.2018.2.83-87csl-201802-0013Hacking, Protection and the Consequences of Hacking Hacking, Protection and the Consequences of HackingZoran Cekerevac0Zdenek Dvorak1Ludmila Prigoda2Petar Cekerevac3Faculty of Business and Industrial Management, "Union - Nikola Tesla" University in Belgrade, SerbiaFaculty of Security Engineering, University of Zilina, SlovakiaFaculty of Economics and Service, Maykop State Technological University, Maykop, RussiaHilltop Strategic Services, Belgrade, SerbiaUnderstanding the term hacking as any unconventional way of interacting with some system it is easy to conclude that there are enormous number of people who hacked or tried to hack someone or something. The article, as result of author research, analyses hacking from different points of view, including hacker's point of view as well as the defender's point of view. Here are discussed questions like: Who are the hackers? Why do people hack? Law aspects of hacking, as well as some economic issues connected with hacking. At the end, some questions about victim protection are discussed together with the weakness that hackers can use for their own protection. The aim of the article is to make readers familiar with the possible risks of hacker's attacks on the mobile phones and on possible attacks in the announced flood of the internet of things (next IoT) devices.https://komunikacie.uniza.sk/artkey/csl-201802-0013_hacking-protection-and-the-consequences-of-hacking-hacking-protection-and-the-consequences-of-hacking.phphacking, hackerinformation technologyinternet of thingsprotectioneconomics |
spellingShingle | Zoran Cekerevac Zdenek Dvorak Ludmila Prigoda Petar Cekerevac Hacking, Protection and the Consequences of Hacking Hacking, Protection and the Consequences of Hacking Communications hacking, hacker information technology internet of things protection economics |
title | Hacking, Protection and the Consequences of Hacking Hacking, Protection and the Consequences of Hacking |
title_full | Hacking, Protection and the Consequences of Hacking Hacking, Protection and the Consequences of Hacking |
title_fullStr | Hacking, Protection and the Consequences of Hacking Hacking, Protection and the Consequences of Hacking |
title_full_unstemmed | Hacking, Protection and the Consequences of Hacking Hacking, Protection and the Consequences of Hacking |
title_short | Hacking, Protection and the Consequences of Hacking Hacking, Protection and the Consequences of Hacking |
title_sort | hacking protection and the consequences of hacking hacking protection and the consequences of hacking |
topic | hacking, hacker information technology internet of things protection economics |
url | https://komunikacie.uniza.sk/artkey/csl-201802-0013_hacking-protection-and-the-consequences-of-hacking-hacking-protection-and-the-consequences-of-hacking.php |
work_keys_str_mv | AT zorancekerevac hackingprotectionandtheconsequencesofhackinghackingprotectionandtheconsequencesofhacking AT zdenekdvorak hackingprotectionandtheconsequencesofhackinghackingprotectionandtheconsequencesofhacking AT ludmilaprigoda hackingprotectionandtheconsequencesofhackinghackingprotectionandtheconsequencesofhacking AT petarcekerevac hackingprotectionandtheconsequencesofhackinghackingprotectionandtheconsequencesofhacking |