Hacking and Eavesdropping

Hacking and Eavesdropping

Kevin Curran (University of Ulster, Ireland), Peter Breslin (University of Ulster, Ireland), Kevin McLaughlin (University of Ulster, Ireland) and Gary Tracey (University of Ulster, Ireland)
Copyright: © 2007 |Pages: 11
DOI: 10.4018/978-1-59140-991-5.ch036
OnDemand PDF Download:
$37.50

Abstract

Many self-proclaimed hackers would actually consider themselves to be performing a service to businesses as they claim they are simply showing businesses the flaws within their systems so that they can implement ways to prevent future attacks. They state that if it was not for hacking, then security software would not be where it is today. An ethical hacker will tell you that someone who hacks into a system for purposes of self benefit would be best known as a cracker, rather than a hacker, for it is the latter that gives cause for security software in the first place. This chapter reviews the tools, methods, and rationale of hackers.

Complete Chapter List

Search this Book:
Reset