You are on page 1of 2

Charmel P.

Camposo IT115

Answer the following questions.

1. What problems can hacking cause?

Hacking can cause a massive damage in your personal information or even in big or small businesses
hackers can hijack your usernames and passwords. Steal your money and open credit card and bank
accounts in your name. Ruin your credit. Request new account Personal Identification Numbers (PINs) or
additional credit cards, hackers can also steal some information and leak on web or even delete some
files.

2. Why do you think hackers do what they do?

One of the most common reasons for hackers to hack is to steal or leak information. ... A lot of times,
hackers also steal information in order to assume your personal identity and then use it for something
else like transferring money, taking a loan, etc. But it’s also depends of what type of hackers, there are
hackers want to break through that system and take it as a challenge or a hackers that allowed to hack
to their system to find security weaknesses in order to fix them before they can be exploited by attacks.

3. Discuss the following and give examples:

a. Passive Scanning Technique

Passive scanning is a method of vulnerability detection that relies on information gleaned from


network data that is captured from a target computer without direct interaction.

Example:

The passive scanning approach allows security personnel to monitor which operating systems
are in use; what is being sent to, from and within the system; which services are available; and
where parts of the system may be vulnerable to security threats.

b. Active Scanning Technique

Active scanning attempts to find potential vulnerabilities by using known attacks against the
selected targets. Active scanning is an attack on those targets. You should NOT use it on web
applications that you do not own.

Example:

The active scanning approach encompasses everything an organization does to foil system
breaches, while the passive (or monitoring) approach entails all the ways the organization
oversees system security. When making buying decisions for your organization, it's a mistake to
think that you have to choose between the two types of protection.

c. Port Scanning
Port scanning is a method of determining which ports on a network are open and could be receiving or
sending data. It is also a process for sending packets to specific ports on a host and analyzing responses
to identify vulnerabilities.

Example:

A popular use case of port scanning is to scan for 3306 port for example, after you installed and started
MySQL server to see if it's showing as 'open'. In plain English, a port scanner works by sending network
packets and waiting for a response.

You might also like