Write my research paper
Respond to one or more of the following prompts in one to two paragraphs:Students need to contribute two substantive posts in this discussion by the due date indicated. The substantive posts can be any combination of responses and replies.Weeks Course Material6.1 Analyze security threats that could be harmful to SCM, CRM, ERP systems, and the management functions they support in an organization.6.2 Evaluate the influence of the internet on businesses, focusing on SCM, CRM, and ERP in an organization.PEER 1One topic that I found interesting this week was when I read about hackers and how they are able to break in and access networks. I thought it was fascinating on how the texts mentioned on how they use smoking entrances and pose as smoking employees to access a building. Also, what was interesting were the different types of hackers. I always knew about script kiddies because they are the most common kind of hackers that I believe everyone has run into at one time or another. Also, black hat hackers and white hat hackers are pretty common terms to me. The term Hacktivists, however, was another one that I have dealt with in the past. I have seen and had to fix the defacing of websites because of hacktivists. They would inject a virus that would access web-hosting accounts and change the index page of all of the websites on the server. The virus would then erase the logs so that the admins would not know what was changed. I have also seen hacktivists target a religious site once by conducting mass DDOS attacks bring down their church site.PEER 2Common Types of HackersBlack-hat hackers break into other peoples computer systems and may just look around or may steal and destroy information.Crackers have criminal intent when hacking.Cyberterrorists seek to cause harm to people or to destroy critical systems or information and use the Internet as a weapon of mass destruction.Hactivists have philosophical and political reasons for breaking into systems and will often deface the website as a protest.Script kiddies or script bunnies find hacking code on the Internet and click-and-point their way into systems to cause damage or spread viruses.White-hat hackers work at the request of the system owners to find system vulnerabilities and plug the holes. (Baltzan, 2018, ).I found this portion to be interesting. I had heard several of the names before but just assumed it was a way to describe a hacker. I had heard of black-hat hacker and just assumed it was an evil hacker, and white hat being the reverse good. Having the definitions put up, i still only agree with White-Hat Hackers for the most part. I could see Hactivists being a good thing when they are looking for potential corruption for the good of society. The rest of the hackers, I cant say I would endorse on any level.Reference: ´Baltzan, P. (2018). Business Driven Technology (7th ed.). Retrieved from The University of Phoenix eBook Collection database.Purchase the answer to view it
©Copyright 2000-2018. All Rights Reserved. TermPaperChampions.com: The most reliable provider of custom academic papers. Our writers are here to help you complete papers from all disciplines and academic levels . You can always trust us to deliver.