Thursday, 27 December 2012

Nasdaq Hacker

Homework #1 Article Review The article I found was from the February 5-6, 2011 weekend edition of The Wall Street Journal. The article, entitled Hackers Penetrate Nasdaq Computers by Devlin Barrett, describes the frequent attacks by hackers of the computer network that runs the Nasdaq Stock trade throughout the past year. Federal investigators ar still severe to identify the offenders and what their intent was. Although it cannot be determined exactly what separate of Nasdaqs computer network were accessed, some possible motives ar, nefarious financial gain, theft of trade secrets and a national security department threat designed to damage the exchange. The exchange plays a glacial role in the United States radix that is as important as power companies and air concern control operations. At this point, it seems that the perpetrators were only looking around and clear not provided tampered with the network. The article then transitions to the current landed estate of cyber-crime and the motives and techniques hackers are using. Investigators continue to worry about security breaches; they are unsure if they have been able to fill all emf security gaps in an ever-changing cyber environment.
Ordercustompaper.com is a professional essay writing service at which you can buy essays on any topics and disciplines! All custom essays are written by professional writers!
The most sophisticated hackers are increasingly pursuing financial institutions, especially those involved in trading. These hackers dont instantly try to monetize the situation. They start gather the information they need and then determine the top hat course of action to maintain a long-term parentage of income. In this current case with Nasdaq, officials have not yet been able to trace the path to any specific singular or country. This poses two major threats for authorities: primarily, maintaining the stability and reliableness of computerized trading, and furthermore, ensuring that investors have full faith in the system. This will be the challenge going forward. One act that I figure applies to this case is the Computer Security Act of 1987, in the realm of... If you want to get a full essay, order it on our website: Ordercustompaper.com

If you want to get a full essay, wisit our page: write my paper

No comments:

Post a Comment