Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

I Want artical about hackers if you can Assignment Tasks: -Question 1: Choose a

ID: 3600838 • Letter: I

Question

I Want artical about hackers if you can

Assignment Tasks: -Question 1: Choose a technical communication article 1 or 2 pages maximum with no abstract). Submit a copy of the article along with a brief analysis in which you explain: a. The purpose of which the piece was written, (1 Point) b. Identify types of readers, (1 Point) c. List one difference between the article and the typical academic wriing?(1 Point) -Question 2: From question 1, use the same article to write an abstract. (2 Point) Remember the abstract should state the purpose and provides the main conclusion or recommendation of the article The abstract should be NO more than 200 words . Should NOT be copy and paste from the artide (Use your own words)

Explanation / Answer

Linux is one of the most used OS when it comes down to the servers. It is true that vulnerability in Linux are arising as the time passes. Hence, many big organizations are running down the Bounty programs to get them on the safer side and even a big leap in getting security for themselves. This technique has decreased the hacking scenarios and has increased the awareness towards cybersecurity.Today, we are going to talk about the recent vulnerability that was been disclosed in the Linux systems. Below is the description.

Network Monitoring Using Security:

The Traffic monitoring is also an important concept as it can be used to increase the chances of being vulnerable as much time it takes to get less traffic. As, chances of being exploited with attacks such as DoS & DDoS attacks. The networking of the whole system is being done mostly on Linux so understanding Linux to attend the traffic in the system with full proof of vulnerability.

Linux Vulnerability:

Hence, this is how the linux security is exploited and with the help of the possible exploits and pitfalls in the system there are many hacks happening in the systems with Linux.

Exploiting The Vulnerabilities:

In Linux, there are penetration tester softwares that test the vulnerabilities and make the world aware of the security issues that are contained in the systems. The system will then get to know about the cyber security and getting into the facts of the applications is also very important.

The vulnerabilities that are pretty much available in the Internet and are exploited are as follows:

Hence, these are the vulnerabilities that are being indentified on the bigger scale in the market and are being exploited by many security professionals and hackers.

Methodologies:

The impact of the vulnerabilities on the organization may be very intense if not focused on. To keep the network running and fine we need to overcome these vulnerabilities and create patches for these vulnerabilities otherwise the impact of these vulnerabilities will be very immense.

Hence, these are the impacts of the vulnerabilities and how must one deal with these vulnerabilities.

Ebay Hack:

This was 4 months back the massive data breach in the e-bay website which left more than 100 million registered users under an hacked situation. This was an vulnerability test but still it was quite a big and massive data breaches running in wild from long time.

Details Of Breach:

Hence, this is what the exploit encountered recently in e-bay website.

About The Researcher

The security researcher was from Egypt named Yaseer.H.Ali. As, he is an security researcher as soon as he came to know about the exploit he reported to Ebay and the exploit was patched and now the website is running fine with it can be never done to the website.

Thanks to the researcher.

Consequences:

The consequences of the exploit would be very immense and disturbing if it would have been exploited in the wild. It would have resulted in declaring many wrong things to the group.Some of them are stated below:

Hence, these are the consequences that would have happened if it would have been reached to many hacking groups.

Rate an upvote....Thankyou

Hope this helps....