Book Description
In today’s world, computers are essential to most people’s everyday life. We use computers all the time: for work, to communicate, or even to relax by watching our favorite movies and TV shows or playing our favorite games. Computers are also always in the background, working to make our lives easier: computers and complex software help run our traffic lights, the air traffic control systems at airports, and even control the inventory and tracking system of various businesses. Even modern cars have computers built into them, integrated into the ECU, or electronic control unit. Suffice it to say, modern life as we know it is almost entirely dependent on computers working and working in the proper way.
As computers control a lot of things, even sensitive and important information such as data storage for businesses, identities, and bank details, there are a lot of unscrupulous people out there who want to be able to take advantage of the world’s dependency on computers. There are people who want to take advantage of certain vulnerabilities in the various computer systems around the world, often for nefarious purposes, such as stealing money, information, or even sometimes simply disabling the computer system in question. This exploitation is known as “hacking”.
“Hacking” is made possible by the interconnected nature of computer networks. This is why some companies and businesses choose to improve security by having isolated servers, connected only to internal networks, which stop outside users from gaining unauthorized access. However, it is not possible for all computer networks to be private networks, and there are networks that have to be accessible by computers outside the network, meaning that there have to be additional defenses put in place, as this connection with outside computers may serve as an angle of attack for a hacker.