Article Preview
TopTheoretical Framework
General computer end-users are not aware of how easy it is for a hacker to gain access to their electronic information and how they can become victims of cyber crime as a result. According to Featherstone (2009), hacking, as a data-mining culture, generally undermines security systems of individuals and organizations alike by taking advantage of vulnerabilities in software, operating systems, Internet browsers, and communication accessories by altering information to make them perform differently than they were intended.
Poor security is the primary reason why hackers are able to penetrate safeguards as well as unguarded information from computers and networks. Hackers steal information by identifying easy targets, having physical access, and evading intrusion detection systems that contain sensitive electronic information (Smith, 2009). Further, even where security structures such as a virtual private network (VPN) or a two-factor authentication exists, poor security practices can compromise such preventive measures.
Lack of good confidentiality protocol is another reason why computer end-users become easy targets for cyber crime (Adams & Sasse, 1999). Adams and Sasse explain that poor password generation and protection alone can make any system vulnerable to hacking. For example, end users generally prefer human-generated passwords to system-generated ones because the former are easy to remember, and therefore convenient; although they are also easier to crack (Adams & Sasse, 1999).