This material may consist of step-by-step explanations on how to solve a problem or examples of proper writing, including the use of citations, references, bibliographies, and formatting. This material is made available for the sole purpose of studying and learning - misuse is strictly forbidden.Introduction
As there has been increasing use of IT across all organizations, there is increased pressure for maintaining the security of the data and information exchanged through the digital channel. Internet and digitalization have helped to exchange data in an instantaneous manner, but at the same, it has led to emergence of cyber-crime. There are people who want to gain unauthorized access into the IT systems of organizations and this can emerge as a major threat since loss of information can lead to destruction of competitive advantage. This paper would analyze the extent of damages that can be caused to companies due to hacking by the intruders and would seek to provide solution to the issue of securing the IT system and minimize hacking on a consistent basis (Whitman & Mattord, 2011).
Literature review of the methods of hacking
There are a range of strategies that can be used by hackers to gain unauthorized access into the system. While most of them focus on stealing data, some methods also seek to disrupt the normal functioning of the system without any data theft. Some of these have been discussed below (Erickson, 2008).
Trojan horse programs: In this method, back-door programs are installed by the hackers so that they can access the...