What is Hacking?
Hacking is identifying weakness in computer systems or networks to exploit its weaknesses to gain access . Example of Hacking: Using password cracking algorithm to gain access to a system
Computers have become mandatory to run a successful businesses. It is not enough to have isolated computers systems; they need to be networked to facilitate communication with external businesses. This exposes them to the outside world and hacking. Hacking means using computers to commit fraudulent acts such as fraud, privacy invasion, stealing corporate/personal data, etc. Cyber crimes cost many organizations millions of dollars every year. Businesses need to protect themselves against such attacks.
In this tutorial, we will learn-
*Common Hacking Terminologies
*What is Cyber Crime?
*Types of Cyber Crime
*What is Ethical Hacking?
*Why Ethical Hacking?
*Legality of Ethical Hacking
Summary
Before we go any further, let’s look at some of the most commonly used terminologies in the world of hacking.
Who is a Hacker? Types of Hackers
A Hacker is a person who finds and exploits the weakness in computer systems and/or networks to gain access. Hackers are usually skilled computer programmers with knowledge of computer security.
Hackers are classified according to the intent of their actions. The following list classifies hackers according to their intent.
WHITE HAT HACKER
An ethical hacker (also known as a white hat hacker) is the ultimate security professional. Ethical hackers know how to find and exploit vulnerabilities and weaknesses in various systems—just like a malicious hacker (or a black hat hacker). In fact, they both use the same skills; however, an ethical hacker uses those skills in a legitimate, lawful manner to try to find vulnerabilities and fix them before the bad guys can get there and try to break in.
An ethical hacker’s role is similar to that of a penetration tester, but it involves broader duties. They break into systems legally and ethically. This is the primary difference between ethical hackers and real hackers—the legality.
BLACK HAT HACKER
A black hat hacker (or black-hat hacker ) is a hacker who "violates computer security for little reason beyond maliciousness or for personal gain".
The term was coined by hacker culture theorist Richard Stallman to contrast the exploitative hacker with the white hat hacker who hacks protectively by drawing attention to vulnerabilities in computer systems that require repair. The black hat/white hat terminology originates in the Western genre of popular American culture, in which black and white hats denote villainous and heroic cowboys respectively.
GREY HAT HACKER
The term " grey hat", alternatively spelled as " greyhat " or " gray hat", refers to a computer hacker or computer security expert who may sometimes violate laws or typical ethical standards , but does not have the malicious intent typical of a
black hat hacker.
The term began to be used in the late 1990s, derived from the concepts of " white hat" and "black hat" hackers. When a white hat hacker discovers a vulnerability , they will exploit it only with permission and not divulge its existence until it has been fixed, whereas the black hat will illegally exploit it and/or tell others how to do so. The grey hat will neither illegally exploit it, nor tell others how to do so.
SCRIPT KIDDIES
In programming and hacking culture, a script kiddie or skiddie is an unskilled individual who uses scripts or programs developed by others to attack computer systems and networks and deface websites . It is generally assumed that most script kiddies are juveniles who lack the ability to write sophisticated programs or exploits on their own and that their objective is to try to impress their friends or gain credit in computer-enthusiast communities. However, the term does not relate to the actual age of the participant. The term is generally considered to be pejorative.
HACKTIVIST
In Internet activism , hacktivism or hactivism (a portmanteau of hack and activism ) is the subversive use of computers and
computer networks to promote a political agenda or a social change.
With roots in hacker culture and hacker ethics , its ends are often related to the free speech, human rights , or freedom of information movements.
The term was coined in 1994 by a Cult of the Dead Cow (cDc) member known as "Omega" in an e-mail to the group. Due to the variety of meanings of its root words, hacktivism is sometimes ambiguous and there exists significant disagreement over the kinds of activities and purposes it encompasses. Some definitions include acts of cyberterrorism while others simply reaffirm the use of technological hacking to effect social change.
PHREAKER
Phreaking is a slang term coined to describe the activity of a culture of people who study, experiment with, or explore telecommunication systems, such as equipment and systems connected to public telephone networks. The term phreak is a sensational spelling of the word freak with the ph- from phone, and may also refer to the use of various audio frequencies to manipulate a phone system. Phreak, phreaker , or phone phreak are names used for and by individuals who participate in phreaking.
The term first referred to groups who had reverse engineered the system of tones used to route long-distance calls. By re-creating these tones, phreaks could switch calls from the phone handset, allowing free calls to be made around the world. To ease the creation of these tones, electronic tone generators known as blue boxes became a staple of the phreaker community, including future Apple Inc. cofounders
Steve Jobs and Steve Wozniak.
What is Cybercrime?
Cyber crime is the use of computers and networks to perform illegal activities such as spreading computer viruses, online bullying, performing unauthorized electronic fund transfers, etc. Most cybercrimes are committed through the internet. Some cybercrimes can also be carried out using Mobile phones via SMS and online chatting applications.
Type of Cybercrime
The following list presents the common types of cybercrimes:
*Computer Fraud: Intentional deception for personal gain via the use of computer systems.
*Privacy violation: Exposing personal information such as email addresses, phone number, account details, etc. on social media, websites, etc.
*Identity Theft: Stealing personal information from somebody and impersonating that person.
*Sharing copyrighted files/information: This involves distributing copyright protected files such as eBooks and computer programs etc.
*Electronic funds transfer: This involves gaining an un-authorized access to bank computer networks and making illegal fund transfers.
*Electronic money laundering: This involves the use of the computer to launder money.
*ATM Fraud: This involves intercepting ATM card details such as account number and PIN numbers. These details are then used to withdraw funds from the intercepted accounts.
*Denial of Service Attacks: This involves the use of computers in multiple locations to attack servers with a view of shutting them down.
*Spam: Sending unauthorized emails. These emails usually contain advertisements.
What is Ethical Hacking?
Ethical Hacking is identifying weakness in computer systems and/or computer networks and coming with countermeasures that protect the weaknesses. Ethical hackers must abide by the following rules.
*Get written permission from the owner of the computer system and/or computer network before hacking.
*Protect the privacy of the organization been hacked.
*Transparently report all the identified weaknesses in the computer system to the organization.
*Inform hardware and software vendors of the
identified weaknesses .
Why Ethical Hacking?
Information is one of the most valuable assets of an organization. Keeping information secure can protect an organization’s image and save an organization a lot of money.
Hacking can lead to loss of business for organizations that deal in finance such as PayPal. Ethical hacking puts them a step ahead of the cyber criminals who would otherwise lead to loss of business.
Legality of Ethical Hacking
Ethical Hacking is legal if the hacker abides by the rules stipulated in the above section on the definition of ethical hacking. The International Council of E-Commerce Consultants (EC-Council) provides a certification program that tests individual’s skills. Those who pass the examination are awarded with certificates. The certificates are supposed to be renewed after some time.
Summary
*Hacking is identifying and exploiting weaknesses in computer systems and/or computer networks.
*Cybercrime is committing a crime with the aid of computers and information technology infrastructure.
*Ethical Hacking is about improving the security of computer systems and/or computer networks.
*Ethical Hacking is legal.
Ads
Saturday, 31 March 2018
New
What is Hacking? Introduction & Types
About Unknown
SoraTemplates is a blogger resources site is a provider of high quality blogger template with premium looking layout and robust design. The main mission of SoraTemplates is to provide the best quality blogger templates.
HACKING SCHOOL
Labels:
HACKING SCHOOL