Skip to main content

What is hacking ?

What is hacking?
There are many definitions of hacking. In this article, we will define hacking as identifying weakness in computer systems and/or networks and exploiting the weaknesses to gain access. An example of hacking is using by passing the login algorithm to gain access to a system. A hacker is a person who finds and exploits weakness in computer systems and/or networks to gain access. Hackers are usually skilled computer programmers with knowledge of computer security.

Before we go any further, let’s look at some of the most commonly used terminologies in the world of hacking.

Types of Hackers
Hackers are classified according to the intent of their actions. The following list classifies hackers according to their intent.

Ethical Hacker (White hat):A hacker who gains access to systems with a view to fix the identified weaknesses. They may also perform penetration testing and vulnerability assessments.

Cracker (Black hat):A hacker who gains unauthorized access to computer systems for personal gain. The intent is usually to steal corporate data, violate privacy rights, transfer funds from bank accounts etc.

Grey hat:A hacker who is in between ethical and black hat hackers. He/she breaks into computer systems without authority with a view to identify weaknesses and reveal them to the system owner.

Script kiddies:A non-skilled person who gains access to computer systems using already made tools.

Hacktivist:A hacker who use hacking to send social, religious, and political etc. messages. This is usually done by hijacking websites and leaving the message on the hijacked website.

Phreaker:A hacker who identifies and exploits weaknesses in telephones instead of computers.

What is Cybercrime?
Cybercrime is the use of computers and networks to perform illegal activities such as spreading computer viruses, online bullying, performing unauthorized electronic fund transfers etc.  Most cybercrimes are committed through the internet. Some cybercrimes can also be carried out using phones via SMS and online chatting applications.

Type of Cybercrime
The following list presents the common types of cybercrimes:
Computer fraud:Intentional deception for personal gain via the use of computer systems.
Privacy violation:Exposing personal information such as email addresses, phone number, account details etc. on  social media, websites etc.
Identity Theft:Stealing personal information from somebody and impersonating that person.
Sharing copyrighted files/information:This involves distributing copyright protected files such as eBooks and computer programs etc.
Electronic funds transfer:This involves gaining an un-authorized access to bank computer networks and making illegal fund transfers.
Electronic money laundering:This involves the use of computer to launder money.
ATM Fraud:This involves intercepting ATM card details such as account number and PIN numbers. These details are then used to withdraw funds from the intercepted accounts.
Denial of Service Attacks:This involves the use of computers in multiple locations to attack servers with a view of shutting them down.
Spam:Sending unauthorized emails. These emails usually contain advertisements.

What is ethical hacking?
Ethical hacking is identifying weakness in computer systems and/or computer networks and coming with counter measures that protect the weaknesses. Ethical hackers must abide by the following rules.

Get written permission from the owner of the computer system and/or computer network before hacking.
Protect the privacy of the organization been hacked.
Transparently report all the identified weaknesses in the computer system to the organization.
Inform hardware and software vendors of the identified weaknesses.
Why ethical hacking?
Information is one of the most valuable assets of an organization. Keeping information secure can protect an organization’s image and save an organization a lot of money.
Hacking can lead to loss of business for organizations that deal in finance such as PayPal. Ethical hacking puts them a step ahead of the cyber criminals who would otherwise lead to loss of business.
Summary
Hacking is identifying and exploiting weaknesses in computer systems and/or computer networks.
Cybercrime is committing crime with the aid of computers and information technology infrastructure.
Ethical hacking is about improving the security of computer systems and/or computer networks.
Ethical hacking is legal.

Comments

Popular posts from this blog

COMPUTER ASSISTED KNEE REPLACEMENT

  COMPUTER ASSISTED KNEE REPLACEMENT What is Knee Replacement Surgery? Knee Replacement is a surgical procedure for replacing the damaged area of the knee joint. A component of metal and plastic is used to replace the damaged area of the knee joint. Through this Knee Replacement Surgery, the patient can relieve pain and disability. Computer Assisted Knee Replacement A computer is utilized to achieve the desired accuracy during a knee replacement surgery .  How does Knee Replacement work? The crucial part of the knee replacement surgery is the proper positioning of the components of the new joint. The surgeon is assisted by the computer to position the components of the new joint accurately, thereby bringing this type of surgery the name  “computer-assisted surgery” . Similar to an autopilot which assists the pilots or a GPRS that aids the driver to reach their destination easily and safely, computer helps the surgeon to achieve the desired accuracy during knee replacement...

FIX THERE IS A PROBLEM PARSING THE PACKAGE ERROR

Android is the most popular Mobile Operating System today. The reason is because of its Versatility, User Friendly and Easy to Use for all Users. There is not Doubt that Most People Prefer Android ahead of other Mobile Operating System. But this Doesn’t Mean you will never Face any Problem or Error while using Android Smartphones. We all like to Install Different apps or Games in our android smartphones but Sometimes while installing you my be Displayed an Error which says “ There is a Problem Parsing the Package ” So if you face this kind of error while Installing any App or Game in your Android smartphone and want to get rid of it, then Do not worry because here in this article i am going to discuss About this error, The Reason and How to Fix it Etc. REASONS OF THERE IS A PROBLEM PARSING THE PACKAGE ERROR The Downloaded .apk file is Currupted or not fully downloaded You might have turned off “Allow installation of apps from Unknown Sources” If the App...

ACL RECONSTRUCTION SURGERY

  Arthroscopic Anatomical ACL Reconstruction During the past decade, the anterior cruciate ligament (ACL) has become a familiar term. The ACL is the main stabilizer of the knee joint during abrupt change in direction. With the increase in sports participation, injury to the ACL has become one of the most common sports injuries. The operative treatment has evolved from open procedures to arthroscopically performed outpatient procedures with early weight bearing. What happens if the ACL is torn? The knee becomes unstable while abruptly changing direction. Many authors have stated that the ACL injury is career ending for the athletes. Ireland calls this a "heart attack of the knee . Why does the ACL fail to heal? Unlike other ligaments about the joint, the ACL passes through the joint and is surrounded by joint fluid. Other ligaments heal by scar formation This fluid is designed to dissolve and prevent blood clotting within the joint Without blood clot, scar tissue does not form. The...