Hacking
is identifying weakness in computer systems or networks to exploit its weaknesses to gain access.
Example of Hacking: Using password cracking algorithm to gain access to a system, Hacking means using computers to commit fraudulent acts such as fraud, privacy invasion, stealing corporate/personal data, etc. Cyber crimes cost many organizations millions of dollars every year.
In this tutorial, we will learn:
In this tutorial, we will learn:
✠ Common Hacking Terminologies
✠ What is Cyber Crime?
✠ Types of Cyber Crime
✠ What is Ethical Hacking?
✠ Legality of Ethical Hacking
✠ Summary
Okey then let’s look at some of the most commonly used terminologies in the world of hacking.
Who is a Hacker? Types of Hackers
A Hacker is a person who finds and exploits the weakness in computer systems and/or networks to gain access. Hackers are usually skilled computer programmers with knowledge of computer security.
Hackers are classified according to the intent of their actions. The following list classifies hackers according to their intent.
Hacktivist
A hacker who use hacking to send social, religious, and political, etc. messages. This is usually done by hijacking websites and leaving the message on the hijacked website.
Phreaker
A hacker who identifies and exploits weaknesses in telephones instead of computers.
What is Cybercrime?
Cyber crime is the use of computers and networks to perform illegal activities such as spreading computer viruses, online bullying, performing unauthorized electronic fund transfers, etc. Most cybercrimes are committed through the internet. Some cybercrimes can also be carried out using Mobile phones via SMS and online chatting applications.
Type of Cybercrime
And here I will provide a list of crimes committed by Hackers classified as cyber crime that is very dangerous:
✠ Computer Fraud: Intentional deception for personal gain via the use of computer systems.
✠ Privacy violation: Exposing personal information such as email addresses,phone number,account details, etc.
✠ Identity Theft: Stealing personal information from somebody and impersonating that person.
✠ Sharing copyrighted files/information: This involves distributing copyright protected files such as eBooks etc.
✠ Electronic funds transfer: This involves gaining an unauthorized access bank networks and making illegal transfers.
✠ Electronic money laundering: This involves the use of the computer to launder money.
✠ ATM Fraud: This involves intercepting card details These details are then used to withdraw from the intercepted acc.
✠ Denial of Service Attacks: perpetrator seeks make to attack servers with a view of shutting them down.
✠ Spam: Sending unauthorized emails. These emails usually contain advertisements.
What is Ethical Hacking?
Ethical Hacking is identifying weakness in computer systems and/or computer networks and coming with countermeasures that protect the weaknesses. Ethical hackers must abide by the following rules.
✠ Get written permission from the owner of the computer system and/or computer network before hacking.
✠ Protect the privacy of the organization been hacked.
✠ Transparently report all the identified weaknesses in the computer system to the organization.
✠ Inform hardware and software vendors of the identified weaknesses.
✠ Protect the privacy of the organization been hacked.
✠ Transparently report all the identified weaknesses in the computer system to the organization.
✠ Inform hardware and software vendors of the identified weaknesses.
Legality of Ethical Hacking
Ethical Hacking is legal if the hacker abides by the rules stipulated in the above section on the definition of ethical hacking.
The International Council of E-Commerce Consultants (EC-Council) provides a certification program that tests individual’s skills. Those who pass the examination are awarded with certificates. The certificates are supposed to be renewed after some time.
Posting Komentar